10.06.2013 Views

Study into the Implications of Smartphone Operating System Security

Study into the Implications of Smartphone Operating System Security

Study into the Implications of Smartphone Operating System Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

<strong>Study</strong> <strong>into</strong> <strong>the</strong> implications <strong>of</strong> <strong>Smartphone</strong> operating system security<br />

CONTENTS<br />

Executive Summary .............................................................................................................. 4<br />

Scope <strong>of</strong> <strong>Study</strong> .................................................................................................................. 4<br />

Introduction ....................................................................................................................... 5<br />

The personal remote control for our lives ....................................................................... 5<br />

<strong>Smartphone</strong> ecosystem and mobile app stores .............................................................. 7<br />

<strong>Smartphone</strong>s get more personal .................................................................................... 7<br />

<strong>Security</strong> Threats ............................................................................................................. 8<br />

What is being done to counteract <strong>the</strong>se security threats? ............................................ 10<br />

What more can be done? ............................................................................................. 13<br />

Report Summary - Key Findings and Recommendations ................................................ 15<br />

An investigation <strong>into</strong> <strong>the</strong> emerging <strong>Smartphone</strong> security threats to consumers ............ 15<br />

How UK Mobile Network Operators are supporting <strong>Smartphone</strong> operating system<br />

updates ........................................................................................................................ 16<br />

An examination <strong>into</strong> <strong>the</strong> challenges <strong>of</strong> supporting multiple versions <strong>of</strong> <strong>Smartphone</strong><br />

operating systems ........................................................................................................ 18<br />

An Investigation <strong>of</strong> <strong>Smartphone</strong> vulnerabilities and how <strong>the</strong>y are being managed........ 19<br />

An examination on whe<strong>the</strong>r current consumer <strong>Smartphone</strong> protection practices in <strong>the</strong><br />

UK are working ............................................................................................................ 21<br />

An Investigation and analysis on how o<strong>the</strong>r regions are dealing with <strong>Smartphone</strong><br />

security ........................................................................................................................ 22<br />

An overview and analysis on UK regulatory and institutional responsibilities for<br />

<strong>Smartphone</strong> security .................................................................................................... 23<br />

A look at <strong>the</strong> impact <strong>of</strong> emerging mobile technologies to <strong>Smartphone</strong> security ............ 25<br />

An investigation and security analysis <strong>into</strong> mobile app store (market) security ............. 26<br />

An investigation and security analysis <strong>into</strong> ‘sideloading’ mobile apps ........................... 27<br />

1. The emerging threat to consumers .............................................................................. 28<br />

Goode Intelligence © 2013 P a g e | 1 www.goodeintelligence.com

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!