Mobile Device Security Threats Christina Blakley Host Computer Security.

Slides:



Advertisements
Similar presentations
ATK Space 9617 Distribution Avenue San Diego, California Tel: (858) Fax: (858) Website:
Advertisements

User Authentication on Mobile Devices Google Two Factor Authentication OTP (One Time Password)
Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
Mobile device security Practical advice on how to keep your mobile device and the data on it safe.
Smartphone and Mobile Device Security IT Communication Liaisons Meeting October 11, 2012 Theresa Semmens, CITSO.
6218 Mobile Devices- Are They Secure Enough for our Patient's Data? Presented By Aaron Hendriks, CISSP Other: Employee of University Health Network, Toronto,
Sophos Mobile Control. Tablets on the rise 2 Trends 3 75% of 157 polled companies encourage employee owned smart phones and tablets to access corporate.
1 MIS 2000 Class 22 System Security Update: Winter 2015.
By Ashlee Parton, Kimmy McCoy, & Labdhi Shah
Malicious Attacks By Chris Berg-Jones, Ethan Ungchusri, and Angela Wang.
Smartphone Security How safe are you?. Main Points 1. Malware/Spyware 2. Other Mischief 3. How a phone might get infected 4. Staying Safe a. Malware b.
Threats To A Computer Network
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Threats to I.T Internet security By Cameron Mundy.
Internet safety By Lydia Snowden.
E-business Security Dana Vasiloaica Institute of Technology Sligo 22 April 2006.
Data Security GCSE ICT.
Security for Seniors SeniorNet Help Desk
Information Security 2013 Roadshow. Roadshow Outline  Why We Care About Information Security  Safe Computing Recognize a Secure Web Site (HTTPS) How.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
LEVERAGING UICC WITH OPEN MOBILE API FOR SECURE APPLICATIONS AND SERVICES Ran Zhou 1 9/3/2015.
Cyber Crimes.
MOBILE DEVICE SECURITY. WHAT IS MOBILE DEVICE SECURITY? Mobile Devices  Smartphones  Laptops  Tablets  USB Memory  Portable Media Player  Handheld.
Mobile Devices Carry Hidden Threats With Financial Consequences Hold StillInstalled.
Security Awareness ITS SECURITY TRAINING. Why am I here ? Isn’t security an IT problem ?  Technology can address only a small fraction of security risks.
BUSINESS B1 Information Security.
1.1 System Performance Security Module 1 Version 5.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Liam Bradford.
Mobile Technology and Cyber Threats Deon Woods Bell Office of International Affairs The Fifth Annual African Consumer Protection Dialogue Conference Livingstone,
IT security By Tilly Gerlack.
Technology in Action Alan Evans Kendall Martin Mary Anne Poatsy Twelfth Edition.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
IT Banking Advantages and Disadvantages. Advantages IT banking is faster and more convenient for the user as they no longer are required to be at the.
Security System Ability of a system to protect information and system resources with respect to confidentiality and integrity.
Chapter 7 Phishing, Pharming, and Spam. Phishing Phishing is a criminal activity using computer security techniques. Phishers try to acquire information.
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Kamran Didcote.
Topic 5: Basic Security.
Convenience product security Collin Busch. What is a convenience product? A convenience product is a device or application that makes your life easier.
What is Spam? d min.
Grants Management Training 200 Cyber Security There are two kinds of people in America today: Those who have experienced a cyber-attack and know it, and.
Internet safety By Kenan.  Viruses are written by malicious programmers who wish to cause problems for other computer users.  The primary source of.
INFORMATION TECHNOLOGY IN A GLOBAL SOCIETY: SECURITY Taylor Moncrief.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Mobile Security By Jenish Jariwala. What is Mobile Security?  Mobile Security is the protection of smartphones, tablets, laptops and other portable computing.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
5 different ways to get tricked on the internet. 1. Viruses A virus is a computer malware program that copies it’s files to the computer. This may allow.
Cybersecurity Test Review Introduction to Digital Technology.
Any criminal action perpetrated primarily through the use of a computer.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Safety & Security By Kieran Bolko. Laws The main law that you should be taking note of is the Data Protection Act 1998 – this law sets rules for the electronic.
By: Jasmin Smith  ability to control what information one reveals about one’s self over the Internet.
OCTOBER IS CYBER SECURITY AWARENESS MONTH. October is Cyber Security Awareness Month  Our Cyber Security Awareness Campaign focuses on topics such as.
TECHDOTCOMP SUPPORT TECHDOTCOMP nd Ave, Seattle, WA 98122, USA Phone:
Mobile device security Practical advice on how to keep your mobile device and the data on it safe.
Created by the E-PoliceSlide 122 February, 2012 Dangers of s By Michael Kuc.
Internet Security TEAMS March 18 th, ISP:Internet Service Provider.
KASPERSKY INTERNET SECURITY FOR ANDROID. YOUR MOBILE DEVICES NEED PROTECTION More online communications and transaction are happening on tablets and phones.
Intro to Digital Technology Review for Final Introduction to Digital Technology Finals Seniors Monday, 5/16 – 2 nd Tuesday 5/17 – 1 st,3 rd Underclassmen.
Technical Implementation: Security Risks
IT Security Awareness Day October 19, 2016
Learn how to protect yourself against common attacks
IT Security  .
© EIT, Author Gay Robertson, 2017
Different Types of Apps. App Development ● App Development refers to the creation of computer applications for use on mobile devices such as tablets,
Digital $$ Quiz Test your knowledge.
Industry Best Practices – Security For Smartphones / Mobile Devices
How to keep the bad guys out and your data safe
Security in mobile technologies
Presentation transcript:

Mobile Device Security Threats Christina Blakley Host Computer Security

Outline I. Threats against mobile devices II. Where do the threats come from? III. What are the consequences? IV. Countermeasures V. How to protect against threats.

Threats Against Mobile Devices  Security Locks/Passwords  Application Markets  SMS  Social Engineering  Physical Lost of Device

Security Locks and Passwords  54% of smartphone users use important dates or people as passcodes to phones.  Social Engineering can aid attackers in retrieving passcodes to phones  Advances in security locks of phones include:  Biometrics  Behavioral: Voice and handwriting  Physiological: facial recognition and fingerprint  Biometrics on cell phones have all been hacked thus far with iPhone fingerprint scanner being the latest.  Most secure is passcode is 8-character combination of numbers, letters, and symbols.

Application Markets  Ability to download third party software to mobile devices  Platforms includes IOS, Android, Windows, and Blackberry.  Anyone can become a developer  Currently only Apple and Blackberry have app regulation policies.  Apps in the app store that contain malicious software  Mobile Devices have the ability to download software outside of app store through manipulation of the bootloader.  Rootkits/”Jailbreaking” are also ways in which hackers can enter into devices.

Short Message Service  Text messaging allows you to transmit data from one mobile device to another  Spam unsolicited commercial . However is no longer the only form of spam, it now comes in the form of SMS  Phone numbers are being sold by companies  Phishing is the act of attempting to acquire personal information such as passwords and credit card information masquerading as a trustworthy entity.  The attackers typically use urgent messages to get the victims attention.  Walmart was the subject of a phishing attack when a SMS was sent to a large number of people offering a $1000 gift card.

Physical Lost of Device  More than 33% of mobile device users do not put passwords on their devices  Out of that 33%, 90% of them stated they have sensitive personal information stored in their phones.  Americans lost $30 billion worth of mobile phones in  Many applications with sensitive information such as banking do not always require user to re-login.  Many users use notepads applications to store passwords for accounts.  Could result in substantial lost for the victim.

Consequences  Denial of Service and system unavailability attacks  Trojan horses entering phones through applications  False billing from providers  Unwanted disclosure of Stored information  Deleted, corrupted, or stolen user data  Gateway to users other personal accounts

Countermeasures  Preventative  Regulation of all app stores  Overhaul of mobile device anti-virus  Spam block  Require password protection  Detective  Remote security wipe  Hard reset

How can you protect yourself?  Limit personal information in phone.  Use external storage system.  Password protect device  Use privacy screen protector to prevent shoulder surfing  Do not alter phone with untrusted software.

Works Cited  "Here's What People Are Doing On Their Smartphones And Tablets." Business Insider. N.p., n.d. Web. 05 Dec  Indiana University of PA, comp. Person Custom Business Resources. N.p.: n.p., n.d. Print.  "Top Threats to Mobile Devices." - BankInfoSecurity. Roman, Jeffrey., n.d. Web. 05 Dec  PowerPoints, Host Computer Security, Dr. Obliety