What kind of security threats will be there for mobile technology (virusses, eavesdropping, ...)?

From ScenarioThinking
Jump to navigation Jump to search

As GSM has matured and expanded its reach across Europe and beyond, its basic security mechanics have come under increasing criticism. Given the strong belief in the security community that only protocols can be tested should be trusted, it was inevitable that GSM would be attacked for its dependency on the proprietary A3,A8 and A5 algorithms. Many security analyst view these algorithms as cryptographically weak, and subject to intrusion by government agencies, in addition to well-equipped hackers

An attacker might want to gain access to an electronic message for numerous reasons. Gaining unauthorized access to information in order to violate someone’s privacy, impersonating another user in order to shift the responsibility or originate a fraudulent activity are some of the reasons an attacker might want to access the information.

There are four general categories of attacks on a transmitted message apart from normal transaction flow:

  1. Interruption;
  2. Interception;
  3. Modification;
  4. Fabrication.

Source: http://upetd.up.ac.za/thesis/available/etd-07202004-111814/unrestricted/00dissertation.pdf



Go back to Next_generation_mobile_devices_2015