Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

Unit 1 MWS

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 22

UNIT-1

SECURITY ISSUES IN MOBILE COMMUNICATION


Mobile computing provides a variety of wireless devices that has the mobility to allow
people to connect to the internet. It provides wireless transmission to access data and
information from the locations they are stored.

There are mainly three aspects of Mobile computing

o Mobile communication: This aspect specifies the communication issues in ad-


hoc, infrastructure networks, communication properties, protocols, data formats
and concrete technologies.
o Mobile hardware: This aspect specifies the mobile devices or device
components that are used in mobile computing.
o Mobile software: This aspect specifies all the necessary files and software related
to the computer used in mobile computing.

As we know that mobile computing is the communication between computing devices


without any physical connection between them, we use wireless networks to establish
connections in mobile computing. So there are always some chances of threats and
security issues due to wireless connections.

Mobile Computing faces many improper and unethical practices and problems such as
hacking, industrial espionage, pirating, online fraud and malicious destruction etc. The
threats and security issues of mobile computing can be divided into two categories:

o The security issues that are related to the transmission of information over
wireless networks.
o The security issues and threats that are related to information and data residing
on mobile devices.
GENERAL SECURITY ISSUES
There are mainly five fundamental goals of security used in the information system to
deal with security issues. They are:

Confidentiality

This is used to prevent unauthorized users from gaining access to any particular user's
critical and confidential information.

Integrity

This is used to ensure that any type of unauthorized modification, destruction or


creation of information cannot be done.

Availability

The availability is used to ensure that authorized users get the required access whenever
they need it.

Legitimate

This is used to ensure that only authorized, and legitimate users have access to the
services.

Accountability

Accountability is used to ensure that the users will be responsible for their security-
related activities by arranging the users and their activities in a linked form.\

We have to achieve these goals according to the security policy used by the service
providers.

WIRELESS SECURITY ISSUES


Wireless security issues are considered as the primary security issues of mobile
computing. These are related to wireless networks. These issues occur when the hackers
intercept the radio signals. Most wireless networks depend on other private networks,
which are managed by others, so the users have less control of security procedures after
these issues. These security issues are:
Denial of Service (DOS) attacks

The denial of services or DOS attacks is one of the most common attacks on all kinds of
networks, especially in a wireless network. It prevents users from using network services
because the attacker sends a large amount of unnecessary data or connection requests
to the communication server. It causes a slow network, and therefore the users cannot
get benefitted from using its service.

Traffic Analysis

Traffic analysis is used to identify and monitor communication between users. In this
process, the service provider listens to the traffic flowing in the wireless channel to
access the private information of users affected by the attacker.

Eavesdropping

It specifies that the attacker can log on to the wireless network and access sensitive data
if the wireless network was not secure enough. This can also be done if the information
is not encrypted.

Session Interception and Messages Modification

It specifies that the attacker can intercept the session and modify the transmitted data in
this session. This scenario is called "man in the middle." It inserts the attacker's host
between the sender and receiver host.

Spoofing

In this security issue, the attacker impersonates him as an authorized account of another
user and tries to access the sensitive data and unauthorized services.

Captured and Retransmitted Messages

In this security issue, the attacker can get some of the network services by getting
unauthorized access. After capturing the message, he/she can reply to it with some
modifications to the same destination or another.

DEVICE SECURITY ISSUES


Mobile devices are very prone to new types of security attacks and fraud issues. These
issues are not only because of the mobile devices' vulnerability but also because of the
sensitive data that the mobile devices have stored. These security issues and threats
such as Virus, Spyware and Trojan may damage or destroy the mobile devices and steal
the information stored on them. A virus is a part of malicious software or spyware that
tends to gather information about the user without his/her knowledge.

Following is a list of some mobile computing security issues we face using mobile
devices:

Push Attacks

In the push attack, the attacker creates a malicious code at the user's mobile device by
hacking it and then he/she may spread it to affect other elements of the network.

Pull Attacks

The pull attack is a type of attack where the attacker controls the device and handles it
in his/her way. He can decide which emails they want to receive. In this attack, the user
can decide about the obtained data by the device itself.

Forced De-authentication

In this security issue, the attackers convince the mobile end-point or the mobile user to
drop its connection and re-connection to get a new signal. Within this process, they
insert their device between the mobile device and the network and steal the information
or do the fraud.

Multi-protocol Communication

The multi-protocol communication provides the ability of many mobile devices to


operate using multiple protocols. For examp le, A cellular provider's network protocol.
Most of the protocols have some security loopholes, which help the attacker to exploit
this weakness and access to the device.

Mobility

This security issue may occur because of the mobility of the users and the mobile
devices. You may face these security threats due to a user's location, so you must
replicate the user profiles at different locations to allow roaming via different places
without any concern regarding access to personal and sensitive data in any place and at
any time. This repetition of sensitive data on different sites can increase seethe chances
of security threats.
Disconnections

These types of security issues occur when mobile devices go to different places. It
occurs in the form of frequent disconnections caused by external parties resulting in the
handoff.

History of Mobile Communications: 1G - 5G


Mobile phone or cellphone technology is now embedded in today's living. Mobile phones are
used all around the globe, with many billions of people using them in all countries.

In view of its importance, it is often worth looking at how this all came about - the history of
mobile phones, mobile communications and their technology is fascinating, and it often pays to
see how far mobile communications technology has progressed since its early beginnings.

History of the first cellular


telecommunications systems
A number of companies started working on cellular based phone or telecommunications
systems. One at the forefront of these developments was Motorola.

In fact the first cellular phone system was demonstrated by Motorola in 1973 with a called
between John F. Mitchell and Martin Cooper.

However the first commercial cellular network was launched in 1979 in Japan by Nippon
Telegraph and Telephone. This was followed two years later with the launch of the Nordic
Mobile Telephone, NMT, which had been jointly developed by companies in these countries.
Accordingly it was simultaneously launched in Denmark, Finland, Norway, and Sweden.
Early 1G vintage mobile phone with carry
handle and separate handset

Many other countries followed these launches - some used systems that had already been
developed, but others developed their own system. As a result, a number of different non-
compatible systems were deployed and this gave rise to a number of problems and issues.

WIRED AND WIRELESS NETWORKING


Wired and wireless networking. Which one is best and are they both secure? There is
often confusion between the two and misinformed decisions can be made that have
the potential to be costly. Let us explain the main differences between running wired
and wireless networks.

Wired Networks

1. Performance – Wired networks perform better than wireless networks.


This is due to less interference than a wireless network would typically
encounter. Having a wired network allow for a more stable network
overall. We highly recommend installing a wired network for any critical
machines such as servers and routers. This will avoid any service
disruption that is typically caused with wireless networks.
2. Security – Wired networks are more secure than wireless networks. This
is due to the fact that your network is only accessible with a physical cable
connection. With wireless networks, the Wi-Fi signal is broadcasted
outside of the building, leaving it open to the public and potential
hackers.
3. Installation – This one depends on your situation. A lot of business
premises and modern homes have built in network cables that run
behind the walls and under the floor called structured cabling. If this is
the case then the majority of the difficult work is complete and the rest
should be straightforward to install.
Wireless Networks

1. Performance – As a general rule of thumb, wireless networks perform


worse than wired networks due to factors such as signal range, amount of
connected devices, office furniture and building features such as lifts and
pipework. However, Wi-Fi networks are improving in their capability with
modern advancements such as 802.11ax. We are watching this space as
the industry is moving towards a wireless connected workplace.
2. Security – A wireless network is less secure than a wired network.
Wireless networks must be secured correctly as accessing a wireless
network can be done discreetly and does not require physical access to a
building. Wireless networks can be secured to prevent malicious attacks
with an advanced authentication process such as enterprise WPA2 with
802.1X.
3. Installation – Wireless networks are mostly easy to install. They do not
require a large amount of physical cabling to be installed and allow your
computers and tablets to be moved around.

We recommend using a wired network wherever possible. Devices such as


smartphones and some laptops do not have the ability to be connected to your
network with a cable. If this is the case, then an obvious wireless connection is the only
possible solution. The benefits of having a wired network massively outweigh having a
wireless network. Furthermore, it is indeed possible to have a mixed network that is
converges both wired and wireless devices to fully maximise business productivity and
performance.

SECURITY ISSUES IN WIRELESS AND MOBILE COMMUNICATION

Confidentiality Only the destined user must be allowed to read data. It should be hidden from all
other parties. (Encryption is a method used to solve it)

Integrity Data integrity is concerned with the correctness of data. The data needs to have
integrity or else user receives a manipulated message.

Spoofing A node can impersonate an address in a mobile ad hoc network

Availability Attacks similar to denial of service can block the availability of data at the user
end. (E.g. an intermediate router can be configured to attack packets and stop
them or re-route them.)

Non- It means that the sender cannot deny that he has send a message from his
repudiation device.

Pre-keying In case of encrypted system, key exchange is necessary before the actual data
transfer. Now if this key (esp. if private-key) is send via a wireless network, there
can be an issue of key-trapping

Resource An attack may sometimes cripple the resources available to a mobile system like
constraint limited battery, slower CPUs, exhausting memory due to caching, etc. Such
resources may get drained or may sometimes be not be strong enough to fight
back.

Intercepted Wireless signals, since being transferred via open-air can be intercepted.

Replaying After carefully analysing the authentication requests and client responses, an
attacker can replay such a similar sequence again.

Stealing If a miscreant steals the user-id and password of a subscriber, or gets his SIM
card, he/she will be able to enjoy the user’s subscriptions.

Mobility When a MS moves from one cell to another, the connection will be routed though
concerns different paths which cannot be relied upon.

Eavesdropping Peeping into someone else’s conversation is called eavesdropping. (e.g. is phone
tapping )

THE VARIOUS SOLUTIONS THAT EXIST TO SOLVE THE PROBLEMS


AFFECTING WIRELESS COMMUNICATION ARE:

Direct We can use directed signals which are just sufficient to reach the user’s device and
Signaling establish a proper-link with him., This helps prevent security risks coming from other
directions and also at farther distances in same line.

Hashing Hashing is a method employed to check the data integrity. A hash function is applied
on the actual data resulting in some bits of data (integer value). In case of a
manipulation by a third-party, the hash value will be altered.

MAC Message Authentication Code is a combination of hash and secret key. For extra
added security

Encryption Encryption is conversion of code into a cipher text understood only by a person
having the decryption key. It includes both the public key (used nowadays.) and
private key method. Some examples are DES, AES, Ceaser-cipher, RSA etc.
Direct We can use directed signals which are just sufficient to reach the user’s device and
Signaling establish a proper-link with him., This helps prevent security risks coming from other
directions and also at farther distances in same line.

Checksum These are the basic methods used for checking data integrity (counting the total 1’s
or Parity or 0’s)

SSL A very famous feature used in today’s communication systems is SSL. SSL stands for
secure socket layer. It is a protocol that runs between HTTP and TCP for secure
transaction between client and Web server. Links using SSL protocols starts with
HTTPS (https://www...) The sub layers of SSL include handshake and record
protocols. SSL supports hash function MD5 and SHA, digital signatures, RSA, various
encryption algorithms.

IPsec IPSec (internet protocol for security) contains various features for providing
enhanced security. It includes an Authentication Header (AH- Packet Header
focusing on Security) , Encapsulating Security Payload (for confidentiality purposes)
and Internet Key Exchange (IKE) (for secure exchange of keys used for encryption)

RADIUS Remote Authentication Dial In User Service (RADIUS) is a networking protocol that
provides centralized authentication, authorization, and Accounting (AAA)
management for devices to connect and use a network service.

SECURITY REQUIREMENTS IN WIRELESS AND MOBILE


COMMUNICATION

In today’s connected world, almost everyone has at least one internet-connected


device. With the number of these devices on the rise, it is important to implement a
security strategy to minimize their potential for exploitation (see Securing the Internet
of Things). Internet-connected devices may be used by nefarious entities to collect
personal information, steal identities, compromise financial data, and silently listen to
—or watch—users. Taking a few precautions in the configuration and use of your
devices can help prevent this type of activity.

What are the risks to your wireless network?

Whether it’s a home or business network, the risks to an unsecured wireless network
are the same. Some of the risks include:

Piggybacking

If you fail to secure your wireless network, anyone with a wireless-enabled computer
in range of your access point can use your connection. The typical indoor broadcast
range of an access point is 150–300 feet. Outdoors, this range may extend as far as
1,000 feet. So, if your neighborhood is closely settled, or if you live in an apartment or
condominium, failure to secure your wireless network could open your internet
connection to many unintended users. These users may be able to conduct illegal
activity, monitor and capture your web traffic, or steal personal files.

Wardriving

Wardriving is a specific kind of piggybacking. The broadcast range of a wireless


access point can make internet connections available outside your home, even as far
away as your street. Savvy computer users know this, and some have made a hobby
out of driving through cities and neighborhoods with a wireless-equipped computer—
sometimes with a powerful antenna—searching for unsecured wireless networks. This
practice is known as “wardriving.”

Evil Twin Attacks

In an evil twin attack, an adversary gathers information about a public network access
point, then sets up their system to impersonate it. The adversary uses a broadcast
signal stronger than the one generated by the legitimate access point; then,
unsuspecting users connect using the stronger signal. Because the victim is connecting
to the internet through the attacker’s system, it’s easy for the attacker to use
specialized tools to read any data the victim sends over the internet. This data may
include credit card numbers, username and password combinations, and other
personal information. Always confirm the name and password of a public Wi-Fi
hotspot prior to use. This will ensure you are connecting to a trusted access point.

Wireless Sniffing
Many public access points are not secured and the traffic they carry is not encrypted.
This can put your sensitive communications or transactions at risk. Because your
connection is being transmitted “in the clear,” malicious actors could use sniffing
tools to obtain sensitive information such as passwords or credit card numbers. Ensure
that all the access points you connect to use at least WPA2 encryption.

Unauthorized Computer Access

An unsecured public wireless network combined with unsecured file sharing could
allow a malicious user to access any directories and files you have unintentionally
made available for sharing. Ensure that when you connect your devices to public
networks, you deny sharing files and folders. Only allow sharing on recognized home
networks and only while it is necessary to share items. When not needed, ensure that
file sharing is disabled. This will help prevent an unknown attacker from accessing
your device’s files.

Shoulder Surfing

In public areas malicious actors can simply glance over your shoulder as you type. By
simply watching you, they can steal sensitive or personal information. Screen
protectors that prevent shoulder-surfers from seeing your device screen can be
purchased for little money. For smaller devices, such as phones, be cognizant of your
surroundings while viewing sensitive information or entering passwords.

Theft of Mobile Devices

Not all attackers rely on gaining access to your data via wireless means. By physically
stealing your device, attackers could have unrestricted access to all of its data, as well
as any connected cloud accounts. Taking measures to protect your devices from loss
or theft is important, but should the worst happen, a little preparation may protect the
data inside. Most mobile devices, including laptop computers, now have the ability to
fully encrypt their stored data—making devices useless to attackers who cannot
provide the proper password or personal identification number (PIN). In addition to
encrypting device content, it is also advisable to configure your device’s applications
to request login information before allowing access to any cloud-based information.
Last, individually encrypt or password-protect files that contain personal or sensitive
information. This will afford yet another layer of protection in the event an attacker is
able to gain access to your device.

WHAT CAN YOU DO TO MINIMIZE THE RISKS TO YOUR WIRELESS


NETWORKS
 Change default passwords. Most network devices, including wireless access
points, are pre-configured with default administrator passwords to simplify
setup. These default passwords are easily available to obtain online, and so
provide only marginal protection. Changing default passwords makes it harder
for attackers to access a device. Use and periodic changing of complex
passwords is your first line of defense in protecting your device. (See Choosing
and Protecting Passwords.)
 Restrict access. Only allow authorized users to access your network. Each
piece of hardware connected to a network has a media access control (MAC)
address. You can restrict access to your network by filtering these MAC
addresses. Consult your user documentation for specific information about
enabling these features. You can also utilize the “guest” account, which is a
widely used feature on many wireless routers. This feature allows you to grant
wireless access to guests on a separate wireless channel with a separate
password, while maintaining the privacy of your primary credentials.
 Encrypt the data on your network. Encrypting your wireless data prevents
anyone who might be able to access your network from viewing it. There are
several encryption protocols available to provide this protection. Wi-Fi
Protected Access (WPA), WPA2, and WPA3 encrypt information being
transmitted between wireless routers and wireless devices. WPA3 is currently
the strongest encryption. WPA and WPA2 are still available; however, it is
advisable to use equipment that specifically supports WPA3, as using the other
protocols could leave your network open to exploitation.
 Protect your Service Set Identifier (SSID). To prevent outsiders from easily
accessing your network, avoid publicizing your SSID. All Wi-Fi routers allow
users to protect their device’s SSID, which makes it more difficult for attackers
to find a network. At the very least, change your SSID to something unique.
Leaving it as the manufacturer’s default could allow a potential attacker to
identify the type of router and possibly exploit any known vulnerabilities.
 Install a firewall. Consider installing a firewall directly on your wireless
devices (a host-based firewall), as well as on your home network (a router- or
modem-based firewall). Attackers who can directly tap into your wireless
network may be able to circumvent your network firewall—a host-based
firewall will add a layer of protection to the data on your computer
(see Understanding Firewalls for Home and Small Office Use).
 Maintain antivirus software. Install antivirus software and keep your virus
definitions up to date. Many antivirus programs also have additional features
that detect or protect against spyware and adware (see Protecting Against
Malicious Code
 Use file sharing with caution. File sharing between devices should be disabled
when not needed. You should always choose to only allow file sharing over
home or work networks, never on public networks. You may want to consider
creating a dedicated directory for file sharing and restrict access to all other
directories. In addition, you should password protect anything you share. Never
open an entire hard drive for file sharing (see Choosing and Protecting
Passwords).
 Keep your access point software patched and up to date. The manufacturer
of your wireless access point will periodically release updates to and patches
for a device’s software and firmware. Be sure to check the manufacturer’s
website regularly for any updates or patches for your device.
 Check your internet provider’s or router manufacturer’s wireless security
options. Your internet service provider and router manufacturer may provide
information or resources to assist in securing your wireless network. Check the
customer support area of their websites for specific suggestions or instructions.
 Connect using a Virtual Private Network (VPN). Many companies and
organizations have a VPN. VPNs allow employees to connect securely to their
network when away from the office. VPNs encrypt connections at the sending
and receiving ends and keep out traffic that is not properly encrypted. If a VPN
is available to you, make sure you log onto it any time you need to use a public
wireless access point.

SECURITY FOR MOBILE APPLICATION

Security has always been a major concern for businesses. And this concern is even
greater when it comes to mobile apps.
Today every business has a mobile app to connect more easily with their
customers. And if that business does not take proper security protections it can put
their brand at risk.
Mobile devices span multiple operating systems and, given the distributed nature
of components, mobile app security often experiences problems.
I hope your business is properly secured and you are just looking for a mobile app
security checklist for the future. If that's the case, good for you – being a business
owner means you must take care of mobile app security.
But according to a survey, more than 75% of mobile applications will fail
basic security tests.
Many employees download apps from app stores and use mobile applications that
can access enterprise assets or perform business functions. And unfortunately,
these applications have little or no security assurances. They are exposed to attacks
and violations of enterprise security policies all the time.
I know that nobody wants to be a part of this failure. That is why you need to
follow a proper mobile app security checklist.
ENFORCE STRONG AUTHENTICATION
To prevent unauthorized access and password guessing attacks, you should
implement multi-factor authentication. The three main factors for authentication
are
something that a user knows, such as a password or PIN
something the user has, such as a mobile device
or something the user is, such as a fingerprint.
Combining password-based authentication with a client certificate, device ID, or
one-time password significantly reduces the risk of unauthorised access. You can
also implement time-of-day and location-based restrictions to prevent fraud.
ENCRYPT MOBILE COMMUNICATIONS
With threats like snooping and man-in-the-middle attacks over WiFi and cellular
networks, IT should make sure that all communications between mobile apps and
app servers are encrypted.
Strong encryption that leverages 4096-bit SSL keys and session-based key
exchanges can prevent even the most determined hackers from decrypting
communications.
Besides encrypting traffic, IT should confirm that data at rest—the sensitive data
stored on users' phones—is also encrypted. For ultra-sensitive data, IT might want
to prevent data from ever being downloaded to the end user device at all.
PATCH APP AND OPERATING SYSTEM VULNERABILITIES
Recent Android and iOS vulnerabilities such as Stagefright and XcodeGhost have
exposed mobile users to attack.
In addition to mobile OS flaws, IT must contend with a never-ending succession of
app updates and fixes.
To protect mobile users from attack, IT should check mobile devices and ensure
that the latest patches and updates have been applied.
PROTECT AGAINST DEVICE THEFT
Every year, millions of mobile devices are lost or stolen. To ensure sensitive data
does not end up in the wrong hands, IT should provide a way to remotely wipe
sensitive data Or—better yet—make sure data is never stored on mobile devices in
the first place.
For employee-owned devices, IT should lock or wipe corporate information while
leaving personal apps and files intact. When the device is found or replaced, IT
should be able to quickly restore users’ apps and data.
SCAN MOBILE APPS FOR MALWARE
Eliminate malware and adware by testing apps for malicious behaviour. Malware
can be detected using virtual sandboxing or signature-based scanning tools. For
mobile workspace or virtual mobile solutions, perform malware scans on the
server.
PROTECT APP DATA ON YOUR DEVICE
Make sure developers are not storing any sensitive data on their devices. If you
must store data on device for some reason, first make sure it's encrypted/protected.
And then only store it in files, data stores, and databases.
If you use the latest encryption technologies, you can get a higher level of security.
SECURE THE PLATFORM
Your platform should be properly secured and controlled. This process consists of
detecting jailbroken phones and preventing access to other services when needed.
PREVENT DATA LEAKS
To avoid data leaks while still allowing users to install personal apps on their
mobile devices, IT must separate business apps from personal apps.
Creating secure mobile workspaces helps prevent malware from accessing
corporate apps and stops users from copying, saving, or distributing sensitive data.

ADVANTAGES AND DISADVANTAGES OF MOBILE APPS


As smartphones and other mobile devices become a staple in everyday life, people
and businesses are looking for new ways to utilize them. Many businesses
nowadays have a mobile app available. But what are the advantages and
disadvantages of mobile apps
The advantages of mobile apps include convenience, easy communication with
customers, and online usage. The disadvantages of mobile apps include
difficulty to create, the cost to create them, the cost to make them available to
people, and the need for updates and support.
There are many advantages and disadvantages to having a mobile app for your
business.
Disadvantages: Not Everyone Can Use Them
Not everyone can use a mobile app after it is created because the app may not be
on the app store that they use; Apple users use the IOS app store, Android and
Google phone users often use Google Play, and other people use the Windows app
store. Because of this, you need to make sure your app can be put on all of these
platforms. However, each of these platforms is different, and you can’t just put one
app onto all of them.
People Don’t Want to Pay for Apps
If the app that you create isn’t free on the app store that customers get it from, they
likely won’t download it because they don’t want to pay for something that they
may delete later. I myself don’t like downloading apps that cost money—I prefer
downloading free apps. If you do charge for the app, people will especially not
want to download it if it costs more than 99 cents.
Hard to Create
Mobile apps are hard to design and create. You will likely need to hire someone to
create your app, depending on what your expertise is. Many companies choose to
create apps that look similar to their website, but that format doesn’t always work.
This means that although customers have to recognize your company name and
logo when going onto the app, you have to create a new design that will work on
small, mobile devices.
Have to Pay to Make the App Available
When you put an app on a device platform, such as the IOS App Store, you have to
pay the host of the store. Different platforms charge different fees, but the cost is
necessary. However, it can get extremely expensive, especially over time.
To make up the cost of the app, especially if the app is on multiple platforms, you
will either have to show ads on the app or increase the costs of other products and
services. If you don’t make up the cost, you will lose money after you create a
mobile app, which defeats one of the purposes of having an app in the first place.
Security
It is hard to successfully secure mobile apps. Even if you think that you have added
enough security, you likely haven’t. You will also need to work with the security
measures that the app host uses. For example, Apple has the Apple Wallet, which
many apps use to allow their users to pay for items and services.
However, the security of your app is extremely important to consumers. They need
to know that their information is protected while they use your app, especially their
bank and card information that you receive when they pay your company.
Frequent Updates Are Required
You will need to periodically update your mobile app so it will work well with the
users’ phones. While these updates allow you to improve and add features to your
app, it is also required so you and your app’s users are assured that your app can be
used on phones and devices that have recently had a software update.
iPhones and Android phones seem to go through a software update every few
months. As these phones update, older phones sometimes have trouble accessing
the new software. Older iPhones are notorious for not functioning with the most
recent IOS software updates. This means you have to make sure that your app
works with the old as well as the new phone software updates.
When you update the app, you will need to tell users about it, or they will be
extremely confused when it doesn’t work as well as it normally does or when new
features are announced, but they can’t access them. You can tell users about the
update via push notifications or announcements within the app.
Support
After you create a mobile app, you need to create a support system for it. It will
malfunction no matter what you do, especially when the app is first launched and
you are still working out the kinks. People will want to talk to someone through the
app if they are having trouble using it or if it is malfunctioning.
To create a support system for your mobile app, you will need to hire an entire
team. People like being able to contact an app’s support team 24/7, so you will
have to hire enough people to fill multiple teams. You will also have to hire people
to train and supervise them. All of these will cost a lot of money, which will be
hard to recoup through the app, even if it costs money to download it and if there
are in-app purchases.

Need Both a Website and an App
Unfortunately, you can’t just have an app. You need a website as well, and most
website hosts cost money, especially if you use many of their features that make it
easier to design, create, and support your website. On your website, you will need
to tell users that there is a mobile app on various platforms (if it is on multiple
platforms), but it is not guaranteed that people will use both the app and the
website.
This means that you have to support, create, and design both a website and an app,
which will take quite a bit of work to do. You will also need to hire and train
people to support and fix both the website and the app, which means you will
spend more money than you expect.
However, some people like using both a website and an app, and your website will
give people an idea of what the app’s features are, what they can do on it, what it is
for, and more. Some people don’t like using an app and prefer using their
computer, especially when shopping online, so they won’t download or use your
mobile app. If they can use your app, but you don’t have a website, they won’t use
your company’s services.

Advantages: Ease of Communication
When you have an app, it is extremely easy to communicate with your customers
and app users, especially if you have an app support team that is designed to be
available when customers need to talk to them. Your app can even be designed
around communication if your employees often need to communicate with
customers or clients.
Exactly how customers will contact your company and your customer service
department is up to you, but you will likely want to have buttons or customer
service/employee contact information easily accessible. Many businesses have a
“chat” option that is at the very bottom of the page.
Expand Your Audience
Mobile apps help you expand your audience. Some people don’t have a computer,
so they can’t access your company’s website, but most people have a smartphone,
so they can use your app. Many people find apps easier to use than websites,
especially when using a smartphone to access the internet, so they only use mobile
apps. After you create an app, you can expand your customer base and make
money from those who use your app and not your website.
Oftentimes, websites look bad and are difficult to navigate when they are accessed
on a smartphone. That is partially because of the screen size differences between
computers and smartphones. However, when websites look weird on a smartphone,
people move on to another website that looks better. A mobile app will ensure your
company’s information looks great on smartphones.
Apps Are Extremely Convenient
Mobile apps are incredibly convenient to use. People don’t always have their
computer or laptop with them, but they always have their phones on hand.
If you have a mobile app, people will be able to use it whenever they think about it,
which means they will be more likely to use your company’s services or purchase
something from it. This means you will make more money because you have an
app, which makes all of the work worth it.
Apps are often easy to use, and people love it when they are. The more convenient
it is to use your app, the more people will use it, and the more money you will
make.

////
Advantages with Apps
Staying ‘front of mind’ with customers – your app on someone’s home screen
can help reinforce you as the answer to their needs when they require what you
offer: especially if your app is helpful in other ways.
Ease of access – for the user, clicking your app is far quicker and easier than
accessing yours or a competitor’s website even if they’ve bookmarked it.
Data capture – valuable data can be gathered from apps concerning use, activity
and buying habits.
Communication – it’s easier to interact with your customers and prospects with an
app including the immediacy of being able to attract their attention and maybe
prompt action through, for example, push notifications.
Staff interaction – information can be passed quickly and easily to staff whether
for those accessing an internal company portal or people working in remote
locations.
Productivity – app-based interactions can streamline communications with staff
and outside contractors. And then you can ditch labour intensive paper-based
reporting.
Disadvantages with Apps
Lack of focus – Simply ‘having an app’ for the sake of it could prove counter-
productive and a waste of financial resources: it’s vital to know exactly what you
want your app to achieve and have a business case to support it.
Cost – naturally developing an app carries a price tag, but your app could boost
your bottom line by improving productivity (if a business app) or (if a customer
based app) enhancing customer engagement and increasing sales.
Also, working with an experienced mobile app development company means they
can appraise you of what’s possible within your budget and develop your app
accordingly.
Complicated – developing an app isn’t as easy as it may appear, but trusting in an
experienced mobile apps for business expert will ensure much of the heavy lifting
is done for you.
Updating – your app will require regular updates in line with revisions from
platform providers such as Apple (iOS) and Google (Android). Again, companies
providing mobile app development services know this and would put a package
together incorporating ongoing updates.

As you can see above, all the potential disadvantages to having an app can be
addressed by using the services of experts in developing mobile apps for business.

////end

You might also like