9 May 2022

76

Cellphone: An Ultimate Security Threat

Format: APA

Academic level: University

Paper type: Research Paper

Words: 3103

Pages: 4

Downloads: 0

Americans have had a fascination with technology for many years. This attraction is evident in the 21st century as consumers in the United States are spending a lot of time with technology. First, there was the invention of the radio, followed by the telephone and the television, then the internet. In the present society, everyone is bewitched with cell-phones, for instance, smartphones, which highlights how the latest technology has attracted many customers (Roberts & Manolis, 2014). Smartphones have a combination of a variety of sophisticated features. It enables users to keep memories, pictures, correspondence, personal information, financial as well as health information in one place. Also, smartphones have become a fundamental part of contemporary communication facilities. In some locations of the Universe, they are considered to be the most reliable phones. They enable individuals to maintain ongoing communication without the hindrance of their movements as well as distances (Miakotko, 2010).

Cell phones have a critical role in our lives. They have become an essential part of our lives because they are portable. Nowadays, individuals are using cell phones for calling, texting, online shopping, doing assignments and online banking. These impressive features have made cell phones to become smartphones. Nonetheless, the enhancement of technology and significant usage of smartphones make them susceptible to security attacks. Most operating systems that we currently use lack antivirus software programs. Improving the privacy and safety our cell phones should be our primary concern since most mobile phone applications use the internet. The common threats on a smartphone’s security are malicious applications, physical threats, social engineering as well as unsafe operating systems.

It’s time to jumpstart your paper!

Delegate your assignment to our experts and they will do the rest.

Get custom essay

Business impact of the event

According to Schlesinger (2016), smartphones can be hacked easily without the user’s knowledge. Even if a vicious attacker cannot get access to your phone, they can attempt to gain access to sensitive information stored inside, including e-mails, contacts as well as the places visited. Attackers are attracted to services that smartphones depend on. Not only do criminals target cell phone consumers but also corporations. Hackers try to hack large organizations via vulnerabilities in phones. It is very rare that a security breach that came from a mobile phone or is just contained in the device to be identified by a corporation.

Shin (2016), acknowledges that if one has a cell phone and utilizes Yahoo Mail, Gmail, Dropbox, cloud, Twitter, Facebook and bank websites and many other web services, they are facing the risk of being hacked, having their finances stolen, having personal data exposed and being blackmailed. The only thing that a hacker needs to hack your phone is your cell number and using social engineering which helps the hacker to persuade a customer service representative that they are you. Presently, hackers have been blackmailing individuals with delicate information, stealing money, gaining access to private documents like passport numbers and tax returns or even embarrassing their targets.

When a cell phone is hacked, it brings devastating effects. If an employee’s phone of a large corporation is hacked, the organization will experience very bad effects. Hackers can gain access to internal company files by hacking an employee’s phone especially when the worker occupies a managerial position. They may also steal sensitive information about other workers in the company and use the information for wrongful purposes. The kind of information that a human resources department has is regularly very personal and could involve employee addresses, health information, financial account information and Social Security information (Bruemmer, 2015). When employee information is targeted, it can have considerable, long-term effect than merely a hijacked credit card number which can lead to fraudulent charges.

Loss of passwords as well as usernames is also a concern since this kind of information can be utilized to conquer authentication-based workarounds to get access to other private information. Moreover, when the phone of an employee working in a government agency is hacked, it can enable the hacker to develop a false ID to steal confidential government information, including secrets of trade and patents.

Smartphone hackers do not do anything to attract attention to themselves. Preferably, their programs are created to function in complete silence in the phone background. They also cover their tracks very well. There are no call logs placed to numbers that are overseas, no proof of texts sent that can consume a monthly bill. If hackers hack our cell phones, they will be able to send text messages and make the phones view videos since the hackers will have full access to our phones. The writers of mobile malware are also creating hybrid threats constructed to counterattack the security systems of online banking (Sullivan, 2013). In one well-planned attack, offenders hacked both a victim’s cell phone and computer, then snooped until an online banking transaction was started on the private network. When the bank sent a particular message as a security confirmation, the hackers intercepted them and validated the transactions. Following a report by a security firm named F-Secure, a malicious program known as Eurograbber is responsible for stealing $47 million from around thirty thousand bank accounts.

Threat vectors

According to Collett (2017), mobile phones are susceptible to malware attacks. Hackers are aware that most individuals are not utilizing adequate protection when it comes to the security of their smartphones. Cell phone malware is a malicious code that is created to target a mobile device. They interfere with the standard functions of cell phones like iOS, Android, as well as windows for many of reasons such as stealing personal information and illegal financial gain.

There are many kinds of malware available today. There are some that rely on the interaction of the user to execute, while others rely on bugs and other operating system vulnerabilities. A security research company called Check Point brought to light that thirty-eight android devices were infected by malicious software. These machines had never been exposed to users. Per their research, malware was already preinstalled on these cell phones (Goodin 2017). The malware was fixed somewhere along the supply chain.

Phishing attacks are also another threat vector. These attacks are deceitful phone calls, text messages, advertisements, e-mails, social media messages, and fraudulent software. These texts or e-mails look like they originate from a legitimate source like your manager, teacher, your bank or even the FBI (Felt, Finifter, Chin, Hanna, & Wagner, 2011). The hacker sends you a text or e-mail together with a malicious link. You are then asked to click on that link. The moment you click the link, the malicious code begins downloading on your cell phone.

The third threat vector is smishing attack. In smishing attacks, a criminal sends a text message along with malicious code to the user. These kinds of attacks are often bank related and have warning messages, for example, the bank has discovered a suspicious activity on your account, and you need to verify your account activity as soon as possible by clicking on a particular link. Once the mobile user clicks on the link, he or she is asked to fill out some forms asking for the address, name, birth date, and social security number. The link might as well begin downloading a malicious code on the device (Guo, Wang, & Zhu, 2008). These text messages have a sense of urgency and require prompt action, and that is the primary reason that mobile phone users fall into this scam.

According to Bradley (2017), location tracking application such as GPS can also pose a serious threat to users. These applications are beneficial because they can assist you in getting driving directions. Also, they can aid parent to know their children's’ locations. When it comes to emergencies, these applications can assist the police or other emergency services to track down your location and assist you. Nevertheless, location information can be very confidential and personal. Such kind of information can be utilized to come up with a record of an individual’s movements as well as whereabouts. If this information is disclosed, criminals can pinpoint an individual’s present or possible future location. Criminals can utilize this information to cause harm to a person like stalking him or breaking into his home while he is not at home.

Vulnerability

The first cell phone vulnerability is vulnerability to monitoring of your calls while using the phone. All mobile devices are radio transceivers. A person’s voice is transmitted via the air with the help of radio waves. These waves are not directional, but they scatter in all directions so that anybody with the appropriate radio receiver can listen in. Even though the law postulates penalties for the interception of phone calls, it is quickly done and difficult to detect. A hacker can quickly locate a target, mobile phone number, since transmissions are being dispersed in all directions to the cell site whenever the mobile device has enough battery power and can receive a call.

The second vulnerability is the vulnerability of a smart phone being used as a microphone for monitoring purposes (Tomlinson et al., 2009). This is carried out by broadcasting a support command on the control channel to the mobile phone. The command keeps the phone in the “diagnostic mode.” When this is finalized, calls in the immediate location of the device can be recorded over the voice channel. The user is not aware that the mobile phone is in the diagnostic mode and sending all nearby sound until she or he attempts to make a call. This threat is behind the reason while cell phones are not allowed in sectors where classified discussions are held.

The third vulnerability is vulnerability to cloning. Mobile phone thieves observe the radio frequency spectrum and rob the portable phone pair since it is anonymously certified with a cell site. Cloning is whereby a thief hijacks the mobile identification number (MIN) as well as the electronic serial number (ESN) and programs these numbers into another mobile device to make it similar to yours. Immediately a phone is cloned, the thief can make calls on the reprogrammed cell phone as if he were the legal subscriber.

Incident response actions were taken

According to Newman (2017), the former head of Homeland Security and present chief of staff, John Kelly, used his cell phone that was hacked for months. The data breach was apparently detected over the summer when John Kelly handed over his cellphone to White House tech experts after experiencing problems with it and battling to prosperously run software updates. The hackers could have gained access to Kelly’s phone by tricking him into downloading an application that was malicious. Phishing attachments and links also pose a fixed threat. Regardless of the method used to hack Kelly’s phone, his information was definitely at risk. Hackers could have utilized a central logger to track his every input. Also, they would possibly have access to his physical location via phone ID data as well as GPS. In case he stored any sensitive or confidential files on his phone, they would have been exposed. Tracy, (2017) says that the identification of the hack raised concerns among President Donald trump’s staffers, particularly given that it corresponds with an e-mail scandal in the West Wing that raised its queries.

Recommended mitigations

It is vital for individuals to secure their phones from unauthorized users. The following steps can be taken to protect your smartphone.

Use a passcode: Using passcodes is imperative when using cell phones. You can lock your phone with a password, pin code, pattern or biometric login to avoid unauthorized access. The passwords should also be strong enough and not merely simple words that can be easily identified.

Taking the necessary cautions when using public Wi-Fi networks: Individuals should be extra careful when using public Wi-Fi networks as they pose security risks. Most public networks are not encrypted.They are open to the public, and a password is not required. Hackers can trace all the data you send and receive while using these networks. It is advisable to use cellular or home networks while doing online shopping or banking.

Clean up your applications: Cleaning up your phone and deleting applications that you do not use is essential. The threat is that outdated app versions could be running in the phone background exposing you to hacking without you noticing it. Additionally, it is vital to update your remaining apps as most application updates have security fixes. Furthermore, log out of applications that hold sensitive information when you have finished using them.

Issues

As tablets and mobile devices become constant companions, hackers are seeing every channel available to hack into them. The population expects that Android or iPhone devices are protected by default when in reality it is up to the mobile phone users to upgrade the security configuration to make the device more secure. The main issue observed in the use of cellphones is hacking which has become a significant security threat because it threatens the privacy of users (O'Leary et al., 2017). Hackers can quickly gain access to a mobile device with the right equipment, and they can easily see every information on the device or decide to install malware that will allow them to siphon data from it at their convenient time.

The types and nature of cyber-attacks are progressing rapidly, and cellphones have become a vital part of company cybersecurity efforts with a satisfying reason. According to O'Leary, et al. (2017), a research firm by the name Gartner has made predictions that by 2021, twenty-seven percent of company information traffic will outflank perimeter security, and will flow directly from cellphones as well as portable devices to the cloud. Security officers are finding that the propagation of cloud services together with smartphones present a considerable barrier to efficient breach response. The five security risks that cellphones face are physical access, malicious code, device attacks, communication interception, and insider threats.

Physical access: Due to the portable nature of mobile devices, they have become appropriate travel companions for human beings. Also, they are easy to steal or left behind in cabs or airports. Not even the best anti-virus software or intrusion-detection system can stop a malicious individual with physical access from acquiring information from the device. An individual with physical access can easily access encrypted data and confidential information. Making matters worse, full removal of information is not likely using a phone’s built-in factory reset or by flashing the operating system. Data can be recovered from mobile devices even after the device has gone through a reset or manually deleted with the help of forensic data retrieval software. The general public can access the software.

Malicious Code: Malware threats are socially engineered and concentrate on tricking the cellphone user into obtaining what the hacker is selling. The codes include spam, rogue applications as well as detrimental links on social networks. Also, mobile ads are being used as attacks on cell phones.

Device Attacks: Exploitations of buffer overflow, browser-based attacks, and other attacks are likely on mobile devices. The multimedia message service (MMS) and the short message service (SMS) provided on cellphones provide more channels to hackers (O'Leary, et al., 2017). Device attacks are mostly designed to either acquire device control and access information or to try a distributed denial of service (DDoS) (O'Leary, et al., 2017).

Communication Interception: Smartphones that are Wi-Fi-enabled are prone to similar attacks that impact other Wi-F-capable devices. Many individuals can access the technology to hack into wireless networks. Thus, Wi-Fi hacking is easy to perform. Also, the transmission of cellular data can be intercepted as well as decrypted (O'Leary, et al., 2017). Hackers can identify weaknesses in these cellular and Wi-Fi protocols to eavesdrop on the transmission of data, or to seize control of the sessions of users for online services such as web-based email.

Insider Threats: Cellphones can also aid threats from workers and other insiders. Many employees do not have the time or knowledge to track whether or not their mobile phones have up to date security software installed. Unintentional threats can also be brought about by the downloading of applications. Most people download apps from app stores and utilize mobile apps that can access organization assets without any clue of who created the application or whether there is a threat vector. The misuse of individual cloud services via mobile apps is another issue. When utilized to convey company data, these applications can result in information leaks that the company remains completely unaware of.

Research Data

Mobile devices can be hacked easily without the knowledge of the user. Even if a malicious attacker cannot access your device, they can strive to acquire access to sensitive or confidential information stored inside, including contacts, e-mails, and locations visited. Malicious individuals are attracted to services that cell phones depend on. Not only do they target mobile phone consumers but also large enterprises (Schlesinger, 2016). Hackers attempt to hack organizations via vulnerabilities in phones. It is tough for a security breach that came from a mobile device to be pinpointed by a corporation.

If one has a smartphone and utilizes Yahoo Mail, Gmail, Dropbox, Twitter, Cloud, as well as bank websites and many other web services, they are at a risk of being hacked, having their finances and savings are stolen, having personal information exposed and being blackmailed. (Shin, 2016)A hacker only needs your cell number and social engineering to hack your phone. Social engineering aids the intruder to persuade a customer service representative that they are you. Presently, hackers have been blackmailing people with delicate data, stealing money, acquiring access to private documents like passport numbers and tax returns or even embarrassing their targets.

Analysis

Even though cell phones have become an integral part of the life of human beings because they enable users to keep memories, pictures, correspondence, personal information, financial as well as health information in one place, they have also become a security threat to individuals. According to Collett (2017), a survey conducted on twenty companies by Dimensional Research for Check Point Software admitted that their mobile devices had suffered a security breach. A quarter of the participants were not even aware that their cellphones had been hacked. Almost all participants expected the frequency of smartphone attacks to rise and they recognized that it is becoming harder to protect mobile devices.

Cellphones had also proven to be an ultimate security threat when the phone of the present Chief of staff, John Kelly was hacked. Kelly’s confidential information was definitely at risk because of the hack. In case he stored any sensitive files on his phone, they would have been exposed. Also, in September 2014, hackers managed to hack the online accounts of the cellphones of more than 100 celebrities. Private information of the stars was leaked to the internet including nude photos. Through the hack, the intruders were able to gain access to controversial images hence threatening the privacy of the celebrities. A number of the stars threatened to take legal action against any individual who posted controversial pictures of them on the web. Hacking incidents have raised some legal, ethical and social issues impacting cellphone use. The primary concern is privacy. Hacking violates the privacy of the phone user when confidential data is exposed. Cybersecurity is also another issue. People are worried if the personal data stored in their cellphones or a storage device space are secure enough.

Although cell phones are useful, they also threaten our privacy in case of hacking. Improving the privacy and safety of our mobile devices should be our primary concern since most phone applications use the internet.

In a nutshell, cell phones have become an integral part of the life of human beings. Many people depend on them for a variety of functions since they have proven to be quite useful. Even though cell phones are beneficial to us, they are also an ultimate security threat. They pose serious security threats. The common risks on a smartphone’s security are malicious applications, physical threats, social engineering as well as unsafe operating systems. Many individuals fail to take the necessary measures to protect their phones from unauthorized users which makes them vulnerable to hacking. Hackers can gain access to confidential and sensitive information which can be quite damaging. Therefore, it is essential for mobile phone users to improve the privacy as well as the safety of their devices to safeguard sensitive data. Securing our phones with passcodes, cleaning up applications and being cautious when using public Wi-Fi networks is very important. Furthermore, the security threat of cell phones is an ethical issue because it violates the privacy of the user when the hacker gets access to private information. Also, the population is concerned if data stored in their phones or storage devices are secure enough.

References

Bradley, T. (2015, January 16). Location tracking in mobile apps is putting users at risk.  

Retrieved from h ttps://www.csoonline.com/article/2871933/mobile-security/location-t racking-in-mobile-apps-is-putting-users-at-risk.html

Bruemmer, M. (2015, August 25). news/a/what-if-you-had-an-employee-data-breach/# . Retrieved from https://iapp.org: https://iapp.org/news/a/what-if-you-had-an-employee-data-breach/#

Collett, S (2017, August 1). Five new threats to your mobile security . Retrieved from https://www.csoonline.com/article/2157785/data-protection/five-new-threats-to-your-mobile-security.html

Goodin, D (2017, March 10). Malware found preinstalled on 38 android phones used by 2 Companies . Retrieved from https://arstechnica.com : h ttps://arstechnica.com/information-t echnology/2017/03/preinstalled-malware-targets-android-users-of-two-companies/ 

Miakotko, L. (2010). The impact of smartphones and mobile devices on human health and life. 2.

Newman, L. H. (2017, June 10). story/john-kelly-hacked-phone/ . Retrieved from https://www.wired.com: https://www.wired.com/story/john-kelly-hacked-phone/

O'Leary, D., Zimmermann, R., Grahn, A., Poarch, D., Cook, M., & Pirc, J. (2017). articles/55/Mobile-Device-Security-in-the-Workplace-5-Key-Risks-and-a-Surprising-Challenge . Retrieved from http://focus.forsythe.com: http://focus.forsythe.com/articles/55/Mobile-Device-Security-in-the-Workplace-5-Key-Risks-and-a-Surprising-Challenge

Roberts, J. A., & Manolis, C. (2014). The invisible addiction: Cell-phone activities and addiction among male and female college students. Journal of Behavioral Addictions , 254-265.

Schlesinger, J. (2016, June 17). 2016/06/17/your-smartphone-could-be-hacked-without-your-knowledge.html . Retrieved from https://www.cnbc.com: https://www.cnbc.com/2016/06/17/your-smartphone-could-be-hacked-without-your-knowledge.html

Shin, L. (2016, December 2016). sites/laurashin/2016/12/21/hackers-are-hijacking-phone-numbers-and-breaking-into-email-and-bank-accounts-how-to-protect-yourself/#1269ec11360f . Retrieved from https://www.forbes.com: https://www.forbes.com/sites/laurashin/2016/12/21/hackers-are-hijacking-phone-numbers-and-breaking-into-email-and-bank-accounts-how-to-protect-yourself/#1269ec11360f

Sullivan, B. (2013, March 21). technology/smartphone-hacking-comes-age-hitting-usvictims-1C8989252 . Retrieved from https://www.nbcnews.com: https://www.nbcnews.com/technology/smartphone-hacking-comes-age-hitting-usvictims-1C8989252

Tomlinson, M., Solomon, W., Singh, Y., Dohetry, T., Chopra, M., Ijumba, P. Jackson, D. (2009). The use of mobile phones as a data collection tool: A report from a household survey in South Africa. BMC Medical Informatics and Decision Making .

Tracy, A. (2017, October 5). news/2017/10/john-kelly-cell-phone-hacked . Retrieved from https://www.vanityfair.com: https://www.vanityfair.com/news/2017/10/john-kelly-cell-phone-hacked

Illustration
Cite this page

Select style:

Reference

StudyBounty. (2023, September 14). Cellphone: An Ultimate Security Threat.
https://studybounty.com/54763-cellphone-an-ultimate-security-threat-research-paper

illustration

Related essays

We post free essay examples for college on a regular basis. Stay in the know!

17 Sep 2023
Technology

Implementation Roadmap

AT&T is a telecommunication company that has a platform for selling phones and provision of internet and other services. Implementation of big data analytics in the company requires the completion of a particular...

Words: 545

Pages: 2

Views: 69

17 Sep 2023
Technology

Big Data in Fraud Detection: How It is Used and What to Expect

Chameleon Carriers The replication of trucking companies and trucks under different business names has grown rampant, as the Federal Motor Carrier Safety Administration (FMCSA) program reports. A large...

Words: 508

Pages: 2

Views: 436

17 Sep 2023
Technology

The 5G Networks: How They Work, and What They Mean for the Future

The world of technology is rapidly developing with the reliance of the internet at its core. 4G has been the primary platform of the internet but based on the slow speed, and the high dependence of technology has led...

Words: 284

Pages: 1

Views: 111

17 Sep 2023
Technology

How to Write a Successful Business Case

A successful business case is based on a need. One of the most disturbing problems in the health sector is cybercrime. We intend to develop a strategy that will leverage IT-based techniques and measures to reduce...

Words: 263

Pages: 1

Views: 62

17 Sep 2023
Technology

The 5nm Transistor: The Future of Computing

The November 16th, 1904 invention of the vacuum tube was the humble beginning of the modern-day transistor. The first working transistors were developed at Bell Labs by William Shockley, John Bardeen, and Walter...

Words: 2221

Pages: 4

Views: 55

17 Sep 2023
Technology

Wireless Communication Technologies

Wireless communication taken analogically simply refers to the channel of telephony communication that does not apply the use of wires (Bose, 2010) . Such a channel makes use of electromagnetic waves available in the...

Words: 1046

Pages: 4

Views: 158

illustration

Running out of time?

Entrust your assignment to proficient writers and receive TOP-quality paper before the deadline is over.

Illustration