Mobile Device Security Important?

Download as pdf or txt
Download as pdf or txt
You are on page 1of 5

Unit V:

Mobile Commerce Technology & Security:

Mobile Information Devices,


A mobile device can be any mobile computer or a variety of other electronic devices that have portable
functionality. Typical examples include smartphones, tablets, laptop computers, smart watches, e-readers, and
handheld gaming consoles
the most common examples of mobile devices are tablets, smartphones and e-readers.

Web Security Introduction to Web security,


Mobile Device Security?
Mobile Device Security refers to the measures designed to protect sensitive information stored on and transmitted
by laptops, smartphones, tablets, wearables, and other portable devices. At the root of mobile device security is the
goal of keeping unauthorized users from accessing the enterprise network. It is one aspect of a complete enterprise
security plan.

Mobile Device Security important?


With more than half of business PCs now mobile, portable devices present distinct challenges to network security,
which must account for all of the locations and uses that employees require of the company network. Potential
threats to devices include malicious mobile apps, phishing scams, data leakage, spyware, and unsecure Wi-Fi
networks. On top of that, enterprises have to account for the possibility of an employee losing a mobile device or
the device being stolen. To avoid a security breach, companies should take clear, preventative steps to reduce the
risk.
THE BENEFITS OF MOBILE DEVICE SECURITY?
Mobile device security, or mobile device management, provides the following:
 Regulatory compliance
 Security policy enforcement
 Support of “bring your own device” (BYOD)
 Remote control of device updates
 Application control
 Automated device registration
 Data backup
Above all, mobile device security protects an enterprise from unknown or malicious outsiders being able to access
sensitive company data.
How does Mobile Device Security work?
Securing mobile devices requires a multi-layered approach and investment in enterprise solutions. While there are
key elements to mobile device security, each organization needs to find what best fits its network.

To get started, here are some mobile security best practices:


Establish, share, and enforce clear policies and processes
Mobile device rules are only as effective as a company’s ability to properly communicate those policies to
employees. Mobile device security should include clear rules about:

What devices can be used


 Allowed OS levels
 What the company can and cannot access on a personal phone
 Whether IT can remote wipe a device
 Password requirements and frequency for updating passwords
Password protection
One of the most basic ways to prevent unauthorized access to a mobile device is to create a strong password, and
yet weak passwords are still a persistent problem that contributes to the majority of data hacks. Another common
security problem is workers using the same password for their mobile device, email, and every work-related
account. It is critical that employees create strong, unique passwords (of at least eight characters) and create
different passwords for different accounts.

Leverage biometrics
Instead of relying on traditional methods of mobile access security, such as passwords, some companies are looking
to biometrics as a safer alternative. Biometric authentication is when a computer uses measurable biological
characteristics, such as face, fingerprint, voice, or iris recognition for identification and access. Multiple biometric
authentication methods are now available on smartphones and are easy for workers to set up and use.

Avoid public Wi-Fi


A mobile device is only as secure as the network through which it transmits data. Companies need to educate
employees about the dangers of using public Wi-Fi networks, which are vulnerable to attacks from hackers who
can easily breach a device, access the network, and steal data. The best defense is to encourage smart user behavior
and prohibit the use of open Wi-Fi networks, no matter the convenience.

Beware of apps
Malicious apps are some of the fastest growing threats to mobile devices. When an employee unknowingly
downloads one, either for work or personal reasons, it provides unauthorized access to the company’s network and
data. To combat this rising threat, companies have two options: instruct employees about the dangers of
downloading unapproved apps, or ban employees from downloading certain apps on their phones altogether.

MOBILE DEVICE ENCRYPTION:


Most mobile devices are bundled with a built-in encryption feature. Users need to locate this feature on their device
and enter a password to encrypt their device. With this method, data is converted into a code that can only be
accessed by authorized users. This is important in case of theft, and it prevents unauthorized access.

TYPES OF MOBILE DEVICE SECURITY


There are many aspects to a complete security plan. Common elements of a mobile security solution include the
following:

ENTERPRISE MOBILE MANAGEMENT PLATFORM: In addition to setting up internal device


policies that protect against unauthorized access, it’s equally important to have an Enterprise Mobile Management
(EMM) platform that enables IT to gather real-time insights to catch potential threats.

EMAIL SECURITY: Email is the most popular way for hackers to spread ransomware and other malware. To
combat such attacks, it’s critical for businesses to be armed with advanced email security that can detect, block, and
address threats faster; prevent any data loss; and protect important information in transit with end-to-end
encryption.

ENDPOINT PROTECTION: This approach protects enterprise networks that are remotely accessed by
mobile devices. Endpoint security protects companies by ensuring that portable devices follow security standards
and by quickly alerting security teams of detected threats before they can do damage. Endpoint protection also
allows IT administrators to monitor operation functions and data backup strategies.

VPN: A virtual private network, or VPN, extends a private network across a public network. This enables users to
send and receive data across shared or public networks as if their computing devices were directly connected to the
private network. VPNs’ encryption technology allows remote users and branch offices to securely access corporate
applications and resources.

SECURE WEB GATEWAY: A secure web gateway protects against online security threats by enforcing
company security policies and defending against phishing and malware in real-time. This is especially important
for cloud security as this type of protection can identify an attack on one location and immediately stop it at other
branches.

CLOUD ACCESS SECURITY BROKER: A cloud access security broker (CASB) is a tool that sits between
cloud service consumers and cloud service providers to enforce security, compliance, and governance policies for
cloud applications. CASBs help organizations extend the security controls of their on-premises infrastructure to the
cloud.
Firewalls & Transaction Security,
Firewalls are an important tool for data protection on traditional desktops and mobile endpoints alike.

A firewall is firmware or software that can manage the inbound and outbound traffic of a network or device. It
provides end-user devices with an added layer of security that contains rules about what traffic is allowed to flow in
and out.
In homes and businesses, firewalls block any unwanted incoming traffic from hackers attempting to infiltrate the
network or take advantage of open ports or known vulnerabilities in an internet-connected device. But as more
users rely on mobile devices and connect to public Wi-Fi and networks, adopting a mobile firewall to safeguard
devices is increasingly important as a first line of defense against cyber attacks.

As the popularity of remote work increases, so do the security risks that come with connecting to insecure networks
where hackers are lurking. When a mobile device connects to a compromised network, hackers may be able to
capture the device's incoming or outgoing traffic. Penetration testing tools such as those available in the Kali Linux
distribution provide hackers with an easy way to execute Wi-Fi attacks. They can pose as legitimate public
networks, and when a victim connects to one, all traffic can be routed to the attacker. In turn, the attacker can
analyze all the traffic to harvest private data such as web traffic, passwords and other sensitive company
information.
How do mobile firewalls work?
A mobile firewall eliminates some attacks that come from the network-based threats that a mobile device is
susceptible to. It works like a traditional hardware firewall, but in this case, it is on a mobile device, which can
connect to cellular networks as well as Wi-Fi. Using an application installed on the device, a mobile firewall
manages the flow of traffic in and out of a mobile device. It offers much of the same functionality that desktop and
server-based firewalls provide; the difference is that it runs on mobile devices and is much simpler to manage and
configure. A firewall app can also ensure that any connection made to a company's network or other services that
host private data is secure by using a virtual private network (VPN) feature
App-based mobile firewalls commonly offer the following features:
 web filtering capabilities that can block some content that may be malicious or undesirable;
 ability to block all incoming traffic and any attempt to exploit known device or mobile OS vulnerability;
 automatic VPN to allow the mobile device to connect and transmit information securely;
 ability to block known threats such as malware and other malicious attacks;
 internet traffic controls to manage and implement browsing policies;
 ability to stop data use as part of any data usage limitation;
 custom internet rules relating to the type of traffic allowed to flow in and out;
 app traffic controls to block streaming or unwanted app use;
 ability to block spam or phishing links from email and SMS; and
 traffic monitoring and reporting.

4 MOBILE FIREWALL APPLICATIONS FOR BUSINESS


When considering firewall protection to secure mobile data within organizations, IT administrators can choose
from a variety of products available in the marketplace today. Factors to keep in mind when examining these
options include which OSes the apps run on and whether they offer additional data privacy features.

AFWall+
This Android-based app allows IT teams and users to restrict which applications can access a company's network. It
can control any traffic flowing, regardless of which type of network it originates from. IT can use the app to
manage rules around any external storage within the device and support multiple profiles, including Work, Home
and other desired user configurations. AFWall+ also can send notifications of new app installations.

NetProtector Firewall
This firewall app works in a similar fashion to some of the other popular firewalls in the Google Play store,
offering IT teams control of the outbound and inbound traffic to all their apps and supporting Wi-Fi or cellular
connection for each app. It also supports VPN connections, manages data usage and blocks any unwanted incoming
traffic to the device.

Guardian Firewall + VPN


Guardian is a popular firewall app for iOS devices. The app blocks malicious IPs and websites, in addition to
stopping undesired apps from collecting personal information. It can also notify users of any attempt by services or
apps to make unwanted connections. The firewall functionality can block all unwanted connections to location
trackers and offers IP masking to hide the identity of the device as well.

ZoneAlarm Mobile Security


An option for both Android and iOS devices, ZoneAlarm Mobile Security delivers comprehensive security
software that protects against advanced cyber attacks. With a heavy focus on protecting personal data, the app can
block internet attacks and offers zero-day phishing protection to keep credentials safe while users browse the
internet. The app can validate every link a user opens in real time against Check Point ThreatCloud, which tracks
when a specific URL may be malicious.

Client Server Network,

Emerging Client Server Security Threats,


Use of firewalls & Network Security for Mobile Commerce.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy