10.06.2013 Views

Study into the Implications of Smartphone Operating System Security

Study into the Implications of Smartphone Operating System Security

Study into the Implications of Smartphone Operating System Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

<strong>Study</strong> <strong>into</strong> <strong>the</strong> implications <strong>of</strong> <strong>Smartphone</strong> operating system security<br />

Summary and Recommendations<br />

<strong>Smartphone</strong>s have become <strong>the</strong> remote control for our digital and non-digital lives, replacing<br />

desktop computers, notebooks and even TVs and personal music players. As such, <strong>the</strong>y are<br />

subject to <strong>the</strong> same threats that have affected consumers for many years.<br />

These threats are controlled by legislation and governed by bodies that have been assigned<br />

responsibility to govern <strong>the</strong>m.<br />

Governing bodies need to understand <strong>the</strong> nature <strong>of</strong> <strong>the</strong>se threats. Many <strong>of</strong> <strong>the</strong> current<br />

threats are old ones adapted for <strong>Smartphone</strong>s, e.g. Dialler fraud.<br />

There are threats that are ei<strong>the</strong>r unique to <strong>the</strong> <strong>Smartphone</strong> or are amplified as a result <strong>of</strong> <strong>the</strong><br />

characteristics <strong>of</strong> <strong>the</strong> <strong>Smartphone</strong>. A <strong>Smartphone</strong> is more likely to be lost and stolen and<br />

when it gets <strong>into</strong> <strong>the</strong> hands <strong>of</strong> unauthorised users more likely to be poorly protected by ei<strong>the</strong>r<br />

no passcodes or weak ones.<br />

From table 7.1 above, we have identified <strong>the</strong> current <strong>Smartphone</strong> security risks and matched<br />

<strong>the</strong>m against relevant legislation and <strong>the</strong> bodies responsible for governing <strong>the</strong>m.<br />

Goode Intelligence believes that current legislation should be sufficient in dealing with<br />

current <strong>Smartphone</strong> security issues. There does not seem to be any major holes in current<br />

legislation that could result in a disparity between <strong>the</strong> technology and <strong>the</strong> governing<br />

framework.<br />

However, this must be constantly reviewed in light <strong>of</strong> emerging, sometimes disruptive,<br />

technology that could alter <strong>the</strong> effectiveness <strong>of</strong> regulation and legislation.<br />

Related to legislation is education (engagement) and enforcement; educating affective<br />

parties as to <strong>the</strong> nature <strong>of</strong> legislation by engaging with all parts <strong>of</strong> <strong>the</strong> ecosystem and<br />

enforcement once <strong>the</strong>re has been a breach (ei<strong>the</strong>r intentional or unintentional).<br />

Recommendations<br />

Goode Intelligence recommends <strong>the</strong> following:<br />

1. Creation <strong>of</strong> a cross-regulatory working party to discuss potential issues and gaps in<br />

protecting <strong>Smartphone</strong>s, and <strong>the</strong>ir associated services. This study could act as <strong>the</strong><br />

initial reference point for such a group.<br />

2. Review <strong>of</strong> <strong>Smartphone</strong> security risks against UK legislation to determine:<br />

a. UK legislation related to particular security risk<br />

b. UK regulatory that is responsible for particular security risk<br />

c. Gaps<br />

d. Action plan to manage security risks<br />

Goode Intelligence © 2013 P a g e | 112 www.goodeintelligence.com

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!