10.06.2013 Views

Study into the Implications of Smartphone Operating System Security

Study into the Implications of Smartphone Operating System Security

Study into the Implications of Smartphone Operating System Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

<strong>Study</strong> <strong>into</strong> <strong>the</strong> implications <strong>of</strong> <strong>Smartphone</strong> operating system security<br />

3. Review <strong>the</strong> current gaps in <strong>the</strong> effectiveness and efficiency <strong>of</strong> <strong>the</strong> <strong>Smartphone</strong><br />

<strong>Operating</strong> <strong>System</strong> update process and work with industry stakeholders to remove <strong>the</strong><br />

gaps. This includes improving <strong>the</strong> time it takes for vulnerabilities to be discovered,<br />

remediated and pushed to <strong>Smartphone</strong> owners.<br />

4. This includes raising awareness <strong>of</strong> <strong>the</strong> importance <strong>of</strong> downloading and installing <strong>the</strong><br />

latest s<strong>of</strong>tware versions.<br />

5. Learn from o<strong>the</strong>r regions about how <strong>the</strong>y are managing <strong>Smartphone</strong> security threats<br />

including:<br />

a. Analysing EU and US examples <strong>of</strong> how <strong>the</strong>y deal with <strong>Smartphone</strong> security.<br />

b. Liaising with <strong>the</strong> ENISA in <strong>the</strong> EU and FCC/ FTC in <strong>the</strong> USA to determine <strong>the</strong><br />

success <strong>of</strong> <strong>the</strong>ir initiatives.<br />

6. UK legislation and regulatory recommendations:<br />

a. Creation <strong>of</strong> a cross-regulatory working party to discuss potential issues and<br />

gaps in protecting <strong>Smartphone</strong>s, and <strong>the</strong>ir associated services. This study<br />

could act as <strong>the</strong> initial reference point for such a group.<br />

b. Review <strong>of</strong> <strong>Smartphone</strong> security risks against UK legislation to determine:<br />

i. UK legislation related to particular security risk<br />

ii. UK regulatory body that is responsible for particular security risk<br />

iii. Gaps<br />

iv. Action plan to manage security risks.<br />

7. Emerging mobile technology risks. Emerging technology areas are difficult to assess<br />

from a security perspective. There may be pro<strong>of</strong>-<strong>of</strong>-concept attacks on technologies<br />

that have not been widely deployed but it is usually only when technologies reach a<br />

degree <strong>of</strong> critical mass that more widespread exploits are discovered.<br />

a. It is recommended that Ofcom continue monitoring emerging mobile<br />

technologies, including NFC, LTE, and wearable devices running <strong>Smartphone</strong><br />

<strong>Operating</strong> <strong>System</strong>s such as Google Glass, to determine <strong>the</strong>ir impact on<br />

consumer <strong>Smartphone</strong> security.<br />

8. Mobile Appstore security recommendations:<br />

a. Educate consumers about <strong>the</strong> levels <strong>of</strong> risk when dealing with app stores.<br />

b. Consumers should be cautious when using third-party Android app stores and<br />

file sharing sites.<br />

c. Determine if <strong>the</strong>re are practical solutions in minimising <strong>the</strong> risk <strong>of</strong> installing<br />

rogue or Trojanised apps using Android’s app sideloading feature.<br />

The following section, ‘Report Summary – Key Findings and Recommendations’,<br />

summarises <strong>the</strong> key findings and recommendations from this study in more detail.<br />

Goode Intelligence © 2013 P a g e | 14 www.goodeintelligence.com

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!