ATK Space 9617 Distribution Avenue San Diego, California 92121 Tel: (858) 621-5700 Fax: (858) 621-5770 Website:

Slides:



Advertisements
Similar presentations
Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
Advertisements

Cyber Security on the go
Mobile device security Practical advice on how to keep your mobile device and the data on it safe.
Smartphone and Mobile Device Security IT Communication Liaisons Meeting October 11, 2012 Theresa Semmens, CITSO.
Copyright © 2012 AirWatch, LLC. All rights reserved. Proprietary & Confidential. Mobile Content Strategies and Deployment Best Practices.
INADEQUATE SECURITY POLICIES Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA standards.
Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information.
Sophos Mobile Control SophSkills Session Name: Thomas Lippert – Product Management DPG Date: 17-Feb-2011.
10 Things You Can do to Secure Your PC Presented by Peter Nowak OIS Client Services Manager.
Invasion of Smart Phones in Clinical Areas Chrissy Kyak Privacy Officer University of Maryland Upper Chesapeake Health.
Personal Data Protection and Security Measures Justin Law IT Services - Information Security Team 25 & 27 November 2013.
1 Alcatel Onetouch Antivirus. 2 Thinking about security on your smartphone Alcatel OneTouch? We have the solution. Among the applications on your smartphone,
Sophos Mobile Control. Tablets on the rise 2 Trends 3 75% of 157 polled companies encourage employee owned smart phones and tablets to access corporate.
1 MIS 2000 Class 22 System Security Update: Winter 2015.
Top of Content Box Line Subtitle Line Title Line Right Margin Line Wearables: Panacea or Pandora’s Box – A Security Perspective Gary Davis | Chief Consumer.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Personal Data Protection and Security Measures Justin Law IT Services - Information Security Team 18, 20 & 25 March 2015.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
CS691 Robin Kimzey Cell Phone Security a little computer in your pocket an easy target for malcontents.
MOBILE MALWARE TOPIC #5 – INFORMATION ASSURANCE AND SECURITY Michael Fine 1.
10 Essential Security Measures PA Turnpike Commission.
Quiz Review.
New Data Regulation Law 201 CMR TJX Video.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
Protecting Yourself Online (Information Assurance)
Cyber Crimes.
UNDERSTANDING THE RISKS & CHALLENGES OF Cyber Security DAVID NIMMO InDepth IT Solutions DAVID HIGGINS WatchGuard NEIL PARKER BridgePoint Group A BridgePoint.
THREATS TO MOBILE NETWORK SECURITY
MOBILE DEVICE SECURITY. WHAT IS MOBILE DEVICE SECURITY? Mobile Devices  Smartphones  Laptops  Tablets  USB Memory  Portable Media Player  Handheld.
Security Awareness ITS SECURITY TRAINING. Why am I here ? Isn’t security an IT problem ?  Technology can address only a small fraction of security risks.
IT security By Tilly Gerlack.
Wireless Security: Protect yourself when you’re mobile.
 INADEQUATE SECURITY POLICIES ›Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA.
Frequently Asked Questions NCSC Product Certification Payroll Anytime, Anywhere!
The way to avoid being trap into cyber crime. What is cyber crime? The Department of Justice categorizes computer crime in three ways: 1. The computer.
Enforcing Cyber security in Mobile Applications – Public Sector Use Case SAPHINA MCHOME, VIOLA RUKIZA TANZANIA REVENUE AUTHORITY INFORMATION AND COMMUNICATION.
Convenience product security Collin Busch. What is a convenience product? A convenience product is a device or application that makes your life easier.
Computer Security By Duncan Hall.
Mobile Security By Jenish Jariwala. What is Mobile Security?  Mobile Security is the protection of smartphones, tablets, laptops and other portable computing.
INTRODUCTION & QUESTIONS.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Introducing the Smartphone Pentesting Framework Georgia Weidman Bulb Security LLC Approved for Public Release, Distribution Unlimited.
About Us AVG is a global security software maker protecting 98 million active users in 170 countries from the ever-growing incidence of Web threats, viruses,
Cybersecurity Test Review Introduction to Digital Technology.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
1 #UPAugusta Today’s Topics What are Deadly IT Sins? Know them. Fear them. Fix them. #UPAugusta201 6.
© 2015 IBM Corporation John Guidone Account Executive IBM Security IBM MaaS360.
OCTOBER IS CYBER SECURITY AWARENESS MONTH. October is Cyber Security Awareness Month  Our Cyber Security Awareness Campaign focuses on topics such as.
Mobile Device Security Threats Christina Blakley Host Computer Security.
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
Computer Security Keeping you and your computer safe in the digital world.
Mobile device security Practical advice on how to keep your mobile device and the data on it safe.
KASPERSKY INTERNET SECURITY FOR ANDROID. YOUR MOBILE DEVICES NEED PROTECTION More online communications and transaction are happening on tablets and phones.
Information Technology Security Office of the Vice President for Information Technology New Employee Orientation II.
Mobile Devices in the Corporate World
Hotspot Shield Protect Your Online Identity
Information Security.
Joe, Larry, Josh, Susan, Mary, & Ken
Staying Austin College
© EIT, Author Gay Robertson, 2017
Cybersecurity Awareness
Information Technology Services Education and Awareness Team
Digital $$ Quiz Test your knowledge.
Industry Best Practices – Security For Smartphones / Mobile Devices
HOW DO I KEEP MY COMPUTER SAFE?
9 ways to avoid viruses and spyware
How to keep the bad guys out and your data safe
Information Technology Services Education and Awareness Team
Security in mobile technologies
Presentation transcript:

ATK Space 9617 Distribution Avenue San Diego, California Tel: (858) Fax: (858) Website: An advanced weapon and space systems company Industry Best Practices – Security For Smartphones / Mobile Devices San Diego Industrial Counterintelligence Working Group (SDICIWG) Date: 11 July 2012

An advanced weapon and space systems company 2 Table of Contents What is a Smartphone Background - Smartphones / Mobile Devices Cyber Security Threat – Methods Used to Access or Collect Data Industry Best Practices - How to Protect Yourself Against the Threat Conclusion

An advanced weapon and space systems company 3 What is A Smartphone? Smartphone: Is a mobile communication device that offers users expanded capabilities from traditional mobile devices. The features can include text messaging, e- mail access, Internet browsing, and mobile operating systems that enable incorporation of third-party applications to offer even more expanded features.

An advanced weapon and space systems company 4 Background - SmartPhones / Mobile Devices According to the National Security Institute there are now over 100 million smartphone users in the U.S., and research shows they check their phones an average of 34 times a day. Because of their highly portable nature, smartphones are particularly prone to loss or theft, resulting in unauthorized persons gaining physical access to the devices. Cyber Criminals are increasingly targeting smartphones – mobile devices for Illegal activity, such as acquiring company or personal data.

An advanced weapon and space systems company 5 Cyber Threat - Methods Used To Access or Collect Data Cyber criminals increasingly targeting smartphones & personal digital assistants (PDAs) for illegal activity. Some of the ways in which they gain access to personal or sensitive company data includes: Lost and Stolen Cell Phones: According to security experts, lost and stolen cell phones and other mobile devices such as PDA are the biggest mobile security threat to companies. Distribution Malicious Apps: Cyber criminals and hackers distribute Malicious Apps that Contain Trojans to access or steal data. Malicious Apps and software is sometimes downloaded via seemingly trusted links.

An advanced weapon and space systems company 6 Wi-Fi Threat: Attackers can create phony Wi-Fi hotspots designed to attack mobile phones and may patrol public Wi-Fi networks for unsecured devices. Phishing or Smishing Attacks: Cyber criminals use electronic communication to trick users into installing malicious software or giving away sensitive information. Smishing exploits vulnerabilities through text messages (SMS/MMS). Cyber Threat - Methods Used To Access or Collect Data

An advanced weapon and space systems company 7 Best Practices - Steps to Take To Protect Smartphones Recommended Security Tips For Smartphone Users Passwords: Require a strong password of at least six characters. Auto Lock: Set up smartphones - mobile devices to automatically lock after 5 minutes inactivity. Auto Wipe: Configure devices to automatically wipe after 10 failed login attempts or if the mobile device is reported lost or stolen. Mobile Security Software: Require the IT Department to install mobile security software on their phones to protect against viruses and malware. Security Education: Remind employees to not click - follow unsolicited links sent in suspicious or text messages. Unknown links may lead to malicious websites.

An advanced weapon and space systems company 8 Best Practices - Steps to Take To Protect Smartphones Turn Off Unneeded Apps: Educate employees / users to turn off the applications such as Bluetooth, Wi-Fi, Infrared, and GPS when not specifically in use. This will not only reduce the attack surface, it will also increase battery life of the mobile device. Encryption: Have the IT Department install and enable local encryption to help protect data stored on the mobile phone. Device Restrictions: Implement a policy that restricts employees from accessing certain apps (e.g., password spoofers) and sites with explicit content. Security Configuration: Some smartphones can be configured to use your rights management system to prevent unauthorized persons from viewing sensitive information on the phone or to prevent authorized users from copying or forwarding the data to third parties.

An advanced weapon and space systems company 9 Security Best Practices For Smartphone Users Smartphone Security: Consider deploying smartphone security, monitoring, and management software such as that offered by Blackberry, iPhone, Android, Symbian, and Juniper Networks for Windows Mobile. Have users connect to the corporate network through an SSL VPN. Company IT Security Policy: Ensure your company establishes a comprehensive IT Security Policy that covers all mobile devices (laptops, smartphones, smartpads, PDAs, and flash sticks).

An advanced weapon and space systems company 10 CONCLUSION Questions?

An advanced weapon and space systems company 11 Sources Cyber Threats to Mobile Phones, US-CERT United States Computer Emergency Readiness Team, By Paul Ruggiero and Jon Foote, 2011 Carnegie Mellon University, Produced for US- CERT Smartphone Enterprise Security Risks and Best Practices, By Debra Littlejohn Shinder, December 2, 2010, 5:04 PM PST, enterprise-security-risks-and-best-practices/1935Debra Littlejohn Shinderhttp:// enterprise-security-risks-and-best-practices/1935 Five Tips For Securing Mobile Data, Tech Republic, By Shun Chen, November 22, 2010, 9:50 AM PST, Wikipedia, The Free Encyclopedia, Smartphones, 09 July 12 Top 5 mobile phone security threats in 2012, SearchSecurity, By Robert Westervelt, News Director, 09 Dec 2011, phone-security-threats-in-2012http://searchsecurity.techtarget.com/news/ /Top-5-mobile- phone-security-threats-in-2012 Blackberry Photos,