mobile risk

FrontlineSMS User Guide on Data Inegrity

Posted by ccarlon on Sep 16, 2011
FrontlineSMS User Guide on Data Inegrity data sheet 107 Views
Author: 
Lugo, Kristina and Carol Waters
Publication Date: 
Aug 2011
Publication Type: 
Report/White paper
Abstract: 

FrontlineSMS is a software platform that enables structured communication via text messaging, using only a computer and a mobile phone or GSM (Global System for Mobile) modem. The platform enables two-way messaging between users and groups of people via mobile networks without the need for an Internet connection.

The purpose of this guide is to provide users with a framework to understand, analyze, and address the vulnerabilities, risks and threats that can affect the integrity of the information communicated through the FrontlineSMS platform. That said, mobile networks are inherently insecure and end users are only able to mitigate, as opposed to prevent, a significant number of the possible threats to data integrity. While there are a large number of ways that user information can be lost, altered, stolen, changed, or read by third parties, this guide focuses on the ways that users experience information corruption and steps that they can take to mitigate individual threats. This guide is intended to be a useful resource and framework, but is not intended to be comprehensive or prescriptive.

Users and potential users have different needs for protecting sensitive information. The goal of this guide is to outline the actions that can be taken to mitigate the risks posed by information being lost, changed or read by unauthorized third parties. However, it is important to recognize that FrontlineSMS may not be an appropriate tool to use in some environments where data integrity needs go beyond the capabilities of the platform and SMS itself, and that incautious use may put the organization, program and users at risk.

FrontlineSMS does not define the exact details of how users should deploy the software or address issues of data integrity. Users should evaluate their individual program goals, standards, and operating context to decide on the steps that should be taken to protect the integrity of their information


A Guide to Mobile Security Risk Assessment

Posted by SaferMobile on Jun 10, 2011
A Guide to Mobile Security Risk Assessment data sheet 4249 Views
Author: 
SaferMobile
Abstract: 

You are an activist, rights defender, or journalist. You use a mobile device. And you work in sometimes risky situations in your country. This guide will help you implement mobile security practices in your work. It will help you assess the particular risks that face you and then assist you in developing a plan to mitigate those risks.

Location

safetyicon

You are an activist, rights defender, or journalist. You use a mobile device. And you work in sometimes risky situations in your country.

This guide will help you implement mobile security practices in your work. It will help you assess the particular risks that face you and then assist you in developing a plan to mitigate those risks. First, we'll cover some of basic concepts. Then, in the second part of this guide, we'll take you through developing your own risk assessment in 5 steps.

We have previously published a Mobile Risk Primer that describes general security vulnerabilities associated with mobile technology and communication. Read it!

Throughout this guide, we'll also highlight the fictitious case of Asima, a blogger and activist in Egypt. Examples of how Asima might complete the assessment worksheet and create a security plan for her work are highlighted in this guide.

Asima lives in Cairo, Egypt and is a blogger and an activist. She used to maintain a blog on Blogspot, but now mostly uses Facebook and Twitter to follow current events, to share information, and to communicate with colleagues. She tweets from her mobile phone while in traffic and at cafes and protests and from her computer when she is at work or at home.