Title :
Best security practices for android, blackberry, and iOS
Author :
Oh, Tae ; Stackpole, Bill ; Cummins, Emily ; Gonzalez, Carlos ; Ramachandran, Rahul ; Lim, Shinyoung
Author_Institution :
Networking Security & Syst. Adm., Rochester Inst. of Technol., Rochester, NY, USA
Abstract :
Mobile operating systems have expanded from running exclusively on smartphones to include tablets and music players as well, making them available to a larger audience. These operating systems are responsible for maintaining a multitude of schedules, messages, calls, music, documents, applications, photos, videos, and other personal data with the goal of increasing efficiency. Because of this, developers of mobile operating systems have built in configuration options to these operating systems to better protect the device from security vulnerabilities. However, not all of these operating systems have such settings turned on when the device is pulled out of the box. Furthermore, not all users are aware of how to best protect their information, nor the kind of issues that should be considered when owning and using these devices. This paper suggests best practices for the three major mobile platforms - Android, BlackBerry, and iOS - to mitigate and/or prevent unauthorized access, loss of information, and loss of confidentiality.
Keywords :
mobile computing; operating systems (computers); security of data; smart phones; Android; BlackBerry; iOS; loss of confidentiality; loss of information; mobile operating systems; security practices; security vulnerabilities; smartphones; unauthorized access; Best practices; Bluetooth; Google; Mobile communication; Operating systems; Security; Smart phones; Android; BlackBerry; best practices; iOS; mobile devices; mobile operating systems; security;
Conference_Titel :
Enabling Technologies for Smartphone and Internet of Things (ETSIoT), 2012 First IEEE Workshop on
Conference_Location :
Seoul
Print_ISBN :
978-1-4673-2555-4
Electronic_ISBN :
978-1-4673-2556-1
DOI :
10.1109/ETSIoT.2012.6311252