Anyone who uses a mobile device to communicate with others, receive and send document or image files, conduct financial transactions, or connect to the Internet should follow recommended practices to protect yourself, your communications, your device, and its contents from misuse.
- [Instructor] Mobile devices are becoming as common and essential a part of daily life as house keys, a wallet, or credit card. In truth, our mobile phone may even eliminate the necessity for remembering our keys, wallet, bank account number, medical and emergency contact numbers, as we go heading out the door. Cisco estimates that 563 million devices and connections were added last year alone. That's in addition to the existing base of 7.3 billion devices and connections that existed the year before.
An increase of seven percent. It also means that there are more mobile devices and connections than there are people in the world, stunning. If you are a habitual user of one or more mobile devices, whether a phone, laptop, tablet, Fitbit, heart monitor, baby monitor, headset, smart clothing, even your car, this course can provide basic information about how to use these mini-computers more safely so that your communications, information, and identity are not compromised.
The purpose is not to show why you should be scared, but to make you aware that you can take actions to protect your mobile devices. You can help ensure that they fulfill their promise to make your life smoother, more connected, and more informed. Although for millennials, at least those in countries that participate effectively in world commerce, might perceive mobile devices as just part of the general landscape, much like indoor plumbing and 24/7 electrical power, some of us remember the futuristic teases of Dick Tracy's wristwatch TV and Maxwell Smart's shoe phone.
Several technological innovations and interoperability agreements were needed to prepare the stage for widespread distribution and adoption of mobile devices. These innovations were about freeing up communications from the restrictions of place and the printed page. With radio communications, the speaker could be anywhere there was a transmitting unit, and his audience could be anywhere there was a receiver. Political speeches and product pitches were accessible without having to assemble in an established physical location.
Likewise, these long-range communications allowed information transfer between individuals directly without first transcribing that information into print. Multitasking was promoted by the adoption of radio communications. Since the purpose was communication however, emphasis on the security of that transmission was minimal. Radio and its related wireless communication platforms remain chatty media today. In the majority of cases, spectrum hopping applications aside, the content of messages must be encoded for secure transmission.
During World War II, the German Enigma machine was used to encode messages intended for transmission from Axis Force U-boats and from stationary locations. Navajo and other Native American code talkers were used by the Allied Forces to confound those who intercepted radio messages. Again, the content or message was encoded and not the communication channel itself. Understanding the assumptions of the early wireless innovators in the applications intended for their inventions helps explain why security has not been baked into mobile devices historically.
As a consequence, we have to apply compensating controls to ensure that we use this technology responsibly. In summary, mobile devices are ever-present in our lives. We mentioned here that in the development of radio technology, the focus was on facilitating signal transmissions rather than message content security. Next, let's look at mobile device adoption.
This course was created and produced by Mentor Source, Inc. We are honored to host this training in our library.
- Mobile technology platforms
- Mobile device apps
- Physical and logical hacking techniques
- Device hardening
- Communications hardening