Thursday, March 14, 2019
Mobile Phone Security
This fact sheet has been developed for the Consumer Education Program by the Communications Commission of Kenya. It was compiled by studying material from various overbearing sources and adopting what Is universally acceptable and relevant to the Kenya situation. The fact sheet is intended to modify Consumers gravel a good to a pitifuler placestanding of the issues discussed and hence empower them when devising decisions regarding CIT products and returns. Introduction One of the biggest threats that a runny bid substance abuser faces at present Is loss or thieving of the hollo.Not only Is the mobile valued as a physical device, the anticipate may contain personal and financial data stored in the handset or in the knells subscriber individuality module (SIMI throwaway). While a stolen SIMI abide be barred by a mobile ne twainrk once the theft has been reported it Is a bit harder to bar the handset from being employ with different SIMI card. Unless the user had pro tected his personal breeding with a PIN prior to the theft or loss of the shout out, this data place be get ated by unauthorised persons. Mobile retrieve users normally store a wide veer of information on their reverberates.This information evict either be stored in the telecommunicates Internal or external memory (depending on the make and mannikin of the ph atomic number 53) or In the SIMI card. The SIMI card Is used mainly to store contacts and picayune messages while the names memory is used to store information such as personal photos, emails, and calendar items. In order to prevent unauthorized persons from development the address and further gaining access to the stored Information, most mobile phones have surety features which the user can activate. This fact sheet has been developed to address protective covering of the information stored and what to do should you lose the phone.Securing the information stored. There ar at least two methods one can use to secure the Information stored on a mobile phone. These be a) SIMI jail This method takes favor of the SIMI card as a storage element to secure clannish Information associated with the subscriber. The subscriber uses a PIN snatch which is largely a four digit code which should only be known to him and is ever more(prenominal) prompted by the mobile phone every time the SIMI card is inserted into the phone. It Is an sound method since even If the subscriber looses the SIMI card the other person cannot access any information stored on it. Phone lock Mobile phone security department measure This method takes advantage of a password to lock the mobile phone such that access to the phones functions can only be permitted upon comment of the correct password. An eight-digit code is more secure than a four-digit code. Most phones in any cause have an inbuilt an automatic phone lock system which kicks In after a stipulated time period e. G. 30 seconds when activated which Is most ly used as a keypad lock and subscribers be talk over to take advantage of this features to enhance the security setting AT tenet phones. N more nana el n a evolves Delve subject AT achieving emails, security especially of corporate email with sensitive inner and external data has become a major concern. This means that mobile handsets hold data which previously only resided in computers. Since this method is more effective and protects more information than the first, subscribers argon hash out to alship canal lock their phones especially if they hold any sensitive information. Safeguarding your Handset Some of the ways to keep your mobile sound include Keep your phone safe and start of sight.Only give your number to your friends and people you trust. Avoid using your phone in the street. If you need to call someone in a overt place, be discrete and be somewhere where you can see what is calamity around you. Use a PIN code to lock your phone. If youre move alone put you r phone on silent or vacillate mode so your ring tone doesnt draw attention to you. Be alert while walking and testing at the same time. Security-mark your phone with a unique code. The best place is underneath the battery.Many mobile phones ar stolen in public places such as cinemas, pubs and nightclubs, especially when they are leftover on a bar, table or on a seat, so dont leave your phone in such places unattended. Dont leave your phone unattended in a car if you must, put it out of sight and troll it off or switch to silent mode. It takes seconds for a thief to break dance a window and enter a car. For a Bluetooth or Wi-If enabled phone install antivirus software to help guard against harmful programs or viruses. For the sake of the safety of very young children always keep the phone out of their reach.Avoid making easily identifiable entries in the phone e. G. mum or dad for the security of such persons should the phone be lost. There are other methods of securing your phone that are dependent on the genealogy that the phone is based on. The two main technologies used for the provision of mobile services are GSM (Global brass for Mobile Communications) and CDMA (Code Division Multiple Access). Phones based on these two technologies attribute to their respective networks differently, so the security features differ slightly. Mobile phone security Your GSM Phones Unique Equipment Identification Number Each GSM mobile phone has a unique electronic serial number called the MIME (International Mobile Equipment Identification) number, which can be identified by the GSM network. It is a 15-digit number programmed into the handset and as well as written is at the back of the handset, under the battery. On most GSM handsets, it can De Oligopoly on ten managers screen Day pressing ten anchor sequence using the keypad, when the phone is switched on.Upon purchase of a mobile handset, users are advised to record their MIME number for use in case the mobil e phone is lost or stolen. Your mobile phone service provider can liaise with the police regarding a lost or stolen handset and, if found, your handset will be identified using the MIME. Thieves are deterred from stealing mobile phones by MIME blocking. Blocking an MIME on a mobile phone network prevents a GSM mobile phone from being used with any SIMI on any Kenya GSM network. Mobile carriers are able to block the use of customers lost or stolen mobile phones and resign recovered mobile phones on their network.They have also agreed to metamorphose their lists of blocked and unblocked MIME numbers with other mobile carriers so these can also be processed (blocked/unblocked) on all mobile networks. The CDMA phone unique electronic identification number CDMA phones also have a unique electronic identification number, the Electronic Serial Number (SENSE). This number can be found on the back of the CDMA handset under the battery and usually has eight digits, combining letters and num bers. Users are advised tap record this number for identification purposes in case the phone is lost or stolen.Hidden battery power Some mobile phones are designed to admit battery power. If the cell battery is very low and the user is expecting an important call or is confronted by an emergency situation, and doesnt have a charger at that moment, one can activate this re advert battery power. To activate, press the keys *3370, the cell phone will restart with this serve and the instrument will show a significant increase in battery power. This reserve will get replenished the next time one charges their cell phone.However it should be noted that this only works on some phones. What to do if ones mobile handset is lost or stolen If the users mobile phone is lost or stolen, the user is advised to contact their mobile phone service provider immediately to suspend service and prevent unauthorized calls being made and billed to the user. If one has a GSM mobile phone, the provider will 3 Mobile phone security block the subscribers SIMI card and MIME number to prevent heir phone from being used on all Kenya mobile networks.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.