User:K Kadar MGCR331

Viruses and Security Threats for Mobile Devices'''

The biggest growth area in the telecommunications market is the Mobile e-commerce (m-commerce) believed by commentators. telecommunications is being driven rapidly towards this goal. It can be used by mobile phones or cell phones, PDA or a Smartphone. Mobile Commerce can be any transaction involving the transfer of softcopy goods and services is done using the mobile technology and a service provider. During these transactions many security threats can accrued.

Transactions with the Mobile devices The Mobile device along with access to via the internet can be most convenient. It can allow you access to infinite amount of information such as weather, stocks, sports scores, emails, IM and access websites. Some of the products and services you can use via mobile devices and internet is Mobile ticketing which can be sent to mobile phones using a variety of technologies. By representing it to the venue you can immediately gain access To your desire event You can also booked and cancelled on the mobile. Ticketing for airports, ballparks, and train stations can also be done.

Mobile banking

The Idea of M-commerce is being explored by banks as well as other financial institutions. A great innovation  that mobile devices via internet ( M-commerce ) can do for more convenience  is mobile banking. Customers from the bank can not only access account information but also make transactions. Such as stocks purchasing remitting money, mobile banking is what its called. But it has its security issues such as ID theft, phishing and pharming

Security issues

The core concept of E-commerce is a commercial transaction between two parties carried out by electronic means which can be done over the Mobile devices. For example over my mobile I would like to purchase a song from Much music’s website. It can involve anything from a few cents to thousands of dollars in value. But the problems arises Due to repeating incidents has shown us that wherever something of value is targeted for an attack the smallest of things which no one would expect to have value is worth attack for predators. By ensuring security of transactions done by the mobile device you improve your security. It gets a little bit confusing because not all attacks will focus on the transactions other attacks can be for other motives such as infrastructure supporting the services or just for the amusement of watching ( privacy ) Its not always black and white to why we have security issues during the process transactions in our mobile. A lot of attackers may do it for profits sometimes for recognition and sometime its merely malicious. At the end of the day it always leads to significant damages.

Information Customer’s information is tremendously valuable, telecommunications companies already hold a significant amount of confidentially. In a mobile device world via M-commerce valuable data can vary from credit card information, encryption keys, digital signatures, pin numbers, discrete information. These acts can also be done internally within a telecommunication company that helps support mobile devices.

 managing the risk Managing the risks in m-commerce services will require a combination of controls, both technical and procedural. One of the biggest challenges facing operators will be ensuring the co-ordination of these controls in a strategic manner to ensure complete coverage. Understanding and applying the controls effectively will demand a combination of skills from different security backgrounds, ranging from technical solutions through secure process design to physical security. Ongoing operational management of the various processes and systems will also be fundamental to success.

Managing the risk of information being stolen or other malicious acts can be required by a set of controls, both procedural and technical. For complete coverage one must use strategic tactics to gain and advantages. One important tactical advantage would be information, helping employees, clients, end users understand how and what they can do to endanger themselves and how to prevent it. Tailgating, careless internet surfing, poor password selection use ect..

 conclusion Security threats and viruses can target mobile devices when via the internet most effetely when practicing M-commerce. It can be a target for virus, fraudster and hackers. To support the infrastructure it is essential to implement protection. But at the same time there are always new risk which would have to be dealt with. Whether you are using your mobile phone for pleasure or for business Attacks can happen at any time. Clients and users must inform themselves of the risk. M-commerce is one of the many new innovations into today’s business but its still not perfect and secure.

sources introduction to information systems and article http://www.technewsworld.com/story/44222.html --K Kadar MGCR331 (talk) 20:01, 30 October 2008 (UTC)