Home > unauthenticated user > Mobile Computing and the Anonymous User
Mobile Computing and the Anonymous User
Posted on Rabu, 21 September 2011 by Julia Linda
>
Laptop security is based on the authenticated user, also referred to as the "named user" in order to attain accountability for user actions and to mediate access to resources. The lack of an authenticated user indicates the resources of the device are obtainable to whoever has physical access to the device. Exactly where a device can be accessed remotely, physical access is not even vital.
The familiar logon procedure, exactly where a user ordinarily supplies a user id and a password to acquire access to a method, is significantly more formally referred as identification and authentication. The authentication step is consistently based on some thing the user has, knows, or is, so a password, a card or a biometric signature can all be used to accomplish authentication, with a password becoming the frequent solution.
Internet internet sites sometimes enable unauthenticated users as a indicates to enable uncomplicated access to non-sensitive specifics or services. Mobile computing operating systems have adopted the web internet site method, allowing uncomplicated access but relying on the user not to store sensitive data on the device. If the user ignores the problem, any sensitive facts stored, processed or transmitted by the device is unprotected. Note, some mobile devices encrypt their communications, which does present a degree of protection during transmission.
As a replacement for personal computers, the lack of security in a number of tablets is a substantial issue if use of the unsecured tablet involves anything sensitive. Users need to give critical thought to the potential consequences resulting from compromise of the details utilised on a unsecured tablet.
Mobile apps present an extra layer of uncertainty as what an app does with user provided data may perhaps not be apparent to the user. Users must be aware that apps can store data long soon after it is supplied with that data accessible to individuals unknown to the user.
Definitely device theft is an issue, as device theft can also be data theft and may be motivated by data theft. User awareness of the implications of these problems would demand a degree of education that is likely unrealistic to expect.
As corporations gravitate to mobile devices for employee use, the corporate security teams should certainly be expected to fully grasp and address issues related with employee use involving any corporate info assets and in particular sensitive assets.
Category Article authenticated user, device theft, mobile computing, mobile computing anonymous user, unauthenticated user
Blog Roll
Blog Archive
- September (5)