Wednesday, January 30, 2019
Mobile Phone Security
This fact sheet has been developed for the Consumer Education Program by the communication theory Commission of Kenya. It was compiled by studying material from various authoritative sources and adopting what Is universally accept able and relevant to the Kenya situation. The fact sheet is intended to enable Consumers permit a good understanding of the issues discussed and hence empower them when qualification decisions regarding CIT products and suffices. unveiling One of the biggest threats that a lively cry drug user faces today Is evil or theft of the send for.Not only Is the mobile valued as a physical device, the phone may contain individualized and financial entropy stored in the handset or in the phones subscriber identity faculty (SIMI observation). While a stolen SIMI cornerstone be barred by a mobile network once the theft has been reported it Is a bend harder to bar the handset from macrocosm use with different SIMI card. Unless the user had defend his personal entropy with a PIN prior to the theft or loss of the phone, this data can be accessed by unauthorized persons. unstable phone users normally store a wide range of reading on their phones.This instruction can either be stored in the phones national or immaterial memory (depending on the make and elanl of the phone) or In the SIMI card. The SIMI card Is used importantly to store contacts and short messages bandage the phones memory is used to store information such(prenominal) as personal photos, emails, and calendar items. In order to prevent unauthorized persons from using the phone and further gaining access to the stored Information, some mobile phones prolong trade protection features which the user can activate. This fact sheet has been developed to address security of the information stored and what to do should you lose the phone.Securing the information stored. There are at to the lowest degree two regularitys one can use to secure the Information store d on a mobile phone. These are a) SIMI lock This method disciplines advantage of the SIMI card as a storage element to secure private Information associated with the subscriber. The subscriber uses a PIN number which is mostly a four-spot digit code which should only be known to him and is always prompted by the mobile phone every time the SIMI card is inserted into the phone. It Is an effectual method since even If the subscriber looses the SIMI card the other person cannot access any(prenominal) information stored on it. Phone lock mobile phone security This method takes advantage of a password to lock the mobile phone such that access to the phones functions can only be permitted upon input of the classify password. An eight-digit code is more secure than a four-digit code. Most phones in addition have an inbuilt an automatic phone lock system which kicks In afterward a stipulated time period e. G. 30 seconds when activated which Is mostly used as a keypad lock and subscr ibers are certain to take advantage of this features to enhance the security setting AT tenet phones. N more nana el n a evolves Delve capable AT achieving emails, security in particular of corporate email with sensitive internal and external data has become a major concern. This means that mobile handsets accord data which previously only resided in computers. Since this method is more effective and protects more information than the first, subscribers are advised to always lock their phones especially if they hold any sensitive information. Safeguarding your Handset Some of the ways to cargo deck your mobile safe include Keep your phone safe and forth of sight.Only give your number to your friends and people you trust. Avoid using your phone in the street. If you need to call someone in a public place, be discrete and be somewhere where you can see what is happening somewhat you. Use a PIN code to lock your phone. If youre walking altogether put your phone on silent or vibrate mode so your ring tone doesnt draw attention to you. Be supple while walking and testing at the same time. Security-mark your phone with a queer code. The best place is underneath the barrage.Many mobile phones are stolen in public places such as cinemas, pubs and nightclubs, especially when they are left on a bar, table or on a seat, so dont pull your phone in such places unattended. Dont leave your phone unattended in a car if you must, put it out of sight and turn it off or switch to silent mode. It takes seconds for a thief to smash a window and enter a car. For a Bluetooth or Wi-If enabled phone ensnare antivirus software to help guard against harmful programs or viruses. For the sake of the pencil eraser of very young children always keep the phone out of their reach.Avoid making easily identifiable entries in the phone e. G. mum or dad for the security of such persons should the phone be befogged. There are other methods of securing your phone that are depend ent on the genealogy that the phone is based on. The two main technologies used for the provision of mobile services are GSM (Global System for Mobile Communications) and CDMA (Code Division Multiple Access). Phones based on these two technologies connect to their several(prenominal) networks differently, so the security features differ slightly. Mobile phone security Your GSM Phones unequaled(p) Equipment Identification Number Each GSM mobile phone has a alone(predicate) electronic serial number called the copy (International Mobile Equipment Identification) number, which can be identified by the GSM network. It is a 15-digit number programmed into the handset and also compose is at the back of the handset, under the onslaught. On most GSM handsets, it can De Oligopoly on ten managers screen Day pressing ten Key successiveness using the keypad, when the phone is switched on.Upon purchase of a mobile handset, users are advised to record their MIME number for use in case the mobile phone is lost or stolen. Your mobile phone service supplier can liaise with the police regarding a lost or stolen handset and, if found, your handset entrust be identified using the MIME. Thieves are deterred from stealing mobile phones by MIME blocking. Blocking an MIME on a mobile phone network prevents a GSM mobile phone from beingness used with any SIMI on any Kenya GSM network. Mobile carriers are able to block the use of customers lost or stolen mobile phones and unblock vulcanised mobile phones on their network.They have also agreed to exchange their lists of close up and unblocked MIME numbers with other mobile carriers so these can also be processed (blocked/unblocked) on all mobile networks. The CDMA phone unique electronic identification number CDMA phones also have a unique electronic identification number, the Electronic Serial Number (SENSE). This number can be found on the back of the CDMA handset under the bombing and usually has eight digits, combining letters and numbers. Users are advised badger record this number for identification purposes in case the phone is lost or stolen.Hidden battery power Some mobile phones are knowing to reserve battery power. If the mobile phone battery is very low and the user is expecting an important call or is confronted by an emergency situation, and doesnt have a charger at that moment, one can activate this reserve battery power. To activate, press the keys *3370, the cell phone will restart with this serve and the factor will show a significant increase in battery power. This reserve will get replenished the next time one charges their cell phone.However it should be noted that this only works on some phones. What to do if ones mobile handset is lost or stolen If the users mobile phone is lost or stolen, the user is advised to contact their mobile phone service provider immediately to suspend service and prevent unauthorized calls being made and billed to the user. If one has a GSM mobile phone, the provider will 3 Mobile phone security block the subscribers SIMI card and MIME number to prevent heir phone from being used on all Kenya mobile networks.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment