Mobile computing is the human-computer interaction through which a computer is expected to be transported during normal use, which allows the transmission of data, voice and video. Mobile computing involves mobile communication, mobile hardware and mobile software. Communication problems include ad hoc networks and infrastructure networks, as well as communication properties, protocols, data formats and specific technologies. The hardware includes mobile devices or device components.
Mobile software deals with the features and requirements of mobile applications. Mobile security has become increasingly important in mobile computing. It is especially worrying when it comes to the security of personal information now stored on your smartphone.
More and more users and companies use smartphones as a means to plan and organize their work and their private lives. Within companies, these technologies are causing profound changes in the organization of information systems and, therefore, have become a source of new risks. In fact, smartphones collect and compile an increasing amount of sensitive information to which access must be controlled to protect the privacy of the user and the intellectual property of the company.
All smartphones are preferred targets of attacks. These attacks exploit weaknesses related to smartphones that can come from wireless telecommunication means such as WiFi and GSM networks. There are also attacks that exploit the software vulnerabilities of both the web browser and the operating system. Finally, there are forms of malicious software that rely on the weak knowledge of average users.
Different security countermeasures are being developed and applied to smartphones, from security in different software layers to the dissemination of information to end users. There are good practices to observe at all levels, from design to use, through the development of operating systems, software layers and downloadable applications.