10.06.2013 Views

Study into the Implications of Smartphone Operating System Security

Study into the Implications of Smartphone Operating System Security

Study into the Implications of Smartphone Operating System Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

<strong>Study</strong> <strong>into</strong> <strong>the</strong> implications <strong>of</strong> <strong>Smartphone</strong> operating system security<br />

An examination on whe<strong>the</strong>r current consumer <strong>Smartphone</strong><br />

protection practices in <strong>the</strong> UK are working<br />

Key Findings<br />

<strong>Smartphone</strong> security is an emerging area <strong>of</strong> technology, as are <strong>the</strong> threats against <strong>the</strong>m.<br />

Consumer protection practices in <strong>the</strong> UK are currently a combination <strong>of</strong> technology initiatives<br />

and consumer awareness.<br />

There is little evidence that UK consumers are effectively protecting <strong>the</strong>ir <strong>Smartphone</strong>s using<br />

technology and that <strong>the</strong>y are aware <strong>of</strong> what <strong>the</strong> main threats are. Consumers, in <strong>the</strong> main,<br />

do not take personal responsibility for <strong>the</strong> security <strong>of</strong> <strong>the</strong>ir <strong>Smartphone</strong>s and are relying on<br />

<strong>the</strong> MNOs to be proactive in securing both <strong>the</strong> device and ensuring <strong>the</strong> safe transport <strong>of</strong><br />

information over <strong>the</strong> radio network.<br />

MNOs are taking steps to protect both <strong>the</strong>ir own networks and <strong>Smartphone</strong> devices by<br />

adopting security practices, including technology controls.<br />

From an awareness point <strong>of</strong> view, MNOs are not making it easy for consumers to locate vital<br />

information that could protect <strong>the</strong>ir <strong>Smartphone</strong>s against major security threats, including<br />

protection against loss or <strong>the</strong>ft.<br />

There is a good level <strong>of</strong> communication from organisations such as Get Safe Online and UK<br />

Police authorities as to <strong>the</strong> major <strong>Smartphone</strong> threats but <strong>the</strong>re needs to be an analysis <strong>of</strong><br />

<strong>the</strong>se communication channels in measuring <strong>the</strong>ir effectiveness.<br />

Recommendations<br />

A combination <strong>of</strong> technology control and education is recommended in combatting <strong>the</strong> threat<br />

to UK <strong>Smartphone</strong> owners.<br />

Better consumer education is at <strong>the</strong> heart <strong>of</strong> any protection practice that aims to protect<br />

<strong>Smartphone</strong> users. This can be achieved with <strong>the</strong> close cooperation <strong>of</strong> UK stakeholders that<br />

includes MNOs, Get Safe Online, The ICO, Ofcom, PhonePayPlus and UK Police Service.<br />

Ensure that MNOs are taking adequate safeguards to protect consumer <strong>Smartphone</strong>s and<br />

<strong>the</strong> mobile network infrastructure. This includes appropriate levels <strong>of</strong> consumer<br />

communication.<br />

Basic steps to protect <strong>Smartphone</strong>s include:<br />

Better communication at <strong>the</strong> point <strong>of</strong> sale, e.g. when <strong>the</strong> consumer purchases a<br />

<strong>Smartphone</strong><br />

PINs and passwords are set. Potentially a default setting on new <strong>Smartphone</strong>s<br />

Only install apps from trusted sources and education as to what is a trusted or<br />

untrusted source<br />

Goode Intelligence © 2013 P a g e | 21 www.goodeintelligence.com

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!