Security & Mobility Now
Security is top-of-mind everywhere, especially right here where Juniper experts share their thoughts on the latest security breakthroughs and product advancements
Ashwin

Mobile Security

by Juniper Employee on ‎07-21-2009 09:49 AM

In this third and final installment of the mobile security blog series I conclude with a look at mobile location and commerce and its impact on security.

 

Mobile location

One of the key attributes of the mobile revolution is the constant awareness of the user location. Typically in the past this information been available to the operator alone and no real businesses have spawned as a result of this knowledge. Fast forward to today and LBS - location based services - are one of the fastest growing segments in the mobile services segment. The reason is quite intuitive - imagine being able to target advertising and promotions tailored to the user and location to make the experience more relevant from the user perspective and make the advertising ROI more tangible from the businesses' perspective.

 

The security challenge here is to maintain the privacy of this critical piece of user information so that it is accessible only with the strictest access controls. Loopt - a location based social-networking startup is still trying to recover from a privacy stumble as users accuse it of spewing text-message spam and disclosing user cell phone numbers and whereabouts without permission. The controversy is sure to be a forerunner of privacy battles to come, as GPS-enabled cell phones like the iPhone enable businesses to track -- and disclose -- where people are at any given moment.

 

Mobile commerce

The mobile handset as a device of commerce is already making headways in various parts of the world. From simple SMS based money transfer schemes - M-PESA is one such example in Kenya where a sixth of  the population is using this to initiate money transfers and fulfillment outlets dot the country's landscape to close this commerce cycle. One of the largest philanthropic foundation in the world - Gates' foundation  - has embarked upon a program called the Mobile Money for the Unbanked (MMU) program, which will work with mobile operators, banks, microfinance institutions, government and development organizations to encourage the expansion of reliable, affordable mobile financial services to the unbanked. In a number of countries in APAC, the PayWave technology is well entrenched whereby one can literally wave the handset and the transaction is completed using the NFC - near field communications - technology.

 

The security challenge here is to protect and indemnify this device against loss, maintain integrity of communication, exercise robust user and device authentication, maintain sanctity of the device in the face of viruses, malware, spyware and protect the accumulated  user transaction data with the strictest of controls

 

In these series of blogs, I have attempted to portray the various facets of the mobile revolution and their impact on the security. With a well strategized and executed  security stance, the mobile revolution will continue to enthrall consumers and bring in sound business opportunities to operators, content providers and eco-system players. However, if security is not factored in at the very beginning and becomes an afterthought, consumers and businesses alike will suffer immensely.

Post a Comment
Be sure to enter a unique name. You can't reuse a name that's already in use.
Be sure to enter a unique email address. You can't reuse an email address that's already in use.
Type the characters you see in the picture above.Type the words you hear.
About Security & Mobility Now

Discussing a wide range of topics impacting enterprises and
data center security.

Subscribe RSS Icon

Our Bloggers

Kyle Adams
Senior Software Engineer

Profile | Subscribe

Ritesh Agrawal
Director
Software Engineering

Profile | Subscribe

Erin K. Banks
Senior Technical Marketing Manager

Profile | Subscribe

Ajay Bharadwaj
Product Manager

Profile | Subscribe

Paul Bristow
Senior Director
Product Management

Profile | Subscribe

Michael Callahan
Vice President
Product Marketing

Profile | Subscribe

Henrik Davidsson
Director
Security Sales

Profile | Subscribe

Scott Emo
Director
Product Marketing

Profile | Subscribe

Mora Gozani
Senior Manager
Product Marketing

Profile | Subscribe

Steve Hanna
Distinguished Engineer

Profile | Subscribe

Ashur Kanoon
Sr. Manager
Technical Marketing

Profile | Subscribe

Seema Kathuria
Manager
Product Marketing

Profile | Subscribe

Kevin Kennedy
Senior Director
Product Management

Profile | Subscribe

Dave Killion
Software Engineer

Profile | Subscribe

Rebecca Lawson
Senior Director
Product Marketing

Profile | Subscribe

Rajoo Nagar
Senior Manager
Product Marketing

Profile | Subscribe

Erin O'Malley
Manager
Product Marketing

Profile | Subscribe

Galina Pildush
Strategy & Planning
Architect

Profile | Subscribe

Edward Roberts
Director
Product Marketing

Profile | Subscribe

Bill Shelton
Director Field Sales

Profile | Subscribe

Ashutosh Thakur
Product Line Manager

Profile | Subscribe

Troy Vennon
Software Engineer

Profile | Subscribe

Brad Woodberg
Product Manager

Profile | Subscribe

Labels
Copyright© 1999-2013 Juniper Networks, Inc. All rights reserved.