Other mobile security protections are built into the network, such as strong encryption standards for data travelling across cellular networks. But perhaps no mobile security device is as powerful as an educated consumer who keeps his or her personal information protected and avoids downloading suspicious applications or clicking on booby-trapped links.
Keep reading to learn more about the magnitude of the mobile security threat and what you can do to protect your gadgets and your money. The sad truth is that there are people in this world who will exploit any security vulnerability if there's money behind the door. As mobile devices become mobile wallets, we are already seeing the rise of virtual pickpockets.
The good news is that, at least for the moment, mobile security is staying ahead of the hackers. The Internet has been widely used for 15 years, and over that time, computer security researchers and companies have devised a set of strong standards for locking out attackers. Most of these same standards have already been applied to mobile devices and data networks. Even with mobile security standards like encryption and passcodes, mobile device users need to be aware of common mobile security threats and how to defend themselves.
Keep reading for a rundown of the major mobile security threats and alerts. Malware continues to be the most dangerous threat to mobile device users. As we discussed on the previous page, malware is malicious software code that can steal sensitive information like passwords and account numbers, rack up charges on your phone bill, or spread itself through your address book like a virus. According to Web security firm Juniper Networks, malware attacks on mobile devices rose percent from to and percent from to [source: Juniper Networks].
Loss and theft are two serious security threats to mobile devices. As devices get smaller, they become easier and easier to lose. And the more we rely on these devices to send and store messages, access our bank accounts and conduct business, the greater the consequences if they fall into the wrong hands.
Two of the most effective mobile security measures are remote lock and remote wipe. Enterprise mobile security systems invariably include this feature, which allows a user or an IT administrator to lock the phone if lost, and even to wipe its entire memory remotely.
Many devices also include GPS tracking features to locate the phone or even activate "screaming" alarms that can be heard from the bottom of a user's laundry basket. Network security is less of a threat, since most communications over cellular data networks are strongly encrypted. One remaining threat is communicating over an unencrypted WiFi network. It's possible that a WiFi "sniffer" could be listening in on the traffic and trolling for useful information.
Other security threats are common to anyone who uses e-mail or the Web. In a phishing scam, for example, a hacker will send an email posing as a legitimate bank or business and ask for the user to enter his password or some other piece of sensitive account information. Several will warn you if you are about to visit a site known to host malware.
You can also adjust settings such as whether or not your browser will accept cookies or run Java applications. Disabling cookies , Java and other options will help keep your network safe but it will also affect your browsing experience.
You may not be able to interact with sites the way the webmaster intended if you turn off these options. Administrators of commercial computer networks sometimes rely on special software and hardware called intrusion detection systems IDS. These systems monitor data traffic across host computers and networks. A good IDS can compare this data against known malware patterns and alert the administrator if there's a problem. But that's a solution for a much larger computer network than your typical home network.
Most anti-virus software won't detect an intruder. But you might discover a malware application that makes intrusions possible. Run anti-virus software frequently to make sure your system is safe. You should also be sure to install updates and patches for your operating system as they become available. These patches may help seal up vulnerabilities on your computer. If you really want to be safe, you can disconnect your router or modem when you're not using it.
Hackers can't access your system if there's no connection. It's also a good idea to disconnect your network if you'll be out of town for more than a few days.
Setting up a secure network is one thing -- keeping it secure is another. All your hard work will go to waste if you aren't careful about how you use the Internet. But if you follow a few guidelines, you'll greatly reduce your chances of compromising your network's security. The first tip is to avoid clicking on hyperlinks in e-mail or instant messages, particularly if you don't recognize the name of the person sending it to you.
The link may lead you to a site hosting malware. It might even initiate a malware download. Tell your friends and family that you avoid clicking on hyperlinks unless you are sure they lead to a safe destination. Sometimes links on Web pages can also lead to malware. You might click on a link thinking you're going to one site when you're really going to another. Some malware designers will go so far as to create a copy of a legitimate Web page and use it to host their malware.
It's called spoofing. Fortunately, it's not that common -- most legitimate sites are quick to take action when they discover a spoofed version. If you want to make sure you're visiting the right Web site, you shouldn't rely on hyperlinks at all. The most reliable way to reach the site you want is to type the URL into your browser's address bar. Even this method isn't completely foolproof, but it's the most reliable way to make sure you go to the site you want to visit.
Another thing to watch out for are peer-to-peer services. These services allow you to download files hosted on other users' computers. Most of these services rely on users to share files. Usually, the service will create a shared folder. Any file within that folder is fair game -- other users of the service can download a copy of it.
If you aren't careful, you could allow unfettered access to all the files on your computer. If you store any private information on your machine, it might not be private for long.
As long as you're cautious when you set up a peer-to-peer service, you should be fine. Just keep in mind that by the very nature of the service, you'll be compromising your network's security.
It might seem like the tips we've shared in this article are excessive. But think about how important your personal information is to you. If someone else had access to that information, he or she could steal your identity. A malicious hacker could raid a banking account, ruin your credit rating or use your machines to attack a Web server or send out spam. While no network is ever percent immune to attack, following these tips will greatly reduce the risk of a security compromise.
Sign up for our Newsletter! To understand the Internet, it helps to look at it as a system with two main components. The first of those components is hardware.
That includes everything from the cables that carry terabits of information every second to the computer sitting in front of you. Other types of hardware that support the Internet include routers , servers , cell phone towers, satellites, radios, smartphones and other devices. All these devices together create the network of networks. The Internet is a malleable system -- it changes in little ways as elements join and leave networks around the world.
Some of those elements may stay fairly static and make up the backbone of the Internet. Others are more peripheral. These elements are connections. Some are end points -- the computer, smartphone or other device you're using to read this may count as one. We call those end points clients. Machines that store the information we seek on the Internet are servers. Other elements are nodes which serve as a connecting point along a route of traffic.
And then there are the transmission lines which can be physical, as in the case of cables and fiber optics, or they can be wireless signals from satellites, cell phone or 4G towers, or radios.
All of this hardware wouldn't create a network without the second component of the Internet: the protocols.
Protocols are sets of rules that machines follow to complete tasks. Without a common set of protocols that all machines connected to the Internet must follow, communication between devices couldn't happen. The various machines would be unable to understand one another or even send information in a meaningful way. The protocols provide both the method and a common language for machines to use to transmit data.
We'll take a closer look at protocols and how information travels across the Internet on the next page. You've probably heard of several protocols on the Internet.
For example, hypertext transfer protocol is what we use to view Web sites through a browser -- that's what the http at the front of any Web address stands for. If you've ever used an FTP server, you relied on the file transfer protocol. Protocols like these and dozens more create the framework within which all devices must operate to be part of the Internet.
What do these protocols do? At their most basic level, these protocols establish the rules for how information passes through the Internet. Without these rules, you would need direct connections to other computers to access the information they hold. You'd also need both your computer and the target computer to understand a common language.
You've probably heard of IP addresses. These addresses follow the Internet protocol. Each device connected to the Internet has an IP address. This is how one machine can find another through the massive network. The version of IP most of us use today is IPv4, which is based on a bit address system. There's one big problem with this system: We're running out of addresses.
The result was IPv6, a bit address system.
0コメント