© EIT, Author Gay Robertson, 2017

Slides:



Advertisements
Similar presentations
Viruses,Hacking and Backups By Grace Mackay 8K Viruses Hacking and Hackers Backups.
Advertisements

Presented by: Luke Speed Computer Security. Why is computer security important! Intruders hack into computers to steal personal information that the user.
Threats to I.T Internet security By Cameron Mundy.
Introduction Our Topic: Mobile Security Why is mobile security important?
10 Tips for keeping MCL safe 1. Set up your defenses. Do you have adequate firewalls and antivirus software to protect you from hackers who could steal.
TITLE : E-SAFETY NAME : ABDUL HAFIQ ISKANDAR BIN ROZLAN PROGRAM : SR221 NO.STUDENT :
MOBILE DEVICE SECURITY. WHAT IS MOBILE DEVICE SECURITY? Mobile Devices  Smartphones  Laptops  Tablets  USB Memory  Portable Media Player  Handheld.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Liam Bradford.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
IT security By Tilly Gerlack.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS). SELECT AND USE APPROPRIATE METHODS TO MINIMISE SECURITY RISK TO IT SYSTEMS AND DATA 1.1 I can describe.
 INADEQUATE SECURITY POLICIES ›Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
INTERNET SAFETY FOR KIDS
Convenience product security Collin Busch. What is a convenience product? A convenience product is a device or application that makes your life easier.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
Computer Security By Duncan Hall.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Computer Security Keeping you and your computer safe in the digital world.
Intro to Digital Technology Review for Final Introduction to Digital Technology Finals Seniors Monday, 5/16 – 2 nd Tuesday 5/17 – 1 st,3 rd Underclassmen.
Cyber security. Malicious Code Social Engineering Detect and prevent.
Hardware and software that can provide a good level of security In this presentation I am going to provide advices on hardware and software that needs.
Internet Safety.
Safety.
Chapter 40 Internet Security.
How to stay safe using the internet & App’s
How to stay safe using the internet and app’s?
3.6 Fundamentals of cyber security
Introduction to Web Safety
How to use the internet safely and How to protect my personal data?
Information Security.
Ways to protect yourself against hackers
How to use the internet safely and How to protect my personal data?
Protecting Your Identity:
How to build a good reputation online
Cloud Storage - an introduction
What this activity will show you
Home Computer Security
Information Security 101 Richard Davis, Rob Laltrello.
Unit 4 IT Security.
Topic 6: Issues Press F5 to view!
Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Staying Austin College
Teaching Computing to GCSE
Networks (Public v Private) and Internet Security
Introduction to Mobile Devices
STOP. THINK. CONNECT. Online Safety Quiz.
Cybersecurity Awareness
Information is at the heart of any University, and Harvard is no exception. We create it, analyze it, share it, and apply it. As you would imagine, we.
Information Technology Services Education and Awareness Team
The Internet of Unsecure Things
Introduction to BYOD EIT, Author Gay Robertson, 2017.
Understanding Browsers
Lesson 2: Epic Security Considerations
Helping your children to stay safe online
Introduction to Servers
Bethesda Cybersecurity Club
Unit 4 IT Security Kerris Davies.
Staying safe online Use privacy settings Dangers – identity theft, appearing rude/angry, Think before you share pictures or personal information Use.
Welcome to the E Safety Workshop
LO1 - Know about aspects of cyber security
Information Technology Services Education and Awareness Team
Security in mobile technologies
E-Safety.
Cybersecurity Simplified: Ransomware
Online Safety; Privacy and Sharing
Online Safety; Privacy and Sharing
Presentation transcript:

© EIT, Author Gay Robertson, 2017 Mobile Security © EIT, Author Gay Robertson, 2017

Why is mobile security important? Mobile devices are everywhere. We use them for both personal use and work use These devices are like desktop computers, only smaller. They hold data, run software, browse websites, take photos and store both personal and company information As they are mini computers, the carry the same security risks as computers and laptops. However mobile phones and tablets are used more and far easier to be lost or stolen then a big desktop, and the fact that we use these devices more and on a more personal level, security becomes more important

Physical security One of the biggest risks to smaller mobile devices is that the small size and nature of the devices means they are far easier to be picked up and stolen, or lost by being left at a bus stop, left at a café or simply falling out of a pocket Most of us would hope that someone who found the device would turn it in or aim to return it to the owner, however this is not always the case It is important to be aware that it not just the device that is gone, but the data on the device as well

Personal Security Risks On a personal device this might mean your photos, unless backed up, might be lost forever If you have social media apps open anyone will be able to access that social media through your phone Also any sensitive information such as your contacts, and any saved files are also at risk of being lost or stolen Worse case being a thief can use the information on your phone to impersonate you, can access your accounts including email and social media, or worse, can access your bank account information

Company Security Risks Work phones also become a huge liability for organisations. Emails and files that hold sensitive or confidential information can be a gold mine to illegal users They could be used to damage the reputation of the organisation by using to spam clients This information may be used to blackmail the organisation into returning the device. Or potentially sold to a competing company or made public Sometimes organisation information being leaked to public or competitors can have a huge impact. Either for the nature of the information leaked or that the image of the company is lowered due to it be known for having security breaches

Physical Security Measures One of the most common security measures is to have a pin or passcode required to open your device. This may not be entirely secure but it does stop others from immediately being able to access your device Today smartphones are beginning to implement finger scanners as another form of security - the argument being that requiring a fingerprint scan is a far more secure measure then using a four digit pin or pattern Most mobile devices - both apple and android - have tracking functions where the device can be tracked or located if missing. Additionally these tracking apps have the ability to lock your device or delete content on the device

When using a company mobile device it is essential to communicate the disappearance of the device quickly. Most companies have this listed in the user policy An organisation’s IT department will then look to track the device, to erase all data and disable the device if possible via a security application Alternatively it is important that the potential of information being lost or stolen is communicated to the company. The company can then investigate what data was on the device and the potential implications this has on the organisation

Application Security Applications are software that can be downloaded onto mobile devices such as smartphones or tablets Much like some computer programs, some applications are not what they seem - they may hold malicious software or spyware that can infect your device and damage or steal information It is important to ask the question if the app you are downloading is safe or has the potential to cause harm to your device

One of the best things is to ensure any apps you download are from an official store such as Google play or Amazon for Android devices, or the Apple store for Apple devices These stores run screening to try and pick up on any malicious or suspicious programs before being available on their store Downloading an app from a non-official website or source, particularly programs that usually cost but are being offered for free, generally have a higher chance of being not what they seem and can hold malicious software Another thing is to check the reviews on an application and not just the star rating - there have been cases of software where the user has to give the app a high rating to be able to close or exit the malicious application

Application Permissions When you install an application through an application store, the apps need to request permission to access information on parts of your phone - this permission feature is an attempt to protect your device However most users don’t read the permissions carefully and this can lead to security flaws For example if a free card game requests permission to access your camera and photos, you have to ask the question why does this card game need access to these parts of your phone? Is it a additional function of the game where the camera can be used? This should be explained in the description. Or is there hidden spyware or something else going on in the background of the application Do you trust this app or decide on another Read permissions carefully and always think before you install applications

Data Security Data on devices is also at risk. Data may be intercepted if of interest to another, or lost if your device is damaged or goes missing It is important that any data on you device is backed up, either via a cloud application or a computer. If you take photos and don’t back them up then those images could be lost forever. This goes for any other files or documents stored on the device Another factor when it comes to company information is ensuring that any information that is not essential to have on the device is not stored on the device. The less stored the less there is to risk losing More organisations are implementing cloud systems where an employee may edit files or data on the cloud, but discourage users downloading files and data onto the phone or tablet’s storage It is important that a username and password is required to access the cloud storage as this can help stop others accessing the device if the phone is taken

Network Securty Another factor is what network your device is connected to, for example, connecting to public network such as free Wi-Fi at a mall or supermarket can lead to higher risks of another user tapping into your information It is worth being aware what you are accessing and sharing while on public networks Encryption is another way to ensure data traveling to and from your device is secure

Videos to watch: Mobile Security - Duration 3m 25s As mobile technology becomes more advanced, so do the security attacks of those who want to exploit mobile technology, creating a multitude of troubling scenarios. Built on IBM’s unique threat intelligence platform, the Mobile Security Framework automatically fuses context and risk awareness into each security imperative, to maximize mobility management and security effectiveness.   https://www.youtube.com/watch?v=9O5tLGGnapQ&feature=youtu.be

Creating a strong password - Duration 3m 30s Passwords are an essential part of life online - and if we're not careful about keeping them secret, they can cause big problems. By understanding the risks and making passwords stronger, we can feel a little more secure. https://www.youtube.com/watch?v=aEmF3Iylvr4&feature=youtu.be

What is hacking? - Duration 3m 8s Hackers may not be who we think they are. In fact, you might be a hacker and not even know it. Learn the true meaning of hacking and some of the many reasons that hackers hack. https://www.youtube.com/watch?v=DKzi5CYNFAg&feature=youtu.be

Android Virus Protection - Duration 3m 1s How well do you know the app you're about to download? Ensure Android virus and malicious app protection from ESET Mobile Security for Android.  https://www.youtube.com/watch?v=JWf9gbFpYtg&feature=youtu.be

Additional information on Internet Security Staying safe online is essential in today's world. Learn all about online safety and get Internet safety tips in this free tutorial. https://www.gcflearnfree.org/internetsafety/

Okay, let’s go use the workbook