36.1k views
2 votes
Mobile apps are often the cause of unintentional data leakage. As noted by eSecurity Planet, for example, "riskware" apps pose a real problem for mobile users, who give them sweeping permissions, but don’t always check security. These are typically free apps found in official app stores that perform as advertised, but also send personal—and potentially corporate—data to a remote server, where it is mined by advertisers or even cybercriminals.

Data leakage can also happen through hostile enterprise-signed mobile apps. Here, mobile malware uses distribution code native to popular mobile operating systems like iOS and Android to spread valuable data across corporate networks without raising red flags. To avoiding these problem only give apps permissions they absolutely insist on, and forgo any program that asks for more than necessary.

Task1:

Assess mobile devices and develop a report for the list of threat, privacy, security issues and concerns related to mobile devices

Example:

1) Data Leakage

2) Unsecured Wi-Fi

3) Network Spoofing

4) Phishing Attacks

5) Spyware

6) Broken Cryptography

7) Improper Session Handling

User Domondo
by
7.1k points

1 Answer

5 votes

Final answer:

Mobile devices face various threats and security concerns such as data leakage, unsecured Wi-Fi, phishing attacks, spyware, broken cryptography, network spoofing, and improper session handling.

Step-by-step explanation:

The list of threat, privacy, security issues, and concerns related to mobile devices include:

  1. Data Leakage: When personal or corporate data is sent to a remote server without the user's knowledge or consent.
  2. Unsecured Wi-Fi: Connecting to unsecured Wi-Fi networks can make the device vulnerable to attacks and data interception.
  3. Network Spoofing: Attackers can create fake networks to intercept data and gain unauthorized access to a device.
  4. Phishing Attacks: Fraudulent emails or messages that trick users into revealing sensitive information or downloading malware.
  5. Spyware: Software that collects information about a user's activities without their knowledge.
  6. Broken Cryptography: Weak encryption algorithms or implementation that can be exploited to decrypt sensitive data.
  7. Improper Session Handling: Poor management of user sessions can lead to unauthorized access or session hijacking.

User Feniix
by
7.8k points