Академический Документы
Профессиональный Документы
Культура Документы
Ujas Patel
L.D.College of Engineering Ahmedabad
Cell-Phone Virus
INTRODUCTION
A cell-phone virus is basically the same thing as a computer virus an unwanted executable file that
"infects" a device and then copies itself to other devices. The most common type of cell- phone infection right now occurs when a cell phone downloads an infected file from a PC or the Internet, but phone-to-phone viruses are on the rise.
SPREADING OF VIRUS
These viruses spread primarily in three ways:
1. Internet downloads 2. Bluetooth wireless
3. Multimedia Messaging
VIRUS ACTIONS
subsequently, the virus could do damage by either deleting or modifying the phone book, or by starting to make phone calls to pay-per-minute
numbers.
new platform just is able to say they were the first to write a virus for this platform.
A cell-phone virus or worm spreads via Internet downloads, MMS (multimedia messaging service)
MOBILE (IN)SECURITY
1. SW Architecture
At the top level, the SW architecture provides a generic interface using which security protocols and applications can be ported to the platform. The design of each SW layer can proceed concurrently, leading to drastic reductions in design times. Custom instructions can be developed for the basic operations layer without waiting for the SW implementation of higher layers to become available.
1. HW Platform Architecture
The added instructions are executed by custom hardware, which is tightly integrated into the processor execution pipeline.
Developers Responsibility
Mobile application developers must learn how best to manage mobile application security risks
1. Limited memory and CPU
Knowing the risks and how to respond to them is the only hope for creating secure software
WAP SECURITY
In case of WAP security ,From the outset, vendors of mobile phones and WAP servers have ensured that much consideration was given to
confidentiality and privacy issues for WAP data, as well as to user authentication. Add this to the fact that data integrity checking has been taken into account, and one could be forgiven for thinking that the WAP infrastructure WAS already secure enough.
phone, as long as they have access to your phone even for a few minutes Subtle signs that could suggest someone is secretly tapping your cell phone
Cell phone battery is warm even when your phone has not
been used
Cell phone lights up at unexpected times, including
Avoid Cell Phone Viruses and Security Troubles by Taking Simple Precautions
CONCLUSION
Install some type of security software on your phone.
Numerous companies are developing security software for cell phones, some for free download, some for user purchase and some intended for cell-phone service providers.
Never open anything if you don't know what it is, haven't
requested it or have any suspicions whatsoever that it's not what it claims to be.
THANK YOU