With the continuous development of the Internet and smart terminals, mobile phones have long become an indispensable tool for people's work, life and entertainment. It is also because of its powerful function, a little careless, and the situation of "injury" to oneself is of course more common. So, how should daily mobile phone network security be protected? Safety net to tell the relevant network security tips.
Definition of network security
Network security means that the data in the hardware, software and systems of the network system is protected. It is not damaged, changed or leaked due to accidental or malicious reasons. The system runs continuously and reliably, and the network service is not interrupted.
What are the characteristics of network security?
Confidentiality
Information is not disclosed to unauthorized users, entities or processes, or features that are available to them.
Integrity
The feature that data cannot be changed without authorization. That is, the information remains unmodified, uncorrupted, and lost during storage or transmission.
Availability
A feature that can be accessed by an authorized entity and used on demand. That is, you can access the information you need when you need it. For example, denial of service in the network environment, destruction of the network and the normal operation of the system are all attacks on availability;
Controllability
Control over the dissemination and content of information.
Auditability
Provide evidence and means when security issues arise.
The status quo of mobile phone network security
In 2015, the number of domestic mobile phone information security incidents increased significantly, and gradually showed a trend of polarization. On the one hand, the coverage of harassment-like security incidents that do not constitute a direct economic loss to users is high, and the coverage of harassment, advertising calls and advertising illegal SMS messages is above 75%; on the other hand, through mobile phone viruses, malicious The means by which software steals user information is increasingly hidden. Most users are hard to detect after stealing personal information, and their user coverage is less than 20%. It should not be overlooked that although the proportion perceived by users is low, the impact of mobile phone viruses and malware in 2015 will not decrease.
What are the hidden dangers of mobile phone network?
- Mobile devices often do not enable passwords.
Mobile devices often lack passwords to authenticate users and control access to data stored on the device. The technical capabilities of many devices support passwords, personal identification numbers (PINs), or screen locks for authentication mode. Some mobile devices also include a biometric reader that scans for fingerprint authentication. However, the survey shows that users rarely use these mechanisms. Also, if the user does not use a password or PIN, they will often choose to be able to easily determine or bypass the password or PIN, such as 1234 or 0000. If there is no password or PIN lock, there is an increased risk of stolen or lost cell phone information that can be accessed by unauthorized users to view sensitive information and misuse mobile devices.
- Two-factor authentication is not always used for sensitive transactions on mobile devices.
According to research, static passwords are commonly used by users, rather than two-factor authentication, while sensitive transactions are used while using mobile devices. There are security flaws in using static passwords for authentication: passwords that can be guessed, forgotten, written down and stolen, or eavesdropped. Two-factor authentication typically provides a higher level of security and higher levels of possibilities than traditional passwords and PINs. Two factors refer to the identity system, where users need to use at least two different "factors": what you know, what you have, and so on. Authenticate when granted access. Mobile devices can be used for the second factor in some two-factor authentication schemes. Mobile devices can generate pass-through code that can be sent to the phone via SMS. If there is no two-factor authentication, this increases the risk of mobile devices, and unauthorized users can gain access to sensitive information and abuse of mobile devices.
Continued in Part 2