Mobile Security Investigation Report

Verified

Added on  2020/02/03

|5
|620
|78
Report
AI Summary
This report analyzes security threats on WhatsApp, focusing on the WhatsSpy application. It details how WhatsSpy compromises user privacy by exposing profile information even with privacy settings enabled. The report identifies the vulnerability as the ease of obtaining phone numbers and the need for a rooted phone to use the app. The report suggests control measures including developing tools to hide user numbers and implementing stricter policies against number sharing. However, it acknowledges the limitations of completely preventing number sharing and the time required to implement new security systems.
Document Page
Running head: Mobile Security Investigation 1
Mobile Security Investigation
(Name)
(Course)
(Instructor)
(Date)
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Mobile Security Investigation 2
Mobile Security Investigation Part I
Title: Security Threats on WhatsApp Bring Spy Apps into the Limelight
Author: Zak Mustapha
Reference Details: Mustapha, Z. Security Threats on WhatsApp Bring Spy Apps Into the
Limelight. Retrieved from < http://www.huffingtonpost.com/zak-mustapha/security-threats-on-
whats_b_11302266.html >. [Date accessed 26th October 2016].
Brief Summary
The article addresses several issues that are affecting WhatsApp making it a threat to all its users.
The author talks of the message crushing threat, the ability to snoop on other users and the weak
privacy settings that are made possible through WhatsSpy an application available online.
Information asset
The information that one has to have to make use of this application is a person’s phone number.
These phone numbers can be got from the large WhatsApp groups or stealing it from a person’s
device.
Threat
One has to have an alternative WhatsApp account to have the app. Also, a routed mobile phone
is needed. Once this is achieved the spy will just be asked to add the number of their victim to be
able to trace all the activities of a person’s WhatsApp account.
Vulnerability
Once the spying app is on, the spy can see when the victim logs into their accounts. Despite the
privacy settings of an individual’s WhatsApp being on, important information like their
username, profile picture and status can be easily displayed on WhatsSpy dashboard of the
hacker. This compromises the security goal of privacy and confidentiality of the application.
Security incident
The article explains how the application can be used. Once one has obtained the number or, they
can be able to trace the activities of all individuals that are in their number list. Through this one
can go ahead to establish relevant connections between different people. This can prompt the spy
to initiate blackmail or even a kidnaping.
Document Page
Mobile Security Investigation 3
Mobile Security Investigation Part II
Introduction
The breechings through WhatsSpy are of concern. The app can allow one to freely have access to
an individual’s timeline activities including status and profile picture even if one has set it to be
visible to specific people.
Suggested Control Measures
To protect the user’s phone numbers, the technical staff and the entire Facebook staff and
management should include strategies on coming up with a tool that hides the number of an
individual on their profile and also on any WhatsApp group they are (Shuaibu & Bala 2016).
In making the users less vulnerable, there should be a policy that is set by any possible means of
making an individual’s number public. One should have the sole authority over their personal
numbers (Shuaibu & Bala 2016).
Prevention of the number is the key item. If the policy against number sharing and number
disclosure on WhatsApp are maintained then, all will be protected.
Limitations
It will take a lot of time for WhatsApp management to come up with a new system that protects
their user’s numbers. More so, it’s hard to ensure that there are zero cases of number sharing
among people.
Reference
Shuaibu, M. Z., & Bala (2016) , A. GLOBAL JOURNAL OF ADVANCED ENGINEERING
TECHNOLOGIES AND SCIENCES WHATSAPP FORENSICS AND ITS
CHALLENGES FOR ANDROID SMARTPHONE.
Document Page
Mobile Security Investigation 4
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Mobile Security Investigation 5
chevron_up_icon
1 out of 5
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]