Northeastern University
College of Computer and Information Science

Contact Us

  • Contact Us

Search

  • Explore CCIS
    • About the College
      • Dean’s Message
    • Undergraduate Programs
      • Advising
      • Degree Programs
      • Minor in Computer Science
      • Minor in Information Science
      • Tutoring
      • Scholarships
      • Student Awards
    • Graduate Programs
      • Degree Programs
      • Current Students
    • Co-op
    • People and Organizations
      • Faculty
      • Administrative Staff
      • Student Organizations
    • Contact Us
    • Research
      • Research Groups
      • Centers and Institutes
    • Technical Help
  • Prospective Students
  • Current Students
  • Alumni
  • Employers
Layout Image
  • About the College
    • Dean’s Message
    • CCIS Videos
  • Undergraduate Programs
    • Advising
    • Degree Programs
    • Minor in Computer Science
    • Minor in Information Science
    • Scholarships
      • Bradley E. Bailey Scholarship
      • Darwin Scholarship
      • Jane K. Wenzinger Scholarship Fund
      • Department of Defense Information Assurance Scholarship Program
      • NSF Federal Cyber Service: Scholarship for Service
    • Student Awards and Research
    • Tutoring
  • Graduate Programs
    • Degree Programs
      • Ph.D. in Computer Science
        • Admission Requirements
        • Academic Requirements
        • Time and Time Limitation
        • Transfer Credit
        • Approved Courses
        • Electives Outside the College
        • Specimen Curriculum
        • Academic Review Process
      • Ph.D. in Information Assurance
        • Admissions Requirements
        • Academic Requirements
        • Time and Time Limitation
        • Transfer Credit
        • Specimen Curriculum
        • Program Faculty
        • Contact Us
      • Ph.D. in Personal Health Informatics
      • M.S. in Computer Science
        • Admissions Requirements
        • Academic Requirements
        • Academic Probation
        • Time and Time Limitation
        • Transfer Credit
        • Approved Courses
        • Specimen Academic Schedule
        • Reading and Project Courses
        • Master’s Thesis
        • Request More Information
      • M.S. in Information Assurance
        • Admissions Requirements
        • Academic Requirements
        • Specimen Academic Schedule
        • Financial Aid and Scholarships
        • Faculty
        • Request More Information- MSIA
      • M.S. in Health Informatics
        • Program Overview
        • Master’s Degree
        • Certificates
        • Course Descriptions
        • Testimonials
        • Faculty
        • Careers
        • Student Profiles
        • Apply
        • Request More Information- MSHI
      • ALIGN
    • Apply
    • Scholarships
    • FAQ
    • Current Students
      • Course Descriptions
      • Course Schedules
      • Graduate Guidebook
      • Commencement
      • Forms
      • Travel Support
      • Wiki
      • Jobs
      • New Student Page
        • MyNeu Account
        • Course Registration
        • Health Insurance Requirements
        • ISSI Orientation
        • CCIS Orientation
        • CCIS Email Account
        • Paying Your Bill
        • Husky ID Cards
        • Online Learning
        • Housing
        • Parking
        • Public Transportation
  • Research
    • Research Groups
      • Algorithms and Theory
      • Artificial Intelligence
      • Data
      • Educational Research
      • Formal Methods
      • Game Design
      • Network Science
      • Personal Health Informatics
      • Programming Languages
      • Security
      • Software Engineering
      • Systems
    • Centers and Institutes
  • Co-op
    • Information for Students
      • FAQ
      • Information for New Students
      • Information for Upperclass Students
      • Information for Graduate Students
      • Prospective
      • Forms
    • Information for Employers
    • Co-op Manual
      • Steps to Finding A Job
      • Taking a Course
      • Academic Standards
    • Research & Data
      • Assessment
    • Calendar
    • Surveys & Evaluations
      • Student Evaluation
      • Employer Evaluation
  • People and Organizations
    • Faculty
    • Administrative Staff
    • Student Organizations
  • News & Events
    • News Archive
    • Events
    • Distinguished Speakers Series

Smart phones; smart users?

By itiadmin
Wednesday, March 30th, 2011

Associate professor Guevara Noubir weighs in on mobile phone security, and how much attention users pay to the risks they may face.

According to a recent survey conducted by AVG Technologies, a global consumer security software provider, and the Ponemon Institute, an independent research group, many smart phone users are complacent about the security risks that exist from using these mobile devices. Computer science professor Guevara Noubir, an expert in wireless security, analyzes this finding and assesses the potential risks that stem from using smart phones.


Do you agree that Americans are lax in their mobile phone security?


My feeling is that a portion of the population is lax, not everyone. People might download hundreds of applications to iPhones or Android phones, and I think some people aren’t careful enough about it. But the risks will keep increasing as phones become more ubiquitous and more sophisticated applications emerge, and because phones are with us all the time and we tend to trust them.

What are the greatest risks for cell phone users when it comes to security threats?


One potential threat relates to the fact that people carry mobile phones with them all the time, so their location can be tracked. Some applications people use, such as apps that enable them to access their bank accounts, could be damaging if that information is compromised.

These threats are related to many other aspects, including the fact that some of the protocols behind Wi-Fi and connectivity still have security issues. Others are related to the specific user. Many apps will ask you to accept its terms, which could include sharing the user’s location. Many people don’t read these terms and just click, “Yes.”

A couple of weeks ago, several applications were taken off the Android market because they included malware — meaning someone repackaged them to include harmful software that reports user information.


Has mobile phone security software kept pace with the cell phone technology, and how do you see this trend continuing in the future?


I think smart phone security is still just emerging, because cell phone technology has evolved so quickly over the last few years. Manufacturers put security mechanisms in their systems that are quite good, but beyond that, many threats haven’t been realized yet. We haven’t heard about a really large number of people being compromised, so if and when that happens, we’ll see more work done to solve these problems. I think most people now are ignoring it because there is no imminent threat. It’s hard to predict future threats, but overall, I feel if people are careful about what applications they install, their threat level is reasonable.

Categories : Uncategorized
Northeastern University
  • My NEU
  • Find Faculty & Staff
  • Find A – Z
  • Emergency Information
  • Search

360 Huntington Ave. Boston, Massachusetts 02115 • 1 (617) 373-2000

© 2013 Northeastern University

  • twitter
  • facebook
  • youtube