Part 1: Conduct a threat and risk assessment on you (i.e. home/apartment \"syste
ID: 3863687 • Letter: P
Question
Part 1: Conduct a threat and risk assessment on you (i.e. home/apartment "system")
You will conduct the following steps:
a) Identify scope
b) collect data --> you don't have to do any port scanning but a generic network topology can be done
c) vulnerability analysis --> don't do any automatic scans but research what vulnerabilities exist for the devices/systems that you have in your scope
d) Threat Assessment --> consider what the threats are (human and nonhuman) and evaluate them based on understanding of previous steps
e) Write a conclusion based on what you are going to do now in response to what you have learned
Part 2:
Research and answer these questions (from slide 5-22)
2.1) What types of threats do smart phones face?
2.2) Are there any particular vulnerabilities to your type of device you have in your "system"
2.3) What did Nicolas Seriot's "Spyphone" prove?
2.4) Are apps more or less likely to be subject to threats than traditional PC software programs (use data to support your argument)?
Explanation / Answer
1)
Scope of research is to identify what kind of risks is associated with using the smartphone
2)The Major types of threats that smart phone has that most devices dont have in built password protection making it vulnerable for hackers to steal data.The Lack of technical knowledge of end user. The lack of usage of Two-factor authentication. Two-factor authentication is used or applied when conducting sensitive transactions on smart phone devices.The end user may unknowingly downloads a malware which in turn would harm device. The Wireless transmission used by the smart phone devices may not be encryted.
In my device, there is no encryption of wireless transmission.Nicolas Seriot's "Spyphone" proved that the various smart phone devices may have spywares and malewares which may harm the device very badly.
It is not necessary that apps can be subject to threats than traditiional PC software programs. Proper encryption of device, in app password protection and regular system updates on devices allows apps to be secure.