1 hour 1 minute
welcome tune and user mobile security course. And in this listen, I'm going to talk about importance of mobile security.
So first of all, let's talk about what is considered to be a mobile device on the first place. It's a mobile phone because almost everybody owns it, and we have all kind of mobile phones we have. The majority is based on Android operating system and your worldwide.
You have Apple mobile phones. You still have some phones in there in use that are based on Windows Mobile.
They're slightly slowly fading away,
and there are some new operating system popping up now and then. But majority of what we have today and what I'm going to talk about in this course is android and ah, IOS or Apple's mobile phones.
Then we have tablets and tablets come in all shapes and sizes and ah, and operating systems as well. So we have Windows tablets. We have ah and, uh, android tablets. We even have ah, home OS tablets.
And of course, we have tablets based on
Apple's operating system. So and those three basically run the show. So
so there are differences in security approaches for each of these are braking systems, regardless off. If your tablet has a keyboard or doesn't attachable keyboard, it really doesn't matter.
Ah, and of course, we have no book PCs
and notebook PC's when you look it from a business perspective, they comprise the majority off devices in which date a stored and which are essentially being attacked to extract data. Of course, you can extract mobile phones to extract
attack mobile phones to extract, for example, passwords for e banking. Because people used mobile phones to pay
their bills on, they can have access to their money
on what is important and wise. Aled. This talk about mobile device security is so important
is that when you look at the recent data for 2019
that's the PC's represent only 22.6% of computing device sales. Now, when you look at historical data, it wasn't so low just a couple of years ago. So when you little get to the number of devices used today, desktop PC's are still
important part off what is in use for, especially for business purposes. But
the trend is going towards mobile devices, and if you're looking at the company knee level or corporate level users. Even if they're using pieces, they're most likely getting a Snoopy. See. An old book is, except for some
very specific situations, like if you're working on a counter, if you're teller in a bank, then you will have ah, desktop PC. Otherwise, if you're some kind off individual contributors or just the manager, but in a major contributor in the company, that's doing
whatever and you will probably get a noble cause. Is your work PC
if not for any other reason, so that you can work from home?
So why security of mobile devices so important? And, um,
like I said,
it is there being used more and more,
and, uh, because they're being used more and more and absolutely every location in the plant on the planet, it is more and more difficult to track them and to secure them.
Then that's the PC's.
So when you look all of these devices,
uh, you see, the people are you know, the business is getting faster and you work for many
and you're connecting to unsecure public networks all the time, So this is a huge risk
whether you have a mobile phone. Whether you have ah, notebook, whether you have a tablet,
it is always easy. And of course, jeepers. So you're saving money if you're connecting to WiFi instead of using your mobile plan,
especially if you're using get a lot.
So this is what people are doing,
and the main reason is wise. Security of mobile devices so important is because of mobile devices are more and more being used for security breaches by cyber criminals. This is very important.
So these people are essentially,
uh, looking at the weakest link seen in I t chain in the company,
and you create very weakling when you connect to on secure public for just to read your mail.
it's a different approach when somebody wants to take you on a mobile device. Not so much about what type of devices, mobile phone or a tablet or notebook, but what
operating system are you using?
So android devices today are by definition, most vulnerable. Of course, there are anti virus programs, anti malware programs for android.
But the way that android is an operating system was conceived from Start is that it wasn't very secure. Of course, Google is working on making it more secure. But still it has Bean confirmed in practice that these things are really, really open.
No, I always devices, or Apple's devices are little harder toe hack,
and they're not safe.
The fact that you are basically able to, uh, install laps only from Apple Store makes it a little bit more secure, but
not really so. If you're it just takes more time to crack Apple phone, for example, than Android. For
now, Windows based notebooks and tablets, they can be very secure as Windows is ah, main operating system, used by big corporations by big banks, even government institutions in security services. So they have found a way to
secure these devices. It doesn't mean that if you own a PC or automatically secure,
because quite a lot of things have to be done in order to make your mobile device like no book secure
and of course, hacking approach also difference depending on the type of device. So there are some things that you can use to, For example, hack mobile phones, which connect to mobile network, then that you cannot use when you are trying to hack a notebook because
it's not using mobile network, so
there is one less channel toe
So I hope you have learned about importance off
mobile devices on Duh. What you
I have learned in this lesson is what constitutes is more, well, the rice
wise mobile devices the security so important. So
because they're used everywhere, it is difficult to control the communication channel they're using, and therefore they're more much more prone to attacks than
the stop or species that are located only in the company building or your home.
And you have learned some details about how hacking off mobile devices can differ depending on the type off operating system used and also depending on a different type of device you're using.
End User Cyber Fundamentals
This End User Cyber Fundamentals course covers Internet risks such as typosquatting, website spoofing, drive-by ...
2 CEU/CPE Hours Available
Certificate of Completion Offered
Android Development Fundamentals
Android users dominate the mobile market, so the demand for Android developers is high. This ...
4 CEU/CPE Hours Available
Certificate of Completion Offered