Verified Document

Security In The News Senate Discussion Chapter

The bottom line is that remote workers and telecommuting is the new battlefield of corporate IT security. Only by creating a flexible enough series of guidelines that can flex to the needs of workers while staying agile enough to respond to changing threats can organizations hope to stay ahead of the many threats to their information assets. STEP 3: SECURITY RISK: SIRI

Apple is renowned for their rapid pace of innovation and the continual pursuit of the perfect user experience on their many devices including their best-selling iPhone series. The latest iPhone 4S has added a voice-activated agent called SIRI which can easily complete complex tasks, which has also created a major security threat for its users as well. Industry experts have been able to bypass the security on the new SIRI feature and gain access to confidential data. Being able to gain access to debit and credit card information, Virtual Private Network (VPN)...

Apple has always strove to create devices that get the roadblocks out of the way for users, yet in this instance they have streamlined the security too thin.
When an iPhone can be compromised with voice commands alone, there is cause for concern. Compounding this is the sheer number of devices Apple sells and their leadership position in enterprise computing globally. Apple needs to take their personalization technology a step further and add in checks for identity and consider biometrics for their iPhones as well. Biometrics would be even more distinct and difficult to replicate compared to voice-activated commands and could save both iPhone users and the companies they work for literally millions of dollars a year.

Cite this Document:
Copy Bibliography Citation

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now