10.06.2013 Views

Study into the Implications of Smartphone Operating System Security

Study into the Implications of Smartphone Operating System Security

Study into the Implications of Smartphone Operating System Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

<strong>Study</strong> <strong>into</strong> <strong>the</strong> implications <strong>of</strong> <strong>Smartphone</strong> operating system security<br />

Goode Intelligence recommends that cross-industry representatives should liaise with UK<br />

MNOs to assist <strong>the</strong>m in any cross-operator initiatives to improve <strong>the</strong> process in supporting<br />

multiple versions <strong>of</strong> <strong>Smartphone</strong> operating systems.<br />

An Investigation <strong>of</strong> <strong>Smartphone</strong> vulnerabilities and how <strong>the</strong>y are<br />

being managed<br />

Key Findings<br />

<strong>Security</strong> vulnerabilities exist in every example <strong>of</strong> computer s<strong>of</strong>tware and <strong>Smartphone</strong><br />

operating systems are not exempt from this rule.<br />

Vulnerability management is <strong>the</strong> process or lifecycle that aims to manage computer<br />

vulnerabilities. There will be many vulnerability management models but essentially <strong>the</strong> main<br />

parts <strong>of</strong> <strong>the</strong> vulnerability management process are:<br />

1. Identification (Including Disclosure)<br />

2. Classification<br />

3. Remediation (fixing or mitigation)<br />

Effective <strong>Smartphone</strong> vulnerability management is essential in how effectively vulnerabilities<br />

are discovered, disclosed, fixed and patched. If security vulnerabilities are not efficiently<br />

remediated (fixed) <strong>the</strong>n <strong>the</strong> risk <strong>of</strong> <strong>the</strong>m being effectively exploited will increase. This<br />

increases <strong>the</strong> risk to consumers.<br />

The actual risk to <strong>Smartphone</strong> owners to <strong>the</strong>se vulnerabilities will be dependent on a number<br />

<strong>of</strong> factors including:<br />

The nature and risk level <strong>of</strong> <strong>the</strong> vulnerability, e.g. will <strong>the</strong> vulnerability lead to<br />

widespread disruption, potential financial fraud or identity <strong>the</strong>ft?<br />

Who knows about <strong>the</strong> vulnerability? Is knowledge <strong>of</strong> <strong>the</strong> vulnerability restricted and<br />

confined to a criminal organisation or hostile nation state?<br />

How easy it is to exploit <strong>the</strong> vulnerability and has <strong>the</strong> exploit been automated and<br />

shared throughout <strong>the</strong> security research community?<br />

The speed for <strong>the</strong> vendor that is affected by <strong>the</strong> vulnerability to initially fix (patch) and<br />

<strong>the</strong>n to distribute <strong>the</strong> remediated s<strong>of</strong>tware to <strong>Smartphone</strong> owners<br />

Quality <strong>of</strong> communication. Is news about <strong>the</strong> vulnerability efficiently distributed to<br />

those parties that are affected by it?<br />

The willingness <strong>of</strong> <strong>the</strong> <strong>Smartphone</strong> owners to download and install <strong>the</strong> revised<br />

s<strong>of</strong>tware update<br />

<strong>Smartphone</strong> operating system vulnerabilities are being discovered ei<strong>the</strong>r by <strong>the</strong> operating<br />

system vendor <strong>the</strong>mselves, by security research companies that specialise in vulnerability<br />

discovery and by individual security researchers.<br />

Computer Emergency Response Teams (CERTs) have been an important part <strong>of</strong> <strong>the</strong><br />

vulnerability management landscape, especially in <strong>the</strong> enterprise environment. By<br />

Goode Intelligence © 2013 P a g e | 19 www.goodeintelligence.com

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!