SlideShare a Scribd company logo
1 of 20
Download to read offline
Powered by
Smartphone Security
Assessment Results
As of Thursday, October 08, 2015
Responses accumulated by Lance Giles, http://www.linkedin.com/in/lgiles,
for UT Dallas Course MIS 6311: Cyber Security
Powered by
116 Total Responses
Sample margin of error ~ +/- 10 percent
(http://www.pewresearch.org/methodology/u-s-survey-research/sampling/)
Powered by
Q1: Select your smartphone below.
Answered: 116 Skipped: 0
Powered by
Q1: Select your smartphone below.
Answered: 116 Skipped: 0
Powered by
Q2: Do you currently use a screen lock (PIN, Password, biometric,
etc.) for your smartphone?
Answered: 116 Skipped: 0
Powered by
Q2: Do you currently use a screen lock (PIN, Password, biometric,
etc.) for your smartphone?
Answered: 116 Skipped: 0
Powered by
Q3: What type of screen lock do you use?
Answered: 83 Skipped: 33
Powered by
Q3: What type of screen lock do you use?
Answered: 83 Skipped: 33
Powered by
Q4: Select all the security Apps that you currently have on your
smartphone.
Answered: 115 Skipped: 1
Powered by
Q4: Select all the security Apps that you currently have on your
smartphone.
Answered: 115 Skipped: 1
Powered by
Q5: When you add an App to your smartphone, do you know what data
you provide to the App in exchange for using the App?
Answered: 114 Skipped: 2
Powered by
Q5: When you add an App to your smartphone, do you know what data
you provide to the App in exchange for using the App?
Answered: 114 Skipped: 2
Powered by
Q6: Select ALL the data below that you are UNwilling to give to an App in
exchange for using the App (select multiple options if they apply).
Answered: 104 Skipped: 12
Powered by
Q6: Select ALL the data below that you are UNwilling to give to an App in
exchange for using the App (select multiple options if they apply).
Answered: 104 Skipped: 12
Powered by
Q7: Do you use dual factor authentication for logging into email or
banking on your mobile devices?
Answered: 116 Skipped: 0
Powered by
Q7: Do you use dual factor authentication for logging into email or
banking on your mobile devices?
Answered: 116 Skipped: 0
Powered by
Q8: Do you store passwords on a non-encrypted 'Notepad' App or
software on your mobile device?
Answered: 116 Skipped: 0
Powered by
Q8: Do you store passwords on a non-encrypted 'Notepad' App or
software on your mobile device?
Answered: 116 Skipped: 0
Powered by
Q9: When do you update your Apps, browsers, or software on your
mobile devices?
Answered: 109 Skipped: 7
Powered by
Q9: When do you update your Apps, browsers, or software on your
mobile devices?
Answered: 109 Skipped: 7

More Related Content

Similar to Smartphone Security Assessment.LGiles2015

Best Effort Security Testing for Mobile Applications - 2015 #ISC2CONGRESS
Best Effort Security Testing for Mobile Applications -  2015 #ISC2CONGRESSBest Effort Security Testing for Mobile Applications -  2015 #ISC2CONGRESS
Best Effort Security Testing for Mobile Applications - 2015 #ISC2CONGRESSLostar
 
Avcomparatives Survey 2011
Avcomparatives Survey 2011Avcomparatives Survey 2011
Avcomparatives Survey 2011Anatoliy Tkachev
 
Vulnerability Analyst interview Questions.pdf
Vulnerability Analyst interview Questions.pdfVulnerability Analyst interview Questions.pdf
Vulnerability Analyst interview Questions.pdfinfosec train
 
Android App Security Solution
Android App Security SolutionAndroid App Security Solution
Android App Security SolutionJay Li
 
Passwordless is Possible - How to Remove Passwords and Improve Security
Passwordless is Possible - How to Remove Passwords and Improve Security Passwordless is Possible - How to Remove Passwords and Improve Security
Passwordless is Possible - How to Remove Passwords and Improve Security SecureAuth
 
Why Two-Factor Isn't Enough
Why Two-Factor Isn't EnoughWhy Two-Factor Isn't Enough
Why Two-Factor Isn't EnoughSecureAuth
 
Mobile App Testing: The Good, the Bad, and the Ugly
Mobile App Testing: The Good, the Bad, and the UglyMobile App Testing: The Good, the Bad, and the Ugly
Mobile App Testing: The Good, the Bad, and the UglyTechWell
 
SANS OUCH Newsletter April 2016
SANS OUCH Newsletter April 2016SANS OUCH Newsletter April 2016
SANS OUCH Newsletter April 2016Gene Ferro
 
Idge dell reignite2014 qp #2
Idge dell reignite2014 qp #2Idge dell reignite2014 qp #2
Idge dell reignite2014 qp #2jmariani14
 
The Human Side of Security
The Human Side of SecurityThe Human Side of Security
The Human Side of SecurityRandy Earl
 
Practical approaches to IoT security
Practical approaches to IoT securityPractical approaches to IoT security
Practical approaches to IoT securityTony Wilson
 
Splunk Discovery: Warsaw 2018 - Solve Your Security Challenges with Splunk En...
Splunk Discovery: Warsaw 2018 - Solve Your Security Challenges with Splunk En...Splunk Discovery: Warsaw 2018 - Solve Your Security Challenges with Splunk En...
Splunk Discovery: Warsaw 2018 - Solve Your Security Challenges with Splunk En...Splunk
 
W01 Levent Gurses X
W01 Levent Gurses XW01 Levent Gurses X
W01 Levent Gurses XMovel
 
Usability vs. Security: Find the Right Balance in Mobile Apps
Usability vs. Security: Find the Right Balance in Mobile AppsUsability vs. Security: Find the Right Balance in Mobile Apps
Usability vs. Security: Find the Right Balance in Mobile AppsJosiah Renaudin
 
Appknox Enterprise Offerings
Appknox Enterprise OfferingsAppknox Enterprise Offerings
Appknox Enterprise OfferingsAppknox
 
Security Survey 2013 UK
Security Survey 2013 UKSecurity Survey 2013 UK
Security Survey 2013 UKKim Jensen
 
Prevent Getting Hacked by Using a Network Vulnerability Scanner
Prevent Getting Hacked by Using a Network Vulnerability ScannerPrevent Getting Hacked by Using a Network Vulnerability Scanner
Prevent Getting Hacked by Using a Network Vulnerability ScannerGFI Software
 
OTO: Online Trust Oracle for User-Centric Trust Establishment, at CCS 2012
OTO: Online Trust Oracle for User-Centric Trust Establishment, at CCS 2012OTO: Online Trust Oracle for User-Centric Trust Establishment, at CCS 2012
OTO: Online Trust Oracle for User-Centric Trust Establishment, at CCS 2012Jason Hong
 
Asset management for cybersecurity
Asset management for cybersecurityAsset management for cybersecurity
Asset management for cybersecuritynathan-axonius
 

Similar to Smartphone Security Assessment.LGiles2015 (20)

Best Effort Security Testing for Mobile Applications - 2015 #ISC2CONGRESS
Best Effort Security Testing for Mobile Applications -  2015 #ISC2CONGRESSBest Effort Security Testing for Mobile Applications -  2015 #ISC2CONGRESS
Best Effort Security Testing for Mobile Applications - 2015 #ISC2CONGRESS
 
Avcomparatives Survey 2011
Avcomparatives Survey 2011Avcomparatives Survey 2011
Avcomparatives Survey 2011
 
Vulnerability Analyst interview Questions.pdf
Vulnerability Analyst interview Questions.pdfVulnerability Analyst interview Questions.pdf
Vulnerability Analyst interview Questions.pdf
 
Android App Security Solution
Android App Security SolutionAndroid App Security Solution
Android App Security Solution
 
Passwordless is Possible - How to Remove Passwords and Improve Security
Passwordless is Possible - How to Remove Passwords and Improve Security Passwordless is Possible - How to Remove Passwords and Improve Security
Passwordless is Possible - How to Remove Passwords and Improve Security
 
Why Two-Factor Isn't Enough
Why Two-Factor Isn't EnoughWhy Two-Factor Isn't Enough
Why Two-Factor Isn't Enough
 
Mobile App Testing: The Good, the Bad, and the Ugly
Mobile App Testing: The Good, the Bad, and the UglyMobile App Testing: The Good, the Bad, and the Ugly
Mobile App Testing: The Good, the Bad, and the Ugly
 
SANS OUCH Newsletter April 2016
SANS OUCH Newsletter April 2016SANS OUCH Newsletter April 2016
SANS OUCH Newsletter April 2016
 
Idge dell reignite2014 qp #2
Idge dell reignite2014 qp #2Idge dell reignite2014 qp #2
Idge dell reignite2014 qp #2
 
The Human Side of Security
The Human Side of SecurityThe Human Side of Security
The Human Side of Security
 
Practical approaches to IoT security
Practical approaches to IoT securityPractical approaches to IoT security
Practical approaches to IoT security
 
Splunk Discovery: Warsaw 2018 - Solve Your Security Challenges with Splunk En...
Splunk Discovery: Warsaw 2018 - Solve Your Security Challenges with Splunk En...Splunk Discovery: Warsaw 2018 - Solve Your Security Challenges with Splunk En...
Splunk Discovery: Warsaw 2018 - Solve Your Security Challenges with Splunk En...
 
W01 Levent Gurses X
W01 Levent Gurses XW01 Levent Gurses X
W01 Levent Gurses X
 
Usability vs. Security: Find the Right Balance in Mobile Apps
Usability vs. Security: Find the Right Balance in Mobile AppsUsability vs. Security: Find the Right Balance in Mobile Apps
Usability vs. Security: Find the Right Balance in Mobile Apps
 
Appknox Enterprise Offerings
Appknox Enterprise OfferingsAppknox Enterprise Offerings
Appknox Enterprise Offerings
 
Security Survey 2013 UK
Security Survey 2013 UKSecurity Survey 2013 UK
Security Survey 2013 UK
 
Security survey2013 en
Security survey2013 enSecurity survey2013 en
Security survey2013 en
 
Prevent Getting Hacked by Using a Network Vulnerability Scanner
Prevent Getting Hacked by Using a Network Vulnerability ScannerPrevent Getting Hacked by Using a Network Vulnerability Scanner
Prevent Getting Hacked by Using a Network Vulnerability Scanner
 
OTO: Online Trust Oracle for User-Centric Trust Establishment, at CCS 2012
OTO: Online Trust Oracle for User-Centric Trust Establishment, at CCS 2012OTO: Online Trust Oracle for User-Centric Trust Establishment, at CCS 2012
OTO: Online Trust Oracle for User-Centric Trust Establishment, at CCS 2012
 
Asset management for cybersecurity
Asset management for cybersecurityAsset management for cybersecurity
Asset management for cybersecurity
 

Smartphone Security Assessment.LGiles2015

  • 1. Powered by Smartphone Security Assessment Results As of Thursday, October 08, 2015 Responses accumulated by Lance Giles, http://www.linkedin.com/in/lgiles, for UT Dallas Course MIS 6311: Cyber Security
  • 2. Powered by 116 Total Responses Sample margin of error ~ +/- 10 percent (http://www.pewresearch.org/methodology/u-s-survey-research/sampling/)
  • 3. Powered by Q1: Select your smartphone below. Answered: 116 Skipped: 0
  • 4. Powered by Q1: Select your smartphone below. Answered: 116 Skipped: 0
  • 5. Powered by Q2: Do you currently use a screen lock (PIN, Password, biometric, etc.) for your smartphone? Answered: 116 Skipped: 0
  • 6. Powered by Q2: Do you currently use a screen lock (PIN, Password, biometric, etc.) for your smartphone? Answered: 116 Skipped: 0
  • 7. Powered by Q3: What type of screen lock do you use? Answered: 83 Skipped: 33
  • 8. Powered by Q3: What type of screen lock do you use? Answered: 83 Skipped: 33
  • 9. Powered by Q4: Select all the security Apps that you currently have on your smartphone. Answered: 115 Skipped: 1
  • 10. Powered by Q4: Select all the security Apps that you currently have on your smartphone. Answered: 115 Skipped: 1
  • 11. Powered by Q5: When you add an App to your smartphone, do you know what data you provide to the App in exchange for using the App? Answered: 114 Skipped: 2
  • 12. Powered by Q5: When you add an App to your smartphone, do you know what data you provide to the App in exchange for using the App? Answered: 114 Skipped: 2
  • 13. Powered by Q6: Select ALL the data below that you are UNwilling to give to an App in exchange for using the App (select multiple options if they apply). Answered: 104 Skipped: 12
  • 14. Powered by Q6: Select ALL the data below that you are UNwilling to give to an App in exchange for using the App (select multiple options if they apply). Answered: 104 Skipped: 12
  • 15. Powered by Q7: Do you use dual factor authentication for logging into email or banking on your mobile devices? Answered: 116 Skipped: 0
  • 16. Powered by Q7: Do you use dual factor authentication for logging into email or banking on your mobile devices? Answered: 116 Skipped: 0
  • 17. Powered by Q8: Do you store passwords on a non-encrypted 'Notepad' App or software on your mobile device? Answered: 116 Skipped: 0
  • 18. Powered by Q8: Do you store passwords on a non-encrypted 'Notepad' App or software on your mobile device? Answered: 116 Skipped: 0
  • 19. Powered by Q9: When do you update your Apps, browsers, or software on your mobile devices? Answered: 109 Skipped: 7
  • 20. Powered by Q9: When do you update your Apps, browsers, or software on your mobile devices? Answered: 109 Skipped: 7