Case Study: Identifying Vulnerabilities in Mobile Phones

I’m trying to learn for my Computer Science class and I’m stuck. Can you help?

More than three billion mobile phones are in use worldwide, and more people now reach the Internet with mobile phones than they do with desktop computers. Even if your phone can’t browse the Web, it probably has some limited Web capability and is at least part of a huge cell phone network. Have you ever thought about someone hacking your phone?

Research your phone model on the Internet to determine what OS it uses and any existing or potential vulnerabilities. For example, could your phone be used as a covert listening device or used to send text message spam or perform a DoS attack?

Be creative but use real information that you find in your research. Write a one-to two-page with your findings.

Please write at least two paragraphs with your findings.


Order the answer to view it

Assignment Solutions


Assignment Solutions

ORDER THIS OR A SIMILAR PAPER AND GET 20% DICOUNT. USE CODE: GET2O