10.06.2013 Views

Study into the Implications of Smartphone Operating System Security

Study into the Implications of Smartphone Operating System Security

Study into the Implications of Smartphone Operating System Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

<strong>Study</strong> <strong>into</strong> <strong>the</strong> implications <strong>of</strong> <strong>Smartphone</strong> operating system security<br />

FIRST<br />

FIRST is <strong>the</strong> Forum <strong>of</strong> Incident Response and <strong>Security</strong> Teams and was founded in 1989.<br />

It is an international confederation <strong>of</strong> “trusted computer incident response teams” that allows<br />

incident response teams to respond to security incidents.<br />

FIRST initiated <strong>the</strong> Common Vulnerability Scoring <strong>System</strong> (CVSS). This is a system that<br />

provides an open and standardised method for rating computer vulnerabilities.<br />

<strong>Smartphone</strong> operating systems vulnerabilities<br />

All <strong>Smartphone</strong> operating systems will have vulnerabilities and <strong>the</strong> more popular an<br />

operating system becomes <strong>the</strong> more likely it will come under attack and those vulnerabilities<br />

disclosed.<br />

The actual risk to <strong>Smartphone</strong> owners to <strong>the</strong>se vulnerabilities will be dependent on a number<br />

<strong>of</strong> factors including:<br />

The nature and risk level <strong>of</strong> <strong>the</strong> vulnerability, e.g. will <strong>the</strong> vulnerability lead to<br />

widespread disruption, potential financial fraud or identity <strong>the</strong>ft?<br />

Who knows about <strong>the</strong> vulnerability? Is knowledge <strong>of</strong> <strong>the</strong> vulnerability restricted and<br />

confined to a criminal organisation or hostile nation state?<br />

How easy it is to exploit <strong>the</strong> vulnerability and has <strong>the</strong> exploit been automated and<br />

shared throughout <strong>the</strong> security research community?<br />

The speed for <strong>the</strong> vendor that is affected by <strong>the</strong> vulnerability to initially fix (patch) and<br />

<strong>the</strong>n to distribute <strong>the</strong> remediated s<strong>of</strong>tware to <strong>Smartphone</strong> owners<br />

Quality <strong>of</strong> communication. Is news about <strong>the</strong> vulnerability efficiently distributed to<br />

those parties that are affected by it?<br />

The willingness <strong>of</strong> <strong>the</strong> <strong>Smartphone</strong> owners to download and install <strong>the</strong> revised<br />

s<strong>of</strong>tware update<br />

This section details specific <strong>Smartphone</strong> operating system vulnerabilities on a per-platform<br />

basis. It investigates <strong>the</strong> levels <strong>of</strong> reported vulnerabilities associated with each <strong>Smartphone</strong><br />

operating system that has been discussed in this report. There will be reference to mobile<br />

malware and its impact on each platform.<br />

Before we dive down <strong>into</strong> each platform it is worth taking some time to discuss mobile<br />

malware in general.<br />

Goode Intelligence © 2013 P a g e | 79 www.goodeintelligence.com

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!