Will the iPhone be a Security Nightmare?: Page 2

(Page 2 of 2)

And then there’s the security configuration of the base operating system. In the desktop version of OS X, the user can turn on and off firewalling, for example. What’s the default configuration on the iPhone, and will the user have any ability to change it? Again, I’m hoping for an opt-out configuration that defaults to secure and requires the user to override if she chooses to.

Recent Alignment Articles
Spammers Find New Ways Around Filters

Vista Exploit Looking For Achilles' Heel

Spam Bust: The Lessons of Yesmail

Symantec Overhauls System Backup Suite

FREE IT Management Newsletters

After all, the iPhone speaks Wi-Fi and runs UNIX – it is an Internet-connected host just like any other when connected to a network at your favorite coffee shop or airport lounge. Many of the same issues regarding safely configuring a UNIX server on the Internet are entirely relevant to configuring this little hand-held device, but we know precious little so far about it.

By all accounts, the iPhone sure looks like it’s going to be an incredible device. Indeed, if it were available on my mobile provider, I’d be getting one myself. My concern, however, is that there are so many security unknowns here that there could be trouble ahead.

I should point out that, up until about a month ago, I was using a Linux-based smart phone for my own mobile needs. It seemed to me to be quite secure from a network standpoint, but lacked any consumer-level mechanism for installing security updates. That was one of the primary reasons why I moved to a different device. But in popularity terms, that phone paled in comparison to what the iPhone is likely to hit in its first week in the market.

I, for one, hope our security expectations are in line with our functional expectations. I also hope that the smart folks at Apple have thought these issues through thoroughly and they’re ready to knock our socks off on all fronts. It’ll be an important lesson for the entire mobile device community to learn from.

Page 2 of 2

Previous Page
1 2

0 Comments (click to add your comment)
Comment and Contribute


(Maximum characters: 1200). You have characters left.



IT Management Daily
Don't miss an article. Subscribe to our newsletter below.

By submitting your information, you agree that datamation.com may send you Datamation offers via email, phone and text message, as well as email offers about other products and services that Datamation believes may be of interest to you. Datamation will process your information in accordance with the Quinstreet Privacy Policy.