Smartphone (a smart phone) – is a mobile phone, which is comparable to the Pocket PC (PDA). Also to refer to some devices that combine the functionality of mobile phones, PDAs often use the term “communicator.” It should be noted that new devices support additional functionality and services, and service providers quickly embraced these as a way to foster new pay-per-use services, according to Smart Phones Security (2010).Unfortunately, the development of both devices and services has been driven by market demand, focusing on new features and neglecting security. As a result, smart phones now face new security problems not found elsewhere. These problems originate directly from the integration process and are often related to the inclusion of multiple wireless technologies into a single device. Other problems are created by smart-phone-specific services, which often require complex software and infrastructure.Problems of leakage of information is covered at the moment so completely that not always is interesting to read about them, and learn something new is very difficult. This article will consider the other side of the leak, which has not been covered well enough. We are talking about smart phones security.
They have long been included in corporate life. Modern smart phones have a functional desktop computer: Wi-Fi, Internet access, e-mail, many applications, large amounts of memory. But very few organizations understand how great the risks of corporate smart phones, especially as such devices are usually operated by the management (executives, heads of departments, etc.).Protection of smart phones is not limited to antivirus and anti spam. Smartphone – is a full-featured computer that should be applicable rules of encryption, port monitoring, auditing and firewall. After gaining popularity, smart phone users should be concerned with the safety and privacy – just as they do on their desktops and laptops.
The picture is clear. In the past year, there have been sold over 139 million smart phones (13.9% more than in 2007). Apple recently released a localized version of the iPhone to China. The spectrum of Android-devices continues to expand. Increasingly, users are turning to shopping online through their “smart phones.” It is clear that smart phones are becoming an increasingly attractive target for attackers trying to extract your personal information, including important financial information. According to experts, in the short term, smart phones will be attacked by the same arsenal as conventional computers – viruses, spam, worms and Trojans, according to Top 10 Smartphone Security Tips (2011).
Experts say the growth of targeted attacks on smart phones. At the same time hackers have resorted to rather exotic techniques, such as the use of Bluetooth-headset, which is trying to attack any other Bluetooth-connection that may be within 6 meters of the infected device. Meanwhile, users are careless enough to safety. Thus, according to Trend Micro, only 23% of smart phone owners have installed in my machine right software for security and 44% of users believe that surfing the web on a smart phone is much safer than on your computer. Fortunately, a variety of operating platforms of smart phones and high popularity of Windows on a PC make hackers create malware to a greater extent yet to be distributed on the PC. Interestingly, according to Symantec, smart phones are lost 15 times more often than laptops. Accordingly, users should consider password protection of important information, or for those who find a lost device, will not be difficult to open e-mail account holder or to use his banking information, according to SmartPhones (2011).
So no doubt that the number of smart phones in circulation will increase, both corporate and equity, people will want to use their phones to connect to the company to receive their mail and work with other resources. However, many of those who regularly take precautions on their computers and laptops do not realize that the same is made to the telephones as well. This creates a potential threat to the networks to which they connect. Some of these threats are: Viruses and other malicious software that is passed through a telephone network; The loss or theft of mobile phones containing the identification data for a network connection; The loss or theft of mobile phones containing sensitive company data in the form of letters to e-mail, documents, photographs, etc.; Malicious software that allows an attacker to listen to telephone conversations; Attack from a short distance, using Bluetooth, as well as attacks based on Wi-Fi; Cross-service attacks that use the interaction between the various networks, such as Wi-Fi network and 3G network, according to Smart Phones need smart security practices (2011).
Currently, the protection of smart phones is necessary to combine two products: antivirus / anti spam and solutions for comprehensive protection (blocking ports, encryption, centralized management and auditing). However, none of the products under test showed full functionality. From anti-virus / anti-spam solutions for small businesses with greater benefits, there is a “Kaspersky Lab”, which is a non-centralized product. If it is a serious organization, the leader – is Symantec. Panda Security for smart phones is suitable only for personal use on smart phones Symbian. Of solutions for comprehensive protection for all tests there was determined the clear leader – Guardian Edge Smartphone Protection.
Smart Phones Security (2010). Retrieved September 29, 2011 from http://www.cs.ucsb.edu/~seclab/projects/smartphones/
Smart Phones need smart security practices (2011). Retrieved September 29, 2010 from http://www.computerworld.com/s/article/345297/Smartphones_Need_Smart_Security
SmartPhones (2011). Retrieved September 29, 2011 from http://www.networkworld.com/news/2011/022811-smartphones-security.html
Top 10 Smartphone Security Tips (2011). Retrieved September 29, 2011 from http://www.smallbusinesscomputing.com/webmaster/article.php/10732_3931201_/Top-10-Smartphone-Security-Tips.htm