CO4509 Digital Security - University of Central Lancashire
Smart Phone
You should investigate exploits and security as it relates to smart phones.
For example a security exploit could allow someone to use your phone as a listening device.
You should investigate the following:
• Basic principles and theory of smart phone security exploits.
• The state of smart phone security from the past five years.
o You should include the current state of smart phone security.
• Your analysis of the likely future importance and effectiveness of smart phone security exploits.
Learning Outcome 1: Analyse potential threats to computer systems and computer networks and evaluate countermeasures
Learning Outcome 2: Critically evaluate security policies and techniques
Learning Outcome 3: Research and report on a security-related topic, using appropriate literature
7 references