Mobile Device Security Threats

1184 WordsMay 26, 20135 Pages
Mobile device security Threats: Over the past two decades, we have witnessed significant technology advances in mobile devices, from the personal data assistants (PDAs) of the late 1990s and early 2000s to the ubiquitous and multifunctional smartphones of today. These advances have extended the virtual boundaries of the enterprise, blurring the lines between home and office and coworker and competitor by providing constant access to email, enabling new mobile business applications and allowing the access to, and storing of, sensitive company data. Mobile devices, such as smartphones and tablets, proliferate in today’s corporate environments. While there are significant opportunities to leverage these devices to increase the…show more content…
However, an attacker can easily bypass incorrect, insufficient or weakly implemented controls, thereby leveraging the internal network’s trust in the device. For example, BlackBerry devices supported by the appropriate version of BlackBerry Enterprise Server can act as modems for a laptop to access the intranet. This would bypass some device restrictions and allow a malicious user to attack the internal network from the much more functional platform of a PC. • Stolen or lost devices A fundamental problem of mobile devices is physical access control.By their design, mobile devices are most useful outside of the office and on the move with the owner. This presents several concerns for a security administrator, as the device on the move is more likely to. After going thru these threats, I personally recommend these solutions: • Network accessibility Commercial applications or custom-developed applications are used to connect to common services on the internal corporate network to test the availability of internal web servers, FTP servers, database servers and other critical infrastructure. These tests also establish connections to internal web applications that should be inaccessible to the device. The existing web browsers and proprietary web application testing tools are used to circumvent access controls. • Policy configuration With regard to policy configuration, the local device policies determine whether
Open Document