Mobile computing is an interaction between the human being and the computer through which a computer is expected to be transported during normal use, allowing data, voice and video transmission. Mobile computing involves mobile communication, mobile hardware and mobile software. Communication problems include ad hoc networks and infrastructure networks, as well as communication properties, protocols, data formats and specific technologies. The hardware includes mobile devices or device components. Mobile software addresses the characteristics and requirements of mobile applications.
Mobile security has become increasingly important in mobile computing. It is of particular concern as it relates to the security of personal information now stored on the smartphone.
More and more users and businesses use smartphones as a means to plan and organize their work and their private lives. Within companies, these technologies are causing profound changes in the organization of information systems and, therefore, have become a source of new risks. In fact, smartphones collect and collect an increasing amount of sensitive information that should be controlled access to protect user privacy and intellectual property of the company.
All smartphones are the target targets of attacks. These attacks exploit weaknesses related to smartphones that can come from wireless telecommunications media such as Wi-Fi and GSM networks. There are also attacks that exploit software vulnerabilities in both the Web browser and the operating system. Finally, there are forms of malicious software that are based on the weak knowledge of average users.
Different security measures against smartphones are developed and implemented, from security at different levels of software to the dissemination of information to end users. There are good practices that must be observed at all levels, from design to use, through the development of operating systems, software layers and downloadable applications.