10.06.2013 Views

Study into the Implications of Smartphone Operating System Security

Study into the Implications of Smartphone Operating System Security

Study into the Implications of Smartphone Operating System Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

<strong>Study</strong> <strong>into</strong> <strong>the</strong> implications <strong>of</strong> <strong>Smartphone</strong> operating system security<br />

1. THE EMERGING THREAT TO CONSUMERS<br />

Overview<br />

<strong>Smartphone</strong>s have become <strong>the</strong> remote controls for our ever-important digital lives. We rarely<br />

let <strong>the</strong>m out <strong>of</strong> our sight, even when we are asleep, and perform much <strong>of</strong> our daily activities<br />

on <strong>the</strong>m.<br />

<strong>Smartphone</strong>s access and store much <strong>of</strong> our digital lives, both personal and business.<br />

<strong>Smartphone</strong>s and tablet computers have become <strong>the</strong> dominant digital device and we now<br />

preform much <strong>of</strong> our social networking, shopping, messaging (iOS has become <strong>the</strong> number<br />

one client for email replacing Micros<strong>of</strong>t Outlook), banking and business activities on <strong>the</strong>m.<br />

There is also a question whe<strong>the</strong>r consumers have changed <strong>the</strong>ir risk behaviour to adapt to<br />

how we are using <strong>Smartphone</strong>s. Tony Neate, CEO, Get Safe Online, believes it has taken<br />

many years for consumers to change <strong>the</strong>ir behaviour to adapt to using desktop-based<br />

electronic services but “with mobile we have a whole new mountain to climb”. Neate feels<br />

that “<strong>the</strong>re is a different behaviour when we use our <strong>Smartphone</strong>s to that <strong>of</strong> desktop<br />

computers” and a “new behavioural change is required”. 11<br />

With this increasing reliance on <strong>Smartphone</strong>s comes <strong>the</strong> possibility <strong>of</strong> increasing threats and<br />

security risk. These threats will replicate what has already been experienced with o<strong>the</strong>r<br />

forms <strong>of</strong> information technology (as <strong>Smartphone</strong> operating systems have commonality with<br />

o<strong>the</strong>r systems, e.g. Linux Kernel and WebKit) but we shall also see o<strong>the</strong>r, mobile-specific,<br />

threats that will probe for weaknesses in unique characteristics that <strong>Smartphone</strong>s support.<br />

For instance:<br />

Accurate location based services, using a combination <strong>of</strong> GPS and GSM location<br />

data to accurately pinpoint where a device and its owner are<br />

Faster network access through 4G (LTE) and future fast radio-based networks<br />

Using a <strong>Smartphone</strong> as a payment source ei<strong>the</strong>r at <strong>the</strong> physical Point-<strong>of</strong>-sale (POS)<br />

using Near Field Communications (NFC) or using o<strong>the</strong>r mobile payment solutions for<br />

in-app payment/billing and peer-to-peer (P2P) payment between one device and<br />

ano<strong>the</strong>r<br />

Capturing biometric data via embedded sensors such as fingerprint readers,<br />

conventional and bespoke cameras for facial, iris and retinal scanning, in-built<br />

microphones for capture <strong>of</strong> voiceprints (some <strong>of</strong> which can be captured by an in-built<br />

voice sensor) and sensors to capture and record o<strong>the</strong>r biometrics such as pulse,<br />

blood pressure and electrocardiogram (ECG)<br />

Goode Intelligence believes that <strong>the</strong> threats to <strong>Smartphone</strong> consumers can be broken down<br />

<strong>into</strong> <strong>the</strong>se main areas:<br />

Lost and stolen <strong>Smartphone</strong>s<br />

11 Tony Neate interview with Goode Intelligence, 15 th March 2013.<br />

Goode Intelligence © 2013 P a g e | 28 www.goodeintelligence.com

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!