Beruflich Dokumente
Kultur Dokumente
Business 1
Nelson Mandela Metropolitan University, Dept. of ..., Port Elizabeth South Africa,
6000
Abstract
Employees are adopting mobile devices, such as Personal Digital Assistants and
smartphones, for use within their businesses. As such there is a need to reduce the
risk to business information when used with these mobile devices. It is therefore
necessary to understand the types of risks involved with mobile devices to under-
stand the business’ security requirements with respect to the secure use of these
mobile devices.
Employees now had a means to crunch numbers and save data electronically
without having to book time on the business’s mainframe. This meant that the
business no longer had control over all of its data. Data that was once stored
out their organisation. Also, when the technology permitted, employees were
Being able to transport the data and computer was an important develop-
ment in mobility and this gave rise to the notebook computer. The notebook
computer allows the user to have the power and functionality of their desktop
computer to be carried with them wherever they may go. However, other types
of mobile computers became available that include the mobile phone and the
and data communication. The current trend with mobile phones, however, is
∗ Stephen Perelson
Email addresses: stephen@nmmu.ac.za (Stephen Perelson),
2
convergence. This can be seen by the current trend in manufacturing camera
phones and music playing phones (Dow Jones Newswires, 2005). These mobile
phones can, for example, also run small Java based programs using specially
2005). Manufacturers are creating these devices in order to gain a bigger mar-
ket share and to improve the income potential for the various players in the
mobile phone value chain. Consumers benefit with these mobile phones and
other lifestyle devices and the advanced value added services that are becoming
available.
The PDA caters for the need to have computing power on hand wherever and
whenever. PDAs, like the Apple Newton and the PalmPilot, were essentially
created to replace paper (Wikipedia, 2005). They were used to organize con-
tacts, schedules, to-do items, notes, and other paper based tasks. However,
a PDA can be extended with installable programs that can take advantage
of the features present in the device. Early PDAs were beset with problems
such as poor screen technology, low battery life, and faulty software. However,
modern PDAs are capable computing devices, which are fast becoming bet-
ter with reasonable usability in terms of battery life, screen technology, and
software.
The functionalities of the mobile phone and the PDA are merging. It is com-
mon to find mobile phones that are being designed with PDA type function-
ality (smartphones) and PDAs that are being created with voice and data
devices for business use and allows for greater workforce mobility.
Mobile devices are typically owned by the users of the devices. Just as there
3
is value in the adoption of microcomputers for business use, there is business
value for the adoption of mobile devices. These devices are usually introduced
and owned by employees. However businesses have also identified the need for
costs. Either way the business is a stakeholder in the secure use and operation
of the mobile device, as is the user of the device (Covey, Redman, and Tkacik,
2005).
With the above as a backdrop, the reality is that businesses have to contend
with an extremely mobile workforce who may be using mobile devices that
are not designed for secure business use (Perry et al., 2001; Halpert, 2004).
Mobile devices are changing how people are conducting business and perform-
ing business processes. Koop and Mosges (2002), for example, demonstrate
efficiency and accuracy. However, these same devices may also be the cause of
Security threats are not unique to mobile devices. However, mobile devices
introduce additional security risks, partly due to the nature of the mobile
device. Parker (1995) provides a structured way of thinking about the various
security risks with respect to business data. His model of security represents
a utopian view of secure data that provides a useful starting point for us to
identify the possible risks that mobile device usage may introduce. This section
will be followed by various cases and scenarios that map to these security risks,
4
2 Elements of Security
There are three well known properties of secure information, namely Confiden-
confidential when it maintains its secrecy from those that are not authorised.
Similarly, information has integrity when it maintains its accuracy and com-
usable when needed. Parker (1995), however, argues that these three proper-
ties are not enough for the security requirements of business. Subsequently,
Authenticity relates to the validity of the information, which means that the
users of the information can trust that the information is authentic. Utility
denotes the usefulness of the information to the user. Possession indicates the
The properties of secure information are used to evaluate the impact of the
various vulnerabilities that could befall information within the domain of mo-
security threat (ISO, 2004). For a mobile device, one such weakness would be
its small size that makes it easier for the device to be stolen. Theft, in this
Security threats are the potential incidents that could occur to a vulnerability,
which may impact upon any of the security properties (ISO, 2004). The risk
5
result if it does occur, which can be visualized with the following mathematical
Risk can be reduced by minimizing either the probability of the threat occur-
ring or the consequences, or value, of the loss. The reduction in probability and
value of loss can be brought about with the proper implementation and use
2003). A safeguard is a method or tool that helps reduce either the probability
By their very nature, mobile devices have a higher probability of certain secu-
rity threats occurring. The fact that these devices are mobile increases the risk
of loss through damage, user forgetfulness, theft, and other security threats.
In order to reduce the risks involved with mobile device use, it is necessary to
identify and understand these vulnerabilities, particularly those that are more
3 Vulnerabilities
ing, and contaminating the data, as well as the risk of denying, prolonging, or
6
The security threats to integrity and authenticity include the risks of obtaining
and using false data through entry, production, or modification and the risks of
Another, fairly ubiquitous risk is that users may fail to protect data when
they are exposed to any one of the aforementioned threats. The user may fail
mation is stored, transferred, and used. The focus of this paper is on those
This mobile nature is evidenced in the mobility of the device, the size of, and,
the hardware used for these devices, the software used with these devices, and
A mobile device is, by definition, mobile and can be used in different geo-
graphical locations and while travelling between these locations (Perry et al.,
2001). Mobility brings about many security threats that include damage, loss,
The small size of mobile devices brings about vulnerabilities that include
reduced battery life, limited screen size, limited data storage, limited input
mechanisms, and limited processing power. The security threats that could
be allowed by these vulnerabilities include data input errors, loss of data due
7
memory, and allowing access controls to be bypassed. These vulnerabilities of
size also affects the software that can run on the mobile device.
The software on the mobile device is crucial to the integrity and utility of the
information accessed and stored on the mobile device. Badly designed software
could cause many problems and could ultimately result in information loss.
Security threats that could befall the mobile device due to the software include
used with a mobile device and to examine the security threats that could
4 Threat Scenarios
clearly identifies a vulnerability and the associated security threats. The risk
potential for each scenario is also discussed with suggestions for safeguards
8
4.1 Threats to Availability
John, a salesman, stores all of his customer’s details on a PDA along with
itineraries of his trips. He also makes notes of customer orders onto his PDA for
sending through to the main office at the end of the work day. John was careless
and dropped his PDA into the pool at one of the motels during one of his sales
trips resulting in a non-functional PDA. John has lost all of the information
stored on the PDA and, as such, no longer has any of his information available.
that include device failure, accidental deletion of data, and software failure.
In this scenario, John should be blamed for his information availability crisis
as it was not a design fault of the PDA that caused the information loss. It can
be assumed that this particular security threat is not likely to occur and, as
such, the risk of this threat is low. However, there are three ways of reducing
The first method is to reduce the likelihood of the PDA from getting wet by
educating the user in how and where to carry the mobile device. This method
the cheapest option. However, John may not apply this knowledge in order to
9
The second method to prevent information loss would be to waterproof the
not rely on the user being able to prevent exposing the PDA to water as the
PDA is itself capable of surviving the threat. However, this method could be
The third safeguard that could be implemented to reduce the risk of infor-
mation loss for this scenario would be information backup. If John could re-
trieve his contacts, itineraries, and orders from another source then the loss
computer at the end of each day. He could also store the information on a
abuse. John may still lose information as all data that was captured since the
last backup would be lost, but the amount of information lost would be minor
information loss and is clearly a function built into most mobile devices. Mobile
phones, that support it, can make use of the OMA’s SyncML (OMA, 2005),
and PDA’s and smartphones all include synchronization software. In the event
of a catastrophic device failure, such as John taking his PDA for a swim, the
availability of the information may be lost in the short term, but will be
10
4.2 Threats to Utility
mobile device has a generally lower utility than a desktop computer due to
its form factor. Mobile devices typically have small screens and a restricted
form of input due to the size constraints (Hart and Hannan, 2004). Other
utility issues include methods employed to increase the battery life (Hart and
Hannan, 2004) and badly designed user interfaces (Sarker and Wells, 2003).
The duration a mobile device can run a particular task is dependant upon
the battery used and the level of drain upon that battery. Fast and powerful
processors draw more current than slow, energy efficient ones. Special low-
power components have to be employed to allow the mobile device to run for
a reasonable duration while relying on its battery. If the mobile device cannot
run long enough for a user to accomplish their task at hand then the data on
A badly designed user interface also affects the utility of the data stored on
the mobile device as it may inadvertently obscure certain tasks from being
Such tasks may include altering the stored data in a way which affects the
data’s usefulness.
Another issue that affects utility is that of forgotten or illegally changed pass-
words. A user could forget a password if the mobile device is not used often
and, if this occurs, some mobile devices enter a very secure, locked mode when
the password is entered too many times. This is the typical behaviour with
mobile phones that will then require the Phone Unlock Key to be entered.
11
Also, another person, or program, may change the password unbeknownst to
the user. This is also applicable to encrypted data where the decryption key
ingful way. If the mobile device or the data stored thereon cannot be accessed,
of instant messaging system, the software quite often loses messages and does
not provide a way to retrieve those lost messages. This same design flaw is
probably part of other similar instant messaging solutions, but has not been
tested. The error occurs when you exit from the system and receive a message
as you are busy exiting or when you experience an unsuccessful login from
the client’s perspective due to system failure or network issues. Either method
results in the server thinking the client is successfully connected and logged
on and, as such, delivers messages. The system is not well enough designed to
tion is no longer available nor does anyone have possession of the information.
A better example would be the one that Parker (1995) defined, which is a
12
plication designed for a mobile device for this scenario. The application may
perform as intended, but may cause data errors due to the omitted code and,
The reduced display capacity of mobile devices may also cause integrity issues
due to the fact that certain applications may trim some of the data for bet-
ter display purposes. For example, an image viewing application may resize
pictures to fit onto the display of the mobile device, but may be reducing the
the capabilities of the device hardware and software is the cause for the loss
of data integrity.
by someone claiming that the media object was created by a more popular
publisher when the actual publisher was a relatively unknown one to garner
more sales. This scenario parallels the one defined by Parker (1995) where a
book distributor alters the publisher details of the book for sale in another
This scenario is aided in part by being able to access the Internet from a mobile
device. Besides misrepresented digital media objects, the Internet also provides
other possibilities to the risk of authenticity. There is very little guarantee that
A web service could claim to provide a particular service and then deliver
13
something else. Also, thieves could set up so-called ‘phishing’ sites that mimic
The screen of a mobile device is typically a low resolution screen that does
not offer much screen real estate for applications to display information. As
such, web browsers on the mobile device may not display all of the pertinent
information and will, therefore, exacerbate certain problems. Also, the user
interface heuristics are not always the same as the equivalent desktop computer
user interfaces as there are generally different design paradigms in use to make
Any means that an attacker can gain access to the information on the mobile
device falls into this category. The information that is retrieved may reside
in more than one place, the mobile device and a server. The hacker who
stole Paris Hilton’s address book did not hack into her phone, but rather
attacked the server, hosted by the network operator, that stored a backup of
her information (Hayes, 2005). An unauthorised person can also simply use
Data can also be copied using external memory or the various networking
protocols that are available. One such scenario is that of the Bluetooth vul-
nerabilities, which can be used to copy data from a mobile device or to initiate
14
communication sessions (Laurie and Laurie, 2003). However, if the data is only
copied then possession is not lost. Only if the original data on the phone is
assumed that a person who steals a mobile device usually does so to gain the
device itself and not the data upon that device. While Parker (Parker, 1995)
assumes that possession means the total loss of the data, this is not usually the
case with mobile devices. Mobile devices are typically used as an extension to
the user’s desktop and not as repositories of unique data. As such, if the mobile
device is stolen, the data is usually still in the possession of the data owner.
When this is not true is when data, such as tasks, appointments, and business
cards, has been added onto the mobile device after the last synchronisation.
Over the Air (OTA). Using standards, such as the Open Mobile Alliance’s
backup some of the data on some mobile phones. Similar mechanisms are
With the future services that will be offered it is the business’ aim to manage
the risk by evaluating the cost benefits of the services and their associated
risks.
15
5 Conclusion
Reducing the risk of a security threat is not an easy task. security mechanisms
from occurring or to reduce the level of damage if they do occur. At the same
time, the business must weigh the cost of the particular loss into account
particular threat.
Coupled with this evaluation is the availability of various security packages and
mechanisms for mobile devices that may or may not reduce the risk of various
to mobile devices and the realising of the cost implications of each security
threat occurring can a business implement the correct level of security for their
needs.
6 Acknowledgements
All trademarks and copyrights are the property of their respective owners. The
at, are those of the authors and are not necessarily to be attributed to the
16
References
Bricklin, D., 2005. VisiCalc: Information from its creators, Dan Bricklin and
bricklin.com/visicalc.htm.
Covey, C., Redman, M., Tkacik, T., 2005. An advanced trusted platform for
Dow Jones Newswires, 2005. Mobile phone maker nokia moves away from talk
cellular-news.com/story/14050.php.
Halpert, B., 2004. Mobile device security. In: InfoSecCD ’04: Proceedings of
Hart, J., Hannan, M., 2004. The future of mobile technology and mobile wire-
Hayes, F., 2005. Paris hilton & you. [Cited 20 September 2005]. Available
online at http://www.computerworld.com/securitytopics/security/story/0,
10801,100032,00.html.
rity management.
Koop, A., Mosges, R., October 2002. The use of handheld computers in clini-
17
URL http://www.sciencedirect.com/science/article/B6T5R-470G763-1/2/
ef213e97079bcb8eb121b859f80d70cc
Laurie, A., Laurie, B., 2003. Serious flaws in bluetooth security lead to dis-
http://www.thebunker.net/security/bluetooth.htm.
Microsoft, 2005. Windows Mobile 5.0 Messaging & Security Feature Pack.
windowsmobile/business/5/default.mspx.
index.html.
Parker, D., 1995. A new framework for information security to avoid informa-
Perry, M., O’Hara, K., Sellen, A., Brown, B., Harper, R., 2001. Dealing with
Sarker, S., Wells, J. D., 2003. Understanding mobile handheld device use and
18