Page 35 - Mobile-En-V3
P. 35

• Turn off Bluetooth while not in use: Turn off Bluetooth on your device when
            you are not using it. Not only put Bluetooth in an invisible or undetectable mode
            but turn it off completely.

    Second: Security Settings for Personal Data

        • Only install applications from the official store: Both Apple and Google impose
            strict restrictions on application developers to prevent the release of unsafe
            applications through their stores, and applications in official stores (Google Play
            Store or Apple App Store) are very strongly checked before launch, which
            ensures their security greatly, so you must avoid installing applications from
            outside the official store. you should make sure the Install unknown apps option
            is turned off.

        • Check permissions manager: When you install an application, you may be asked
            to give it access to some personal data, such as your contacts, call history, or
            photo and video gallery, which may allow the application to access personal data
            that may leak it. Only the permissions essential for the application's purpose
            should be granted, and the application should not be able to access data that is
            unrelated to its functions. You can check it from the permissions manager.

        • Uninstall any programs that you do not use: Installing many applications on the
            phone may cause a lack of storage space on the phone, slow performance, and
            also affect the level of security of the phone. It may cause some security issues
            from these unused applications, which may put your privacy at risk.

        • Using Google Protect for protection:
     Google launched the Google Protect service to keep
     Android users safe from malicious applications.
     Although Google imposes monitoring on applications in
     its store, some malicious applications could leak within
     the store if you downloaded these applications from an
     external source. Google scans new installations from Figure 13: Google Play Protect
     the Google Play Store for malicious intent. It also scans applications installed from
     other sources. Google Protection works for:

21 Training unit in the field of technological information - at the Supreme Council of Universities © Intellectual property rights 2024
   30   31   32   33   34   35   36   37   38   39   40