Please enable JavaScript.
Coggle requires JavaScript to display documents.
VULNERABILITIES, THREATS & ATTACK OF MOBILE DEVICES (Threats (1) …
VULNERABILITIES, THREATS & ATTACK OF MOBILE DEVICES
Threats
1) Data Leakage
-
To avoiding this problem. only give apps permissions they absolutely insist on, and forgo any program that asks for more than necessary.
2) Unsecured Wi-Fi
only use free Wi-Fi sparingly on your mobile device, and never using it to access confidential or personal services, like banking or credit card information.
3) Network Spoofing
-
never provide personal information, and if you are asked to create a login, always create a unique password, just in case.
4) Phishing Attacks
-
. Never click on unfamiliar email links. On a smaller mobile screen, they can be even harder to verify.
5) Spyware
installed by spouses, coworkers or employers to keep track of their whereabouts and use patterns.
-
6) Broken Cryptography
use weak encryption algorithms, or strong encryption without proper implementation.
-
Attacks
Hardware-based attacks:
With a broad perspective, hardware-based attacks constitute an element of mobile security.
Device-independent attacks:
These are the attacks independent from the device which directly target the mobile device user.
Software-based attacks:
An important part of the technical vulnerabilities on mobile devices are the software-based attacks.
User-based attacks:
These constitute the attacks made through cheating without using malicious software which are direct to the mobile device users.
Vulnerabilities
Trojan can be used to gather private information or to install other malicious applications like worms or botnets.
used to utilize the computing power of compromised devices in order to commit various activities ranging from sending spam mail to committing DOS attacks.
-
gained rights to run in a privileged mode. Such malicious applications usually mask their presence from the user by modifying standard operating system functionalities.