StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Types of Devices and How They Are Cloned - Essay Example

Cite this document
Summary
The paper "Types of Devices and How They Are Cloned" discusses that an attacker who has made the clone of a mobile phone or SIM card can cause serious damage to a mobile account, in the form of suffering huge expenditures by having pay-per-call services, making distance calls…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER92.3% of users find it useful
Types of Devices and How They Are Cloned
Read Text Preview

Extract of sample "Types of Devices and How They Are Cloned"

? By Eddy Gleitman Prof. Naeem Musa ISSC 361 November 23, Cloning Technology There is one thing common between droids, sheep and computers and that is, they can all be cloned. However, among all of these only the computer clones are believed to be most effective. In fact, the computer cloning can be further broken into software program cloning or hardware device cloning and the basic purpose of these techniques is to make a similar copy or duplicate of a current technology or device. It is an admitted fact that a cloned product is developed by a third-party organization instead of the firm that formerly created it. In this scenario, IBM compatible computers can be considered as an excellent example of computer cloning for the reason that they are a clones of IBM's original machines. In addition, the Compaq portable is known as the first IBM clone (TechTerms, 2013; Computer Hope, 2013). The history of the "cloning" can be traced back to mid-1980s when it was first used to define Windows-based or DOS (disk operating system) computers developed by organizations other than IBM. In this scenario, the machines developed by the third parties were referred to as "IBM compatible" or "IBM clones," computers. The reason for using the term clone to describe these computers was that these computers worked accurately in the same way as the ones developed by IBM Corporation. In fact, these machines ran the same software and used the same hardware as was used in their original versions. Additionally, PC clones are still useful and are built frequently. In addition, now the trend of making clones has attained to an extensive growth and more than dozens of development firms have already working in this domain. For instance, some of the well-known firms such as Dell, HP, Gateway, Sony and Compaq as well as many other manufacturers all make Windows-based computers. In fact, the trend of using clones has also increased to a huge extent. For instance, PCs (personal computers) are actually used to refer to the IBM clones. Up till now, the concept of cloning was used in the context of hardware however the term "clone" can also be utilized to express software that is built for the same purpose as another more typical software program. In fact, the term cloning can be used for a variety of types such as electronic devices excluding computers that work similar to other electronics (TechTerms, 2013; The SCO Group, Inc., 2004). The research has shown that the development of a clone provides a variety of advantages. Some of the common uses of cloning are outlined below: Reinstatement of computer after a crash Without a doubt, a clone of boot drive is believed to be a critical tool for retrieval from a state that occurs due to a system crash or failure. If a person or a company does not develop a clone, then the recovery from a system crash or failure can take a lot of time (i.e. from a few hours to a few weeks), even though they have implemented a proper back up plan. Basically, the development of a bootable clone allows the company to clone a variety of bootable files which encompass programs (normally), system operating system, user settings, and a variety of updates, software customizations, passwords, and many more. Even though an organization has made sure that all its applications and programs are available on readily-available optical disc, they can still take days to load again, configure and update everything. On the other hand, if the firm or an individual has developed a latest bootable clone, it will require you only a few minutes to get your business or routine activities back on the track. Repair of previous operating system or programs after a failed upgrade There are many cases when an individual or an organization attempts to upgrade their operating system or major functions of some critical application and they go extremely off-center, and their computer may fail to perform critical operations. In many cases it happens due to inefficiency of a hardware component that is required to support an upgraded component or operating system. In the same way, a program may also be unsuited for the new operating system. In many cases, the upgrade of a specific component or an operating system merely flop, making the computer useless completely or most of the time. Once more, if the firm or an individual has successfully developed a clone of the system directly before initiating the upgrade, it will be easy for them to quickly return to the correctly working configuration. Upgrade of the operating system drive to a bigger drive Without a doubt, the amount of data always increases a fast pace, and people always need huge storage capacity to store and maintain their data. In this scenario, cloning of the devices can help them upgrade their core drive inexpensively and speedily. In fact, it becomes more significant when they are using laptops. For instance, it is straightforward as they are cloning a newer one in an external enclosure from the already available internal drive. Once this process is completed, they just need to exchange the drive into the inner drive bay in the system and reboot the system. Refurbishment of a “clean” computer With the passage of time, it is likely that a boot drive can turn out to be infected due to some registry issues, junkware, imperceptible background applications and a variety of infected codes such as viruses and malwares that can actually reduce its speed. In fact, these kinds of problems are more common to Windows than Mac operating system. Hence, in order to deal with these issues and challenges, the majority of people build a clone of a newly installed and configured operating system as well as constantly format it and make the clone of their boot drive. In addition, this mechanism is very common among people who manage company-wide systems, classroom computers, or anyplace else where a number of systems use same configurations. Moreover, in many cases they use compressed instead of bootable clones (DPBestFlow, 2012). Types of Clone Bootable clones In this type of cloning, all the files are directly copied from source to the destination. In this scenario, these files contain all kinds of files such as visible and invisible, available on a drive that runs a bootable operating system. Figure 1 demonstrates this type of cloning technique. The successful implementation of this cloning technique requires only an appropriate software. In addition, it is straightforward for the software to have the clone updated even if any changes take place to the original for the reason that the complete file system on the drive is entirely understandable. One of the most important advantages of bootable clone is that it is the simplest way to get an excellent security for files available on existing boot drive. Also, it is cost-effective for the reason that it only requires a single extra drive to complete. In fact, it does not require the use of any exceptional commercial software to utilize the clone. However, the most important disadvantage of this cloning technique is that it is to some extent more vulnerable to virus or vulnerability than a compressed clone. In addition, it can require slightly more drive space than a compressed clone. Figure 1The demonstration of bootable clones, Image Source: (DPBestFlow, 2012) Non-bootable (compressed) clones There is another most important cloning technique known as compressed clone in which a clone of a hard drive builds a single compressed file, instead of a distinct copy of each file from the source. However, in order to develop a bootable clone, there is need for expanding and restoring the clone, typically to a different drive, which is demonstrated in the figure 2. In addition, the program files that are used to develop compressed clones require using a CD (compact disk) to boot from restoring and making the bootable version of clone. One of the major advantages of this technique is that it is simple to make sure that the compressed file remains uncontaminated. In fact, this cloning technique allows the implementation of a variety of checksum with the purpose of ensuring integrity, hence it is difficult for malware to remain hidden to a compressed file. However, the major disadvantage is this technique is that it takes a lot of time to unzip or expand a clone, hence it can be an actual troublesomeness if the reinstatement must happen rapidly. Additionally, the writing process of compressed clones can require a specific commercial format hence it will be decompressed using the same tool which has created it (DPBestFlow, 2012). Figure 2A compressed clone, Image Source: (DPBestFlow, 2012) Types of Devices and how they are cloned? There are a variety of devices that can be cloned. In fact, their hardware and software both can be cloned and hackers can take advantage of them to access information and personal data or make illegal use of these data. Some of the well-known devices that can be hacked, personal computers, laptops, mobile phones, SIM cards, and RFID. In this scenario, hacking of computers and laptops is common and there are already a large number of cases in which hacking of these devices and the ways they are made have been exposed. However, these days hacking of mobile phones and SIM cards is a hot topic. Basically, sometimes mobile devices need to get connected to the femtocell in order to perform desired functionality. In fact, it looks like if a mobile is connected to any cellular tower. In this scenario, Femtocells are network devices which are used by people in order to strengthen their cellular signal. For instance, sometimes in an office or in a building or in a house mobile signals can be weaker so in order to strengthen these signals they make use of Femtocells devices. These devices can be attained by simply requesting them from the mobile service provider and plugging them into existing local network. In this scenario, the femtocell directly interacts with the mobile service provider’s internal network by means of a protected channel to work as a component of the cellular network. In fact, the majority of users cannot even distinguish any difference. In addition, there is no difference it happens in the same ways as if people are connected to the actual network. Basically, a hacker or attacker just establishes a femtocell environment and looks forward to mobile devices to get registered and connected automatically with the tower. In this scenario, all the required identities and authentications are transferred across the registration method, hence a hacker can without difficulty access the target information with the purpose of creating a cloned phone (Rashid, 2013). It is believed that the mobile phones and smarphones are heavily susceptible to a variety of vulnerabilities however a SIM card is the most important component of mobile phone and its overall security. German cryptographer Karsten Nohl spent three years in research to determine the vulnerabilities of SIM cards. Their findings suggest that some software and encryption errors can cause serious effects on millions of SIM cards, and excavate another way on mobile phones for scam and observation. For instance, payment fraud can be one of the significant issues for mobile phone users, wherever SIM-card based payments are commonly used (Olson, 2013). Basically, the hacker gets SIM card information by simply scanning the radio waves. In addition, this attack can take place in any corner of the world and any kind of mobile phone can be a target of a hacker. In this scenario, hackers can make use of a variety of equipment such as a hardware, interceptor and software to copy a SIM card which can be used to make calls everywhere in the world (Ahmed, 2013). Just like SIM cards and mobile phones, RFIDs (radio frequency identifications) are also susceptible to cloning if the RFID chip allows the attacker to write into memory area. In fact, the majority of RFIDs allows this activity. Basically, the chips that are used to keep track of product shipments or luxurious apparatus, such as, frequently comprise item details and pricing. So the area in which this information is written should be locked however in many cases it is not actually locked for the reason that the firms making use of RFIDs don't actually know how the chips work or for the reason that the data fields require updating regularly. Whatever the case is, these chips remain open to hackers and attacks (Newitz, 2006). Types of Threat Information Stolen There can occur a variety of attacks once a device has been cloned by the attacker. For instance, an attacked can make use of the data and information stored in the devices to carry out illegal tasks. At the present, data and information are believed to be a most important asset and the majority of firms and individuals heavily rely on these data and information. No matter, where the data is stored, whether it is stored in hard drive, USB, or in an ATM card, it is equally significant. Once an attacker gets access to this data they can make illegal use of it. For instance for making illegal calls, stealing money or many other similar activities (Dunn, 2013). Vulnerabilities Some of the well-known threats and vulnerabilities that can be launched against these devices can include eavesdropping and recording of all data such as voice calls, launching a denial of service attack to view Web sites being accessed, interrupting incoming and outgoing SMS and MMS messages, and banding SSL from secure pages. The research has shown that the hacker immediately clone mobile devices without having actual access to the device. In addition, it could interrupt mobile signals at the distance of almost 40 feet away, relying on various environmental aspects (Rashid, 2013). In the same way, access to a network can also be used to launch a variety of attacks such as denial of service attacks and hacking of web sites. In denial of service attacks, the working of a network can be destroyed by sending fake requests (Shelly, Cashman, & Vermaat, 2005). Ways to prevent device cloning In order to deal with the issue of femtocells device, a new solution has been launched with the name of the "femtocatch" tool. Basically, this solution automatically detects femtocells and set the device into "airplane mode" in place of connecting directly to the network. This tool will be available in the market soon (Rashid, 2013). Up till now, a variety of solutions have been developed to deal with the issues of cloning for instance, Discretix’ ACAH solution is complete suite of techniques for anti-cloning and anti-hacking, which comprises four major elements: RTIC Engine, Secure Boot, Secure Debug and Code Encryption. In addition, this solution is available in more than a few configurations, in this scenario, the DxACAH can be customized according to definite financial and security requirements (Discretix Technologies Ltd., 2013). In the same way, for securing RFID devices, it should be kept protected from writing or editing. For this purpose, latest tools and techniques should be implemented. At individual level, a person should not make or receive calls from any unknown number. For PC security, people should use firewalls and up to date security anti-virus software. They should set strong password and in case of mobile they should set a PIN number required for attending or making a call (Siddiqui, 2012). How to tell if your SIM has been cloned? An attacker who has made the clone of a mobile phone or SIM card can cause serious damage to mobile account, in the form of suffering huge expenditures by having pay-per-call services, making distance calls and a variety of mixed actions. You can identify whether your mobile or SIM has been cloned or not, by keeping track of the calls you make and constantly comparing it with the service provider. Basically, a service provider company keeps track of calls for almost two months. You can see this record in order to determine any difference. In case of any different you can contact your service provider immediately (Schanaman, 2013; MumbaiMirror, 2013). References Ahmed, M. (2013). Hackers May Hack or Clone Your Cell Phone. Retrieved from WorseTech.com: http://www.worsetech.com/hack/hacker-attack/cell-phone-hacked-clone-hackers-1106809.html Computer Hope. (2013). Clone. Retrieved from http://www.computerhope.com/jargon/c/clone.htm Discretix Technologies Ltd. (2013). Anti-Cloning | Anti-Hacking. Retrieved from http://www.discretix.com/anti-cloning-anti-hacking/ DPBestFlow. (2012, February 27). Cloning. Retrieved from http://dpbestflow.org/Clones_and_bootable_clones Dunn, J. E. (2013, May 10). Cyberhackers steal $45 million from bank ATMs after cloning debit cards. Retrieved from TechWorld.com: http://news.techworld.com/security/3446618/cyberhackers-steal-45-million-from-bank-atms-after-cloning-debit-cards/ MumbaiMirror. (2013, July 02). Beware of missed call to check SIM cloning. Retrieved from http://www.mumbaimirror.com/others/sci-tech/Beware-of-missed-call-to-check-SIM-cloning/articleshow/16223109.cms? Newitz, A. (2006, May). The RFID Hacking Underground. Retrieved from Wired.com: http://www.wired.com/wired/archive/14.05/rfid.html Olson, P. (2013, July 21). SIM Cards Have Finally Been Hacked, And The Flaw Could Affect Millions Of Phones. Retrieved from Forbes.com: http://www.forbes.com/sites/parmyolson/2013/07/21/sim-cards-have-finally-been-hacked-and-the-flaw-could-affect-millions-of-phones/ Rashid, F. Y. (2013, August 01). Black Hat: Intercepting Calls and Cloning Phones With Femtocells. Retrieved from PCMAG.com: http://securitywatch.pcmag.com/hacking/314370-black-hat-intercepting-calls-and-cloning-phones-with-femtocells Schanaman, K. (2013). How to Know If Your Cell Phone Has Been Cloned. Retrieved from eHow.com: http://www.ehow.com/how_5950167_cell-phone-cloned.html Shelly, Cashman, & Vermaat. (2005). Discovering Computers 2005. Boston: Thomson Course Technology. Siddiqui, P. I. (2012, July 01). Keep watch on missed call to prevent phone cloning. Retrieved from The Times of India: http://articles.timesofindia.indiatimes.com/2012-07-01/lucknow/32494156_1_sim-card-lakh-subscribers-cell-phone TechTerms. (2013). Clone. Retrieved from TechTerms.com: http://www.techterms.com/definition/clone The SCO Group, Inc. (2004, September). Clone device. Retrieved from http://uw714doc.sco.com/en/HDK_concepts/ddT_clone.html Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Cloning Devices Research Paper Example | Topics and Well Written Essays - 2500 words”, n.d.)
Retrieved from https://studentshare.org/information-technology/1498136-cloning-devices
(Cloning Devices Research Paper Example | Topics and Well Written Essays - 2500 Words)
https://studentshare.org/information-technology/1498136-cloning-devices.
“Cloning Devices Research Paper Example | Topics and Well Written Essays - 2500 Words”, n.d. https://studentshare.org/information-technology/1498136-cloning-devices.
  • Cited: 0 times

CHECK THESE SAMPLES OF Types of Devices and How They Are Cloned

Assistive Technology Devices

In so doing, he can begin to hear how words are pronounced and hopefully, over time, begin to improve upon his comprehension skills.... The age of onset for her vision disability is early in her academic career, such that educators and parents can work with her to introduce some assistive devices that should enable her to excel in a school environment (Beard, Carpenter, and Johnston, 2011).... There are various assistive technology devices that should help Emily....
8 Pages (2000 words) Case Study

Surface Safety Systems as a Part of a Petroleum Industry

The paper provides guidelines as to how a safety system must be developed, tested, analyzed and maintained.... Surface safety systems are used during the production phase and this requires unique operations.... This report deals with the recommendations and practice for analysis, design, installation and… These systems are mainly used for offshore production of oil and gas....
18 Pages (4500 words) Research Paper

Electromagnetic Compatibility of Devices

This paper illustrates that while engineers worked on a large number of devices and their functions in an environment of electromagnetic fields, but still there is the great need for research in this field to come up with substantial human and friendly devices.... This essay explores the Digital Electronic control system for fire and smoke detection for a university which is a public and sensitive area for the job of testing noise Violations mitigation and the effectiveness of devices of the electromagnetic field....
9 Pages (2250 words) Essay

New Technologies and Perhaps Globalization

The example of Dolly the sheep being cloned has brought in tensions among the antagonists, who belief that when it eventually comes to cloning of human beings, the world will be at the verge of existence.... Researchers in this field assert that they have clues on how to model living things, which are not prone to diseases nor allergic to some climatic conditions....
10 Pages (2500 words) Research Paper

Building an App Farm for University Student

nbsp;… It will also view on how the demand for mobile apps has increased and what the users want the apps to be developed for.... how mobile apps have been applied in entrepreneurship and its benefits to the entrepreneurs.... how mobile apps have been applied in entrepreneurship and its benefits to the entrepreneurs.... obile apps are software programs that one can download and use on their phones or any other devices that they have like the tablets etc....
19 Pages (4750 words) Article

Impact of Portable Air Cleaners and Energy Use

Such particles need specific types of filtration and devices of air cleaning (Macaluso 97)... The review seeks to compare the difference in energy consumption between the two air cleaning devices.... In Nelson, Hirsch, Ohmanjr, Plattsmills, CReed, and Solomon (661) air-cleaning devices only cannot satisfactorily remove all indoor pollutants.... The common air cleaning devices will only remove some of the pollutants from the indoor air....
12 Pages (3000 words) Literature review

Design and Model Effectiveness of the Closed-Circuit TV System

This device traces the development of early CCTV devices, inspects CCTVs that are currently in the market, and speculates regarding video intensification knowledge of the prospect, which will perform extensive use of computer-related expertise.... this mechanism is called CCTV because of its fixed technological similarity to CCTV devices used for exploration and indirect monitoring and for all the mechanism, from the camera to the partition, are linked by wires, in contrast to broadcast television (TV), where its signals are transmitted through the air from the televise station to the TV sets....
11 Pages (2750 words) Report

Smart Devices in Education: Virtual Haptic

he operationalization of the constructs, how they will be detected and measuredTo operationalize the constructs, various methods may be employed.... We will be seeking to evaluate the impact of the use of the VHD on parameters such as lecture duration, quality of the content, quality of the material, running and implementation costs, and how well knowledge is transferred to students.... This research proposal "Smart devices in Education: Virtual Haptic" discusses the effectiveness of Virtual Haptic devices in the enhancement of the educational process....
7 Pages (1750 words) Research Proposal
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us