10.06.2013 Views

Study into the Implications of Smartphone Operating System Security

Study into the Implications of Smartphone Operating System Security

Study into the Implications of Smartphone Operating System Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

<strong>Study</strong> <strong>into</strong> <strong>the</strong> implications <strong>of</strong> <strong>Smartphone</strong> operating system security<br />

Report Summary - Key Findings and Recommendations<br />

An investigation <strong>into</strong> <strong>the</strong> emerging <strong>Smartphone</strong> security threats to<br />

consumers<br />

Key Findings<br />

<strong>Smartphone</strong>s have become <strong>the</strong> remote controls for our ever-important digital lives. We rarely<br />

let <strong>the</strong>m out <strong>of</strong> our sight, even when we are asleep, and perform much <strong>of</strong> our daily activities<br />

on <strong>the</strong>m.<br />

<strong>Smartphone</strong>s access and store much <strong>of</strong> our digital lives, both personal and business.<br />

<strong>Smartphone</strong>s and tablet computers have become <strong>the</strong> dominant digital device and we now<br />

preform much <strong>of</strong> our social networking, shopping, messaging (iOS has become <strong>the</strong> number<br />

one client for email replacing Micros<strong>of</strong>t Outlook), banking and business activities on <strong>the</strong>m.<br />

With this increasing reliance on <strong>Smartphone</strong>s comes <strong>the</strong> possibility <strong>of</strong> increasing threats and<br />

security risk. These threats will replicate what has already been experienced with o<strong>the</strong>r<br />

forms <strong>of</strong> information technology (as <strong>Smartphone</strong> operating systems have commonality with<br />

o<strong>the</strong>r systems, e.g. Linux Kernel and WebKit) but we shall also see o<strong>the</strong>r, mobile-specific,<br />

threats that will probe for weaknesses in unique characteristics that <strong>Smartphone</strong>s support.<br />

For instance:<br />

Accurate location based services, using a combination <strong>of</strong> GPS and GSM location<br />

data to accurately pinpoint where a device and its owner are<br />

Faster network access through 4G (LTE) and future fast radio-based networks<br />

Using a <strong>Smartphone</strong> as a payment source ei<strong>the</strong>r at <strong>the</strong> physical Point-<strong>of</strong>-Sale (POS)<br />

using Near Field Communications (NFC) or using o<strong>the</strong>r mobile payment solutions for<br />

in-app payment/billing and peer-to-peer (P2P) payment between one device and<br />

ano<strong>the</strong>r<br />

Capturing biometric data via embedded sensors such as fingerprint readers,<br />

conventional and bespoke cameras for facial, iris and retinal scanning, in-built<br />

microphones for capture <strong>of</strong> voiceprints (some <strong>of</strong> which can be captured by an in-built<br />

voice sensor) and sensors to capture and record o<strong>the</strong>r biometrics such as pulse,<br />

blood pressure and ECG<br />

Goode Intelligence believes that <strong>the</strong> threats to <strong>Smartphone</strong> consumers can be broken down<br />

<strong>into</strong> <strong>the</strong>se main areas:<br />

Lost and stolen <strong>Smartphone</strong>s<br />

Financial fraud<br />

Privacy<br />

These threats are interconnected as a lost or stolen <strong>Smartphone</strong> can lead to o<strong>the</strong>r threats<br />

being exposed including financial fraud and privacy issues (including data and identity <strong>the</strong>ft).<br />

Goode Intelligence © 2013 P a g e | 15 www.goodeintelligence.com

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!