Study into the Implications of Smartphone Operating System Security
Study into the Implications of Smartphone Operating System Security
Study into the Implications of Smartphone Operating System Security
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
<strong>Study</strong> <strong>into</strong> <strong>the</strong> implications <strong>of</strong> <strong>Smartphone</strong> operating system security<br />
CONTENTS<br />
Executive Summary .............................................................................................................. 4<br />
Scope <strong>of</strong> <strong>Study</strong> .................................................................................................................. 4<br />
Introduction ....................................................................................................................... 5<br />
The personal remote control for our lives ....................................................................... 5<br />
<strong>Smartphone</strong> ecosystem and mobile app stores .............................................................. 7<br />
<strong>Smartphone</strong>s get more personal .................................................................................... 7<br />
<strong>Security</strong> Threats ............................................................................................................. 8<br />
What is being done to counteract <strong>the</strong>se security threats? ............................................ 10<br />
What more can be done? ............................................................................................. 13<br />
Report Summary - Key Findings and Recommendations ................................................ 15<br />
An investigation <strong>into</strong> <strong>the</strong> emerging <strong>Smartphone</strong> security threats to consumers ............ 15<br />
How UK Mobile Network Operators are supporting <strong>Smartphone</strong> operating system<br />
updates ........................................................................................................................ 16<br />
An examination <strong>into</strong> <strong>the</strong> challenges <strong>of</strong> supporting multiple versions <strong>of</strong> <strong>Smartphone</strong><br />
operating systems ........................................................................................................ 18<br />
An Investigation <strong>of</strong> <strong>Smartphone</strong> vulnerabilities and how <strong>the</strong>y are being managed........ 19<br />
An examination on whe<strong>the</strong>r current consumer <strong>Smartphone</strong> protection practices in <strong>the</strong><br />
UK are working ............................................................................................................ 21<br />
An Investigation and analysis on how o<strong>the</strong>r regions are dealing with <strong>Smartphone</strong><br />
security ........................................................................................................................ 22<br />
An overview and analysis on UK regulatory and institutional responsibilities for<br />
<strong>Smartphone</strong> security .................................................................................................... 23<br />
A look at <strong>the</strong> impact <strong>of</strong> emerging mobile technologies to <strong>Smartphone</strong> security ............ 25<br />
An investigation and security analysis <strong>into</strong> mobile app store (market) security ............. 26<br />
An investigation and security analysis <strong>into</strong> ‘sideloading’ mobile apps ........................... 27<br />
1. The emerging threat to consumers .............................................................................. 28<br />
Goode Intelligence © 2013 P a g e | 1 www.goodeintelligence.com