What types of threats do smart phones face are there any


Part 1: Conduct a threat and risk assessment on you (i.e. home/apartment "system")

You will conduct the following steps:

a) Identify scope

b) collect data --> you don't have to do any port scanning but a generic network topology can be done

c) vulnerability analysis --> don't do any automatic scans but research what vulnerabilities exist for the devices/systems that you have in your scope

d) Threat Assessment --> consider what the threats are (human and nonhuman) and evaluate them based on understanding of previous steps

e) Write a conclusion based on what you are going to do now in response to what you have learned

Part 2:

Research and answer these questions (from slide 5-22)

2.1) What types of threats do smart phones face?

2.2) Are there any particular vulnerabilities to your type of device you have in your "system"

2.3) What did Nicolas Seriot's "Spyphone" prove?

2.4) Are apps more or less likely to be subject to threats than traditional PC software programs (use data to support your argument)?

Request for Solution File

Ask an Expert for Answer!!
Computer Engineering: What types of threats do smart phones face are there any
Reference No:- TGS02881948

Expected delivery within 24 Hours