Reply To: OCU C)OST B Discussion Lesson 10
Emerging vulnerabilities on mobile devices include malicious apps, phishing attacks, and unsecured Wi-Fi networks. Malicious apps can steal personal information or take control of the device, so users should only download apps from trusted sources and keep their apps and operating systems updated. Phishing attacks trick users into providing sensitive information; hence, users should be cautious of unsolicited messages and use filtering tools to block phishing attempts. Unsecured Wi-Fi networks expose devices to attacks like man-in-the-middle attacks, so users should avoid using public Wi-Fi for sensitive transactions and use a VPN to ensure secure connections.
For physical devices, vulnerabilities include unauthorized physical access, hardware tampering, and theft of devices. Unauthorized access can lead to data theft, so implementing access control measures such as biometric scanners or secure locks is essential. Hardware tampering can compromise device integrity, so using tamper-evident seals and regularly inspecting devices for tampering is crucial, along with securing hardware in locked enclosures. Theft of devices can result in data loss, so using security cables or locks to secure devices, and enabling device tracking and remote wipe capabilities, can help mitigate this risk.