We use cookies to give you the best experience possible. By continuing we’ll assume you’re on board with our cookie policy

Think Your Smartphone is Secure?

essay
The whole doc is available only for registered users

A limited time offer! Get a custom sample essay written according to your requirements urgent 3h delivery guaranteed

Order Now

1. What types of threats do smartphones face?

Based from the article I read, one of the threats being faced by smartphones is being hacked without the knowledge of users. Also, all of the personal and corporate data stored on the device could be sent through different remote servers, which are threats for smartphones. Additionally, another threat of smartphones is the user’s information may be taken without one’s permission especially the banking information.

2. Are there any particular vulnerabilities to this type of device?

One of the flaws to this type of device is security, because even though Apple and Google try to enhance their security, they could not avoid hacks and malwares among their apps. Since apps are softwares being used in smartphones, there could be many possibilities that this would be an avenue for hackers to place malwares to attack the users. To support my aforementioned statement, based from the article it was said that “apps are one avenue for security breaches.” I believe that smartphones would be much vulnerable when it comes to security.

3. What did Nicolas Seriot’s “Spyphone” prove?

Nicolas Seriot built an application for iOS users called “SpyPhone” which was capable of tracking users and all their activities, then, sending this data to different servers without the user (people) knowledge. The “SpyPhone” app proved that even smartphones are capable of being hacked and be inflicted with malicious software for as long as one is connected to the Internet.

4. Are apps more or less likely to be subject to threats than traditional PC software programs?

As of now, I believe that apps are more likely to be subject to threats than traditional PC software in the long run. It is because, today, people are diverting from the personal computer platform to the cellular platform. One can pay his or her bills through mobile devices or tablets. Another, one can book a flight using his or her mobile devices. Moreover, business transactions could be made through smartphones. Basically, having a smartphone is like having a personal computer at hand since they have the similar capabilities somehow. Then, hackers would try their best to make it to a point that they could hack anything especially the trends in technology used by people.

Related Topics

We can write a custom essay

According to Your Specific Requirements

Order an essay
icon
300+
Materials Daily
icon
100,000+ Subjects
2000+ Topics
icon
Free Plagiarism
Checker
icon
All Materials
are Cataloged Well

Sorry, but copying text is forbidden on this website. If you need this or any other sample, we can send it to you via email.

By clicking "SEND", you agree to our terms of service and privacy policy. We'll occasionally send you account related and promo emails.
Sorry, but only registered users have full access

How about getting this access
immediately?

Your Answer Is Very Helpful For Us
Thank You A Lot!

logo

Emma Taylor

online

Hi there!
Would you like to get such a paper?
How about getting a customized one?

Can't find What you were Looking for?

Get access to our huge, continuously updated knowledge base

The next update will be in:
14 : 59 : 59