10.06.2013 Views

Study into the Implications of Smartphone Operating System Security

Study into the Implications of Smartphone Operating System Security

Study into the Implications of Smartphone Operating System Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

<strong>Study</strong> <strong>into</strong> <strong>the</strong> implications <strong>of</strong> <strong>Smartphone</strong> operating system security<br />

Enforcing strong governance, <strong>the</strong>reby deterring internal employees from committing<br />

or colluding in fraud<br />

Implementing efficient and early fraud detection<br />

Continuously monitoring both internal and external entities<br />

Employing strong deterrents, including taking action against employees and legal<br />

proceedings against external fraudsters, both externally and internally, to minimise<br />

future frauds<br />

Blocking lost and stolen <strong>Smartphone</strong>s<br />

Lost and stolen <strong>Smartphone</strong>s are probably <strong>the</strong> biggest mobile phone security threat within<br />

<strong>the</strong> UK at <strong>the</strong> moment.<br />

If you can render that lost or stolen device useless once <strong>the</strong> customer has reported its loss<br />

<strong>the</strong>n that device can lose its resell value.<br />

MNOs have <strong>the</strong> ability to block stolen devices. All mobile phones, including <strong>Smartphone</strong>s,<br />

have a unique number called <strong>the</strong> IMEI. The GSMA maintains a global database <strong>of</strong> lost or<br />

stolen devices, a ‘blacklist’ using <strong>the</strong> IMEI as <strong>the</strong> unique identifier. This is called <strong>the</strong> GSMA<br />

IMEI DB. MNOs can access this database to check whe<strong>the</strong>r a device that is not on <strong>the</strong>ir own<br />

database has been blacklisted.<br />

MNOs can choose to operate <strong>the</strong>ir own database <strong>of</strong> lost and stolen database and this is<br />

commonly referred to as ‘Equipment Identity Registers (EIR)’. Operators have <strong>the</strong> option <strong>of</strong><br />

connecting <strong>the</strong>ir local EIR to <strong>the</strong> GSMA IMEI DB.<br />

Every time a <strong>Smartphone</strong> connects to <strong>the</strong> mobile network it will transmit its own unique IMEI<br />

number and during this process should check <strong>the</strong> EIR to verify whe<strong>the</strong>r <strong>the</strong> device has been<br />

blacklisted, e.g. is categorised as being lost or stolen. This is classified as having a mobile<br />

phone ‘blocked’. It is illegal and a criminal <strong>of</strong>fence in <strong>the</strong> UK to ‘unblock’ or <strong>of</strong>fer to ‘unlock’ a<br />

phone.<br />

If implemented and enforced correctly than this system for blocking lost and stolen<br />

<strong>Smartphone</strong>s <strong>of</strong>fers a serious countermeasure to <strong>the</strong> threat <strong>of</strong> lost and stolen <strong>Smartphone</strong>s.<br />

Consumer awareness<br />

Consumer awareness, in partnership with technology controls, is an important aspect in<br />

preventing and controlling threats to <strong>the</strong> security <strong>of</strong> <strong>Smartphone</strong>s.<br />

This section outlines some <strong>of</strong> <strong>the</strong> consumer awareness practices that are currently place in<br />

<strong>the</strong> UK.<br />

It is difficult to gauge <strong>the</strong> effectiveness <strong>of</strong> consumer awareness practices without carrying out<br />

very specific consumer market surveys.<br />

Goode Intelligence © 2013 P a g e | 96 www.goodeintelligence.com

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!