In this module, I'll cover the different security risks associated with smartphones.
First, I'll explain the three components of smartphone security
Then, eight ways hackers make money
And finally, the three indirect consequences of getting your smartphone compromised
The three components of smartphone security are:
Confidentiality, which refers to the situation where you agreed not to divulge information without the consent of the person who shared that information with you. It could be your spouse, a friend, your clients, your suppliers, or any other business partner. It's different from privacy which refers to your right, as a person, to keep your life and personal affairs to yourself, thus away from the public eye. Putting in place security measures aimed at protecting the confidentiality of third-party information, will, at the same time help you keep your own information private. So, even though Privacy is not the main focus of this course, the tips you'll learn will help you nonetheless.
Integrity, which refers to the ability to prevent unauthorized modification of data and information under your control. On a personal smartphone, we're talking about making sure that apps and the operating system do not get compromised. In a professional context, we're talking about various documents and even backups that could be tampered with, and so could not be trusted anymore.
Availability, which refers to ensuring that data, documents, and IT systems are accessible at all times. Here we're talking about protecting your smartphone from both physical damage and software malfunction. And in case your device gets stolen, you have the means to access or restore data and information.