1. 1 2. 2 3. Vulnerability of Smart PhonesSmartphones are a permanent point of access to the internet (mostly on),they can be compromised easier than computersImplied permission• …