Kadra Alvaro April,2010. Introduction: The Android Platform Threats to Smartphones Android-Specific Threats How to Secure Your Android Device The Future.

Slides:



Advertisements
Similar presentations
Mobile device security Practical advice on how to keep your mobile device and the data on it safe.
Advertisements

Smartphone and Mobile Device Security IT Communication Liaisons Meeting October 11, 2012 Theresa Semmens, CITSO.
What is an application?. An application is... An application (or app) is a type of software that allows you to perform specific tasks! Applications for.
Mobil game : A mobile game is a video game played on a mobile phone, smartphone, PDA, handheld computer or portable media player Type of language writing.
Sophos Mobile Control. Tablets on the rise 2 Trends 3 75% of 157 polled companies encourage employee owned smart phones and tablets to access corporate.
7 Effective Habits when using the Internet Philip O’Kane 1.
The development of Internet A cow was lost in Jan 14th If you know where it is, please contact with me. My QQ number is QQ is one of the.
Smartphone Security How safe are you?. Main Points 1. Malware/Spyware 2. Other Mischief 3. How a phone might get infected 4. Staying Safe a. Malware b.
Student Name: Group.  Developed by Microsoft  Alliance with Nokia in 2011  4 main functions:  Outlook Mobile  Windows Media Player for Windows Mobile.
MOBILE MALWARE TOPIC #5 – INFORMATION ASSURANCE AND SECURITY Michael Fine 1.
SMARTPHONE OPERATION SYSTEM MARKET IN U.S. Ryan (Jang-Hoon) Doo ISM 158.
Smartphones. Lesson Objectives To understand and demonstrate an understanding of Smartphones.
By Paul Capers.  A cell phone is a portable telephone that does not use a wired connection. It connects to a wireless carrier network using radio waves.
William Enck, Machigar Ongtang, and Patrick McDaniel.
Android Security What is out there? Waqar Aziz. Android Market Share - I 2.
Presentation By Deepak Katta
Understanding Android Security Yinshu Wu William Enck, Machigar Ongtang, and PatrickMcDaniel Pennsylvania State University.
Introduction to Mobile Malware
Introduction Our Topic: Mobile Security Why is mobile security important?
A METHODOLOGY FOR EMPIRICAL ANALYSIS OF PERMISSION-BASED SECURITY MODELS AND ITS APPLICATION TO ANDROID.
Android 2: Introduction to the Technology Kirk Scott 1.
Topic: Security / Privacy “Your Apps Are Watching You” Source: The Wall Street Journal Online Presented By: Corey Campbell.
Data Security.
Cyber Crimes.
MOBILE DEVICE SECURITY. WHAT IS MOBILE DEVICE SECURITY? Mobile Devices  Smartphones  Laptops  Tablets  USB Memory  Portable Media Player  Handheld.
@2011 Mihail L. Sichitiu1 Android Introduction Platform Overview.
Staying Safe Online Keep your Information Secure.
Mobile Apps For Small Businesses Your customers are mobile. Is your business?
By: Emma Barnett CELL PHONE GPS: SAFETY OR STALKING DEVICES?
 Networked Storage  Files stored on:  Original device  Third Party Data Hosting Servers  Secondary devices  w/ granted permission.
1 Company Proprietary and ConfidentialThe document name can go here Android OS Security Omar Alaql July 8, 2013 Kent State University Android OS Security.
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
ANDROID BY:-AANCHAL MEHTA MNW-880-2K11. Introduction to Android Open software platform for mobile development A complete stack – OS, Middleware, Applications.
INTERNET SAFETY FOR KIDS
“A mobile market researcher wants a smartphone capable of shooting quality video, playing their music, browsing the web and running a range of applications”.
Vulnerability Study of the Android Ryan Selley, Swapnil Shinde, Michael Tanner, Madhura Tipnis, Colin Vinson (Group 8)
Topic 5: Basic Security.
Convenience product security Collin Busch. What is a convenience product? A convenience product is a device or application that makes your life easier.
What’s a mobile app? A mobile app is a software program you can download and access directly using your phone or another mobile device, like a tablet.
Android System Security Xinming Ou. Android System Basics An open-source operating system for mobile devices (AOSP, led by Google) – Consists of a base.
The rising standards of EU Mobile Payments October 2015 Jeremy King, International Director.
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
MobileSecurity Vulnerability Assessment Tools for the Enterprise Mobile Security Vulnerability Assessment Tools for the Enterprise Integrating Mobile/BYOD.
1 REMOTE CONTROL SYSTEM V7 2 Introduction.
Internet Safety and Productivity Tips Presented by ITS Kerri Sorenson and Sean Hernandez December 11, 8:30-9:00 am.
Mobile Banking Dangers Denise Butler Rick Hebert & Associates
Computer Security By Duncan Hall.
Facebook Messenger Presentation
Mobile Security By Jenish Jariwala. What is Mobile Security?  Mobile Security is the protection of smartphones, tablets, laptops and other portable computing.
Introducing the Smartphone Pentesting Framework Georgia Weidman Bulb Security LLC Approved for Public Release, Distribution Unlimited.
Power Guru: Implementing Smart Power Management on the Android Platform Written by Raef Mchaymech.
Blogs How to use the bog safely and secure? Create new username. Create a strong password to your account. Create the password to your uploaded files.
Analysis And Research Of System Security Based On.
TECHDOTCOMP SUPPORT TECHDOTCOMP nd Ave, Seattle, WA 98122, USA Phone:
Android and IOS Permissions Why are they here and what do they want from me?
Computer Security Keeping you and your computer safe in the digital world.
Mobile device security Practical advice on how to keep your mobile device and the data on it safe.
KASPERSKY INTERNET SECURITY FOR ANDROID. YOUR MOBILE DEVICES NEED PROTECTION More online communications and transaction are happening on tablets and phones.
Facebook privacy policy
Understanding Android Security
Mohammed Alhusein.
© EIT, Author Gay Robertson, 2017
Introduction to Mobile Devices
OPERATING SYSTEMS.
The Internet of Unsecure Things
Industry Best Practices – Security For Smartphones / Mobile Devices
The Effects of Jailbreaking on iPhone Security
Understanding Android Security
Company Name | Phone Number | Website | Address
Presentation transcript:

Kadra Alvaro April,2010

Introduction: The Android Platform Threats to Smartphones Android-Specific Threats How to Secure Your Android Device The Future of the Android OS

The Android operating system was originally developed by Android Inc A small company that was purchased by Google in July of Android is both a platform and an operating system. By using Java, Google hopes to make Android development more accessible and easier to participate in.

When smartphones first came out, the threats to them were minimal. These days smartphones are one of the most prevalent handheld devices; accessing their , their bank account, the internet texting and calling plans All from one portable device.

The fact that most users dont install security software on their phones. Some of the more common threats to mobile devices Bluetooth exploits, SMS/MMS attacks (usually injection), web browser, malware (usually distributed by third-party sources in the form of Apps or other downloads),

SMS and MMS are vulnerable to a variety of attacks these days. SMS is much more than just text or picture messaging; SMS is often used for voic notifications and visual voic . SMS fuzzing and shellcode injection hit the iPhone soon after its debut, and has been known to attack Windows Mobile and Android phones as well.

Most of the exploits on phones are man-in- the-middle attacks, where software is injected between the modem and the telephony stack where it can eavesdrop on incoming and outgoing messages.

There has been an upsurge in malicious Apps since Apples App Store debuted. They include games designed to surreptitiously record phone numbers and other private user data and steal ID numbers or bank info. This could be one of the most prominent threats to Android phones because of the mostly unregulated Android App Market.

The web browser is one of the most complex components running on the relatively slim handset operating systems. The mobile web browser is constantly evolving and being reinvented by different third-party vendors. Most smartphone browsers are filled with bugs and badly written code that can be exploited.

Many phones come with default settings that will allow the phone to connect to a Bluetooth piece without any authorization or encryption.

Its open-source nature makes it a prime target for hackers since every detail of its inner workings are laid bare to anyone with internet access.

Perhaps the most prominent potential danger is Androids free and open Application Market, which undergoes very little monitoring by Google, which strikes a sharp contrast with Apples infamously fussy App Store regulations.

Apple was the first company to create a popular online technology store that was capable of directly interfacing with handheld Apple devices. The iTunes store is one of the most widely used music applications for organizing and purchasing media. Apple knows that a troupe of vicious Applications roaming around their App Store would be very bad for business.

Once they finish producing their App, they send it to Apple, who then assigns a team of two employees to review the App. Apple not accepted Apps contain private APIs, more than a few bugs, violates the users privacy (such as stealing/logging his data), help the user break any law perform VoIP calls without AT&Ts permission are disqualified

Any Apps that are designed to replace a core Apple program (such as a web browser, manager, or a calendar App) are also not accepted. Many users who are unsatisfied with Apps that play by Apples rules jailbreak their iPhones to download unapproved Apps, which leads many to unknowingly infect their phones with malicious programs.

Googles security policy is altogether different from Apples in that it transfer responsibility onto the users and Google itself takes little part in patrolling the Market.

Unlike the closely regulated Apple App Store, the Android Market allows all kinds of malicious Apps to be posted, and users perusing the latest uploads need to be wary.

Security researchers Derek Brown and Daniel Tijerina tested the potential for damage by creating a simple weather App called WeatherFist that collects user data like GPS coordinates and phone numbers. Twenty-four hours after the App was released, the researchers had 1,862 phones roped into a potential botnet.

Disable automatic Bluetooth sharing and keep it turned off when youre not using it (it also saves battery). Its not a bad idea to keep your GPS turned off too.

Useful free App, called Mobile Defense, will also track down lost or stolen handsets. After the device syncs with your account, the App promptly uninstalls itself, leaving no trace that the program was ever downloaded or installed. As it is possible for a thief to uninstall the highly visible Antivirus software.

Android is running on quite a few phones, both new and old. If Android devices continue to remain so scattered and unsupported, it could have a negative aspect on security for Android owners.

Googles policy regarding Android seems to be very hands-off so far in the development of the young OS. However, more than a few people think that more regulation from Google is necessary to keep users safe.