1 / 13100%
The security measures that Shareen can setup on her phone are she can set a lock
on her phone to stop access from it outside of herself and she can setup private
folders that are password protected. In order to setup a lock for her phone she will
need to go into her settings then to security down to device security and decide
what security she wants to use whether it be a screen lock, fingerprint, face key or
smart lock. I recommend the fingerprint because even if they get her phone they
won't have access to her fingers. The second security feature would be to create a
hidden folder. She will need to go to her file manager on her smartphone then to
create a new folder. From there she needs to name the folder of her choice and add
a dot to make the folder hidden. Once she has done that she can transfer all the
files needed to that folder. If she already has the files in a folder on her phone then
she can hide the existing folder. There are a couple security measures that Shereen
can take to secure her device. One of the first security measures Shereen can take is
having multiple devices. She should separate her professional phone from her
personal phone. This is only a precautionary measure but because there are so many
different ways that hackers or people who want to get into your phone can do so.
Hackers don’t need to actually steal your device to gain access to your information.
Electronic data theft has become one of the biggest risks that reporters face. Because
of this it important for Shereen to encrypt your phone. By encrypting your phone
you are storing your phone’s data in an seemingly scrambled, unreadable form. It
protects your sensitive data from the likes of those hackers, etc. Locking your phone
with a password or pattern makes it a little harder to get into. Shereen should make
sure this password is strong and isn’t used across multiple platforms because that
recycling passwords can make it easier to figure out and get into. If I was Shereen
and someone attempted to steal my phone to stop my story. First, I would make
should my phone had a password where it wasn’t easy to hack into or set up the
fingerprint security or the face id. Second, I would make sure I had a security app
like avast security or something like that. Some security app that would do scans on
my phone to ensure nothing encrypting would compromise my phone. I would also
make sure my phone is backed up to a cloud so in case my phone does get stolen
I have that information available to continue with my story. If I was Shereen, I
would first start by setting a passcode on my phone. Be sure to choose a number
you would remember but also not a number in sequence such as, 123456. I know
on iPhone you have the choice of choosing any you want. On android you can do
something like a dot-to-dot puzzle. If I had very important information on my
phone, I would choose an alphanumeric option. It is as simple as going into settings
and choosing the passcode menu and setting one there. After choosing a passcode
Shereen should ensure her phone is backed up into a cloud service. Doing so would
be beneficial in case the phone was stolen she would still have a copy of her story
to access. I would be sure to have two-factor authentication set up for the could
service as well, so only she can access it and would know if someone else was
trying to. Lastly, she should make sure she has find my iPhone turned on (or
whatever is equal for android) so she can either find the phone or delete the
information off of it. Complex password protection on your mobile device can help
limit some risk. A passphrase is better than a password, but something like
"fdfdf&%*GHmkfdfiooa.%$dl827**hsoH" is even better. Password crackers and
dictionary attacks can crack words that are known, eventually. The trouble is
complex passwords are impossible to remember. Password managers like Norton can
help. As an executive reporter who's task may require obtaining confidential
information for her stories, Shereen should be familiar with the best phone options
available on the market today that would meet her requirements, allows customization
of security measures that deny access of the phones data and all its contents. As a
significant percentage of the worlds cell phone users know, Apple phones have been
at the top for many years with the iPhone's reputation of being very secure.
Shereen's best option would be setting up multiple lock-screen options. In order to
do so, Shereen will have to go the the phones settings and scroll until she sees the
"face ID & passcode options. From there, She could set up a facial recognition that
only responds and unlocks the phone when the camera recognizes her facial features.
once the phone recognizes Shereen, it would then require a custom pin to be entered
that she created. If the correct pin is entered, access to the phone may then be
available. If Shereen does the lock-screen security options as well as makes sure to
guard that phone at all times, the phone should remain safe of unauthorized users
accessing any files stored on the phone. Since Shereen is working on a major cover
up story for her job as an executive reporter, she must be cautious and attempt to
keep her phone in her immediate possession when in public. Unfortunately, there is
the risk of it still being stolen, for extra security measures Shereen should back up
the information on a cloud service and encryption with authentication security.
Backing up the information to a cloud service is vital to reducing the risk of
completely losing the information. In the cloud service she can set it up with
password protection to allow access only to her. Second encrypting her device with
security authentication such as fingerprint recognition and depending on her mobile
phone even facial recognition. With these forms of security, she can create a
stronger password that she will not have to type in on the daily but will be
complex for a cyber criminal from cracking it easily. When setting up the security
protocols she can enable her phone to be wiped out completely after so many failed
password attempts. This will help keep the information from getting to the wrong
hands if it was not stolen from a cyber criminal and help keep it out of their
hands. 2 types of security measures Shereen can take to secure her mobile device
are putting a very strong password on the device with biometrics on the device. She
should take advantage of the back up services offered by IOS which is iCloud or
Google Drive for android devices. Having either of these services with a strong
password would help for her to not only have her information backed up, but also
make the theft of information very unlikely. Another thing that she might want to
look into is a security application that has a remote wipe feature on it. My work at
AT&T uses MobileIron which allows the remote wiping of devices at any time that
you can set from any phone or PC. It also has security features requiring a strong
password that has to be changed at time intervals. MobileIron also will wipe the
device if the password is entered in wrong to many times. Having an application
like this would make it unlikely that any information would be able to be taken.
Also, since she would be using back up services it would make it that she would
be able to retrieve the data. The first security measure that Shereen should consider
is mobile data encryption. Encrypting her data is a viable option to mitigate the risk
of data breaches on personal devices by adding an additional layer of protection.
Doing so would be useful for protecting sensitive data. The second security measure
that Shereen should take would be to back up her mobile data. By connecting her
device to her associated cloud service, her data would be backed up automatically.
She could also connect to a PC to sync data and other files.To encrypt iphone: 1)
Go to settings-touch ID & Passcode 2) Press "Turn Passcode On" 3) Press "Passcode
options" 4) Confirm your device is encrypted by scrolling to the Settings-Touch ID
& Passcode screen. You should see the "Data protection is enabled" message.How to
backup with icloud: 1) Connect your device to a Wi-Fi network 2) Go to Settings-
(your name), and tap icloud 3) Tap icloud backup 4) Tap Backup Now, stay
connected to your Wi-Fi network until the process is completed.
2 security measures Shereen can take to secure her mobile device are Back
up/Restore and Authentication.
For ios devices, it would be as easy as making sure the back up option and icloud
was turned on. This would allow the device to back up your important content to
the cloud. This would in turn allow you to restore these files from cloud if the
device ever needed to be reset. For android devices, you would want to make sure
the google email address that you set up on the phone was syncing properly with
google. There is also an option where you can have devices factory reset in case the
password was put in wrong after multiple attempts.As far as authentication is
concerned, I would highly recommend a complex password to get into the device.
There are a variety of ways to do this. Whether it is an actual password containing
letters and numbers, PIN, or a pattern would help prevent anyone from accessing the
contents of the mobile device. This is the easiest and most common way. A security
measure that Shereen should take is authentication, this will prevent unauthorized
user to gain access to a lost or stolen mobile phone. Since she is will have valuable
information,, this method should be used to prevent unwanted users to gain access to
her phone. Two-factor authentication will help because a user will have two ways to
prove their identity. An I-Phone user can authenticate their phone by, setting up pin
number. Can also, set up a pattern or face recognition. xx
Backing up her files would be the smartest solution. that is another security measure
that should be taken.
Shereen should back up files because she can back them up to her PC, If she has
an iPhone or iPad, etc. She can back up her phone by using iCloud. First of all
iCloud is free. when backing up files, Shereen should go through settings, then to
passwords, & Accounts, mail, contracts, calendars etc. can been seen if synced.
Shereen can go back to settings and tap on the Apple ID tab, simply tap on iCloud,
scroll down and tap iCloud Backup, enable iCloud Backup and then tap Back Up
Now to start. This process will help with Shereen's issue. Encryption and Backup are
the most important steps to take when using a mobile device with sensitive data,
and that goes for personal data as well I recently had to pay around $800 to restore
some data from a laptop that I did not back up.The mobile device IOS would have
a role on how to set up those security measures for example if it was an Apple
phone the backing up your data to then cloud by paying a fee and having a storage
limit while securing it with your account password and username and having access
to it from any other device which personally I feel that it is more secure than any
other IOS, with Android you can always use google services to store your data and
have it available whenever you need it.In general I would not install any applications
that I do not really need on my phone just because of the amount of access they
get to your personal device and you can actually see it when you check the app
permissions and some apps would not work unless you give them that type of
access so it is all about being aware and having more sense of security. The first
step Shereen should do is backup all of her information in cloud storage. By doing
this she can access her information other devices (Laptops, Tablets, etc..) just in case
her phone is stolen or lost. When the data is stored on the cloud it offers higher
security and fewer chances of data loss. Cloud storage is easy to download and can
work on both IOS and Android.The second step Shereen should do is create a
strong password with biometric features. A strong password would make it difficult
for someone to infiltrate your phone. Do not create a password that has your
birthday, or repeated passwords from other apps. With the biometric feature Shereen
should set up a fingerprint authenticator or face id recognition. Furthermore Shereen
change her password from time to time.
If Shereen is out in public and happens to use public Wi-Fi and is not sure about
the security status I would recommend using a VPN (Virtual Private Network). A
VPN will enable you to connect to a network securely and will be shielded from
sites less secure and prone to attacks. The first thing Shereen should do is back up
all of her files on an exterior source. This is most conveniently done by utilizing
cloud storage. However, I'm personally a fan of having hard copies on hand, such as
copying all phone documents over to a computer and/or thumb drive. This provides
access without and internet connection. This is a right click option on many PCs
and should go without a hitch.
The second thing she should do to protect her files is to encrypt them. This can be
done by moving all files into a folder, configuring all the data to be opened only
with a particular key or code, and creating a passcode for it. This not only prevents
anyone from entering the folder without permission, but it prevents other users from
opening the folder, even if it were to move devices.Third and most important thing
she can do is to physically protect her phone. Creating a passcode to get on,
keeping it on your person and not on tables or desks, and staying aware from any
suspicious and untrustworthy sites while surfing on her phone to avoid malware form
stealing any credible information. There is a few non expensive ways for Shereen to
secure her information. Since her only file is in her mobile phone she could benefit
greatly from filing a copy into her cloud storage. There is passwords to access the
storage clouds making a reliable source in a case where she feels her cell phone has
been compromised. Paired with a remote wipe she would be safe. The remote wipe
will automatically erase all contents of the physical phone but not the cloud after
failed attempts to enter without proper passwords or biometric authentication methods.
Another great thing she can do is install an antivirus software. Softwares like
McAfee had encrypted options to secure the photos and files on someone device.
Just download the mobile app pay the fee required to keep her phone safe from
spyware. In the settings make sure to click on media vault. This will encrypt with a
password her photos and files.There are apps specifically designed to throw snoopers
off. There are secret apps that can look like calculators that store files under an
encryption. The thief may be able to bypass the device password but won’t
necessarily know where to look for this important story. Especially when there
disguise as calculators, wallpapers, or games. There compatible with Androids and
IOS systems making it a good alternative. I would recommend to use a cloud
service to back up any data stored locally on the phone. Most cloud services like
One Drive has a way of encrypting data stored by using its “Vault” feature. This
allows the user to encrypt anything stored by moving it into the vaulted section of
the One Drive directory.Encryption on the phone itself is also important. With most
devices the user would be able to use a pin and biometric data to lock and unlock
the device. Although it’s common for mobile devices to have a native way to
encrypt data, 3rd party software like some antivirus also provides that option in case
there is a need for an extra layer of protection. Lastly mobile devices have the
option to be remotely managed, meaning if the device gets lost then there is a way
to lock and/or perform a device wipe. iPhone offers this to their consumers via the
“Find my phone” app. Android users also have a version of this ability. The main
course of action for Shereen isn’t keeping the physical phone safe but the storage of
the data. If Shereen moves the information she has on to a flash drive as well as
uploading the information to her cloud storage. This will allow for her data to be
safe regardless of who has the physical asset and will allow Shereen a little more
peace of mind as she carries on with her day-to-day business. In todays age keeping
your phone safe isn’t about the actual phones so much as what data we store on it.
We have everything now on our phones bank info, personal info, birthdays, as well
as information about our friends and family. I found a great article that cover the
steps needed to protect all aspects of your information in your day to day life. The
two security measures Shereen can take to secure her mobile device is to encrypt
and back up her data to a third party cloud server.By encrypting her phone with
passwords, facial recognition, and fingerprint scans, Shereens phone is more secure in
phone gets stolen. The thief won't be able to access the data on her phone. The
only way the thief could get access is if they know her pin or knows her security
questions to bypass her pin. The second measure that Shereen should do is backup
all of her data with a trusted third party cloud service provider. These are relatively
inexpensive to have and provides a safe haven in case of her phone gets stolen. In
the case Shereens phone gets stolen, she can contact her cell phone provider and get
her stole disabled/blacklisted using her phones IMEI number. This will prevent the
thief from using the phone. Since all of her data is backed up, the cellphone
provider can wipe the stolen phone's data and her new phone can retrieve all the
previous phones data. One of the best ways to secure data on a mobile device is by
using cloud services. Cloud services have become very cheap in recent years and
some even give free small amounts of storage just for signing up with their services.
for example, if you sign up with Google, they offer 15GB of storage for free with
every account to be shared across Drive, Gmail, and photos. This should be plenty
enough storage space to store information in the case of something happening her
phone gets stolen. All you need to do is create a Google account and then
download the Google Drive app on your phone and then upload it to your account.
Once you have done that you can access it from anywhere that you can access your
Google account. Another way of securing your information is to save it locally on
an external device. This could be a computer or a micro SD card that you can take
out at will. If you have a slot for your sd card all you need to do is insert it into
the phone and then you can copy over all of the critical information that you need
to be secured. Once you have it on the sd card then you can take it out of the
phone in the case of someone stealing it. It can then be inserted back into the
phone whenever you need to access it again. Many devices have different ways to
secure them. One way is by using a password or a pin. This is less secure than
something like biometrics but it keeps your phone secure enough that it cant be
accessed easily. Some devices even allow you to require a password before it will
boot and then also require a password to unlock the screen. This type of double
security will keep anyone from getting into your phone. The first and most obvious
approach is going to secure her phone with a strong password and a biometric
feature, such as Face ID or finger print unlocking if her phone supports it. Next is
making sure that her phones encryption feature is turned on. Most phone insurance
plans include McAfee device protection, I recommend either purchasing protection for
her phone or seeing if her insurance plan includes it.If she has an iPhone she can
go into the find my iPhone settings and set it up so that she can remotely track her
phone from another device. In the find my iPhone app she can also have settings in
place in the event her phones lost or stolen, such as erase this device which allows
you to remote wipe it, mark as lost which will lock your device and make it so
that whoever has it can only contact you, and play sound Incase you think it’s still
nearby you can play a continuous sound. Android also offers a similar app called
Find My device.She should also use a cloud service to help backup her data in the
event she has to wipe her device. I think encryption on the phone and saving IMEI
numbers are two major important things Shereen should do. On a phone that means
your photos, text conversations, emails and documents. Encryption stores information
in a scrambled format, typically unreadable by computers or people without a key
(which only the device's owner should know) to unlock the data. PIN codes (of
numbers, letters or a combination of both) and fingerprints are just two of many
examples of keys used to unlock an encrypted device.
Indeed, the practice of encryption is far more technical than requiring a PIN code
or fingerprint to unlock a device.Shereen should have IMEI number saved which
would help incase of phone stolen, The primary reason that IMEI numbers are
important is their ability to help track down and secure lost or stolen phones. The
International Mobile Equipment Identity number (IMEI) is used to identify a device
that uses cellular networks. Primary purpose of IMEI numbers is to identify mobile
devices. Their secondary purpose is to prevent theft of mobile devices. IMEI
numbers are hard-coded into device hardware, making it nearly impossible to change
them without harming the device. Importance of IMEI Number IMEI number is
important for variety of reasons. IMEI allows cellphone providers to track the usage
of mobile phones, identify subscribers, and the type of gadget used by them. It also
allows the service provider to remotely disable or blacklist a stolen phone. The first
thing Shereen should do is make sure encryption is enabled on the phone. These
days it is typically done by default but she should make sure it has not been
turned off. Next she should use a good password that is not easy to guess. Once
that is done she should setup access to the phone with biometrics. Using face
recognition or a finger print reader would be ideal. I think in the past there has
been some issues with those types of security features being easily broken into but
I think those issues have been resolved. Password and biometric features can be set
up in the phones security settings. Once she selects those options the phone will
start a wizard that will walk her through the settings. Typically, a password or
pattern has to be selected before enabling biometrics in case it fails you can always
use the password to get in. In the case of the phone being lost or stolen those
measures will help keep the data secure. I also think she should also install an
application that can track the phones location. That would give her the ability to
find it. Taking all of those measures would help to secure the phone and give her
the ability to find it. Sheered should apply as many security measures as possible
to protect the phone in the event of theft. Depending on the type of the Mobile
Operating System, Sheered may have different options. The first is applying a
password and biometrics (face screening or fingerprint scanning) if available. She
should also back up all files maybe to the cloud so she can easily access them.
Another security measure would be to purchase a "find me" feature for the phone.
If the phone is lost or stolen, a find me application will locate it. Sheered could
also apply a password to the SIM card to make the phone unusable without the
password. All of the security measures can be set up in the settings area of the
phone under security, privacy, and accounts and backup. Simply follow the onscreen
prompts to set up additional security for the phone. Purchase an application for
finding the phone should it go missing as opposed to using one for free. The free
applications potentially come with their own set of security issues, and you will get
a better product if you invest the money and purchase it. This is one of the major
important item that she keep this information close to her. The one thing I would
say is make sure that she has a password on her phone that no one knows about.
She does not need to use a password that can be easy such as her birthday, last
four of her SSN, or something that someone knows about. This is important not
only for her to keep this information secure but if she has other information on the
device. The way that phones are now setup it has face ID which is one of the
major advantage that phones has on it. The second major secure is if she is using
Wi-Fi making sure that she is using something secure and something that is
protected. If she is not using a network that is secure she risk getting her
information stolen and this could not only be just the information she looked up or
gather up this can hurt her and someone will steal the information and use it for
themselves.
Students also viewed