10.06.2013 Views

Study into the Implications of Smartphone Operating System Security

Study into the Implications of Smartphone Operating System Security

Study into the Implications of Smartphone Operating System Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

<strong>Study</strong> <strong>into</strong> <strong>the</strong> implications <strong>of</strong> <strong>Smartphone</strong> operating system security<br />

The GSMA MMG is a cross-industry working group that meets to share intelligence on<br />

mobile malware. The GSMA makes this statement on <strong>the</strong> MMG; “Although mobile malware<br />

has not reached predicted epidemic levels, <strong>the</strong> GSMA is aware <strong>of</strong> <strong>the</strong> potential threats and<br />

has established a Mobile Malware Group to coordinate <strong>the</strong> operator response to identified<br />

threats. The group facilitates <strong>the</strong> prompt exchange <strong>of</strong> information between industry<br />

stakeholders and encourages best practice to manage and handle malware by producing<br />

comprehensive guidelines for its members.” 69 The GSMA MMG has been favourably cited by<br />

<strong>the</strong> MNOs that Goode Intelligence has spoken to. The MMG regularly meets and shares<br />

information. However, <strong>the</strong> nature <strong>of</strong> <strong>the</strong> group has its limitations handling emergency<br />

scenarios that require a quick reactive response. It is Goode Intelligence’s belief that it<br />

doesn’t currently <strong>of</strong>fer a CERT-like early warning system that allows real-time exchange <strong>of</strong><br />

intelligence specifically aimed at mobile malware.<br />

The UK’s Premium Rate Services (PRS) regulator PhonepayPlus has presented at this<br />

forum to discuss <strong>the</strong>ir research, aided by Goode Intelligence, <strong>into</strong> <strong>the</strong> threat <strong>of</strong> mobile<br />

malware to <strong>the</strong> UK’s PRS industry.<br />

O<strong>the</strong>r Vulnerability Management Resources<br />

There are o<strong>the</strong>r government run databases for vulnerability management including <strong>the</strong><br />

National Vulnerability Database (NVD) and <strong>the</strong> Common Vulnerabilities and Exposures<br />

(CVE) database.<br />

NIST NVD<br />

The National Vulnerability Database is run by <strong>the</strong> US Government’s National Institute <strong>of</strong><br />

Standards and Technology (NIST) and is a searchable (using <strong>the</strong> <strong>Security</strong> Content<br />

Automation Protocol (SCAP)) repository <strong>of</strong> standards-based vulnerability management data.<br />

The NVD does contain <strong>Smartphone</strong> operating system vulnerabilities but it may take a while<br />

for <strong>the</strong> latest vulnerabilities to be uploaded and for <strong>the</strong>m to be matched against any patch<br />

that <strong>the</strong> operating system vendor may have released.<br />

CVE<br />

The Common Vulnerabilities and Exposures is a resource run by The MITRE Corporation<br />

and is a dictionary <strong>of</strong> publically known information security vulnerabilities and exposures. It is<br />

not a vulnerability database.<br />

Each vulnerability is allocated a CVE common identifier that has become a de facto standard<br />

for identifying vulnerabilities. The CVW common identifier is used by <strong>the</strong> NVD.<br />

69 http://www.itu.int/ITU-<br />

D/treg/Events/Seminars/GSR/GSR12/consultation/GSR12Contribution_forinfo_GSMA.pdf<br />

Goode Intelligence © 2013 P a g e | 78 www.goodeintelligence.com

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!