Secure Mobile Transactions – Fact or Fiction? Part 2 of 2

Secure Mobile Transactions – Fact or Fiction? Part 2 of 2

...continued from Part 1

The threat model

Malicious mobile device hackers have a variety of goals. Foremost is monetary gain, but retribution, anarchy, curiosity and perceived public good can all be part of the motivation. The attackers can be grouped by resource levels and goals, as illustrated in table 1.

Table 1: An example of how mobile security attackers can be categorised by resources and goals.

Understanding the motivation of a hacker highlights that a good mobile security strategy must not only defend both against specific mobile threats, but also more generic threats such as reputational or ethical attacks.

Secure Mobile Transactions – Fact or Fiction? Part 1 of 2

Secure Mobile Transactions – Fact or Fiction? Part 1 of 2

With mobile devices being used for more credentialing based activities, the question of mobile security is becoming increasingly important. The mobile security landscape, however, is still immature, so how can service providers successfully deliver secure mobile services today?