Discuss the purpose of kill switches and describe how they function.

What will be an ideal response?


Due to the rising number of violent thefts of smartphones in major U.S. cities, kill switches-software that enables owners to render stolen devices inoperable-have been getting increased attention. In fact, Michigan and California recently passed laws requiring that all smartphones sold in those states include a kill switch.?Some features of kill switches are included in many device tracking apps. For example, the Android Device Manager displays the current location of a selected device after a user logs on to his or her account. It also has the ability to ring the device, lock the device and display a message on the lock screen, or erase the device. Some stand-alone kill switches go one step further and actually destroy the device. For example, some encrypted hard drives automatically delete the encryption key after a specific number of unsuccessful password entry attempts, which leaves the device inaccessible. Kill switches are typically activated by the customer or by the tracking company upon customer request when the device is determined to be lost or stolen. Users of some cloud services can also use those services to remotely wipe their mobile devices when needed.

Computer Science & Information Technology

You might also like to view...

The higher the number of megapixels, the better the resolution

Indicate whether the statement is true or false

Computer Science & Information Technology

________ add motion to a presentation and make it less static and more interesting

Fill in the blank(s) with correct word

Computer Science & Information Technology

A(n) ____________________ is created in PowerPoint.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

What is a WLAN? How does it work?

What will be an ideal response?

Computer Science & Information Technology