 Smartphone overview › Platform comparison  App Construction  Smartphone malware and viruses  Security threats  Keeping your Smartphone clean.

Slides:



Advertisements
Similar presentations
ATK Space 9617 Distribution Avenue San Diego, California Tel: (858) Fax: (858) Website:
Advertisements

Mobile device security Practical advice on how to keep your mobile device and the data on it safe.
Smartphone and Mobile Device Security IT Communication Liaisons Meeting October 11, 2012 Theresa Semmens, CITSO.
1 Alcatel Onetouch Antivirus. 2 Thinking about security on your smartphone Alcatel OneTouch? We have the solution. Among the applications on your smartphone,
Cyber check Do you work safely and responsibly online? Do you know about the risks to your cyber security? What are your online responsibilities ? How.
Chapter 8 Chapter 8 Digital Defense: Securing Your Data and Privacy
How to avoid Viruses and Malware on your Computer Use a firewall Using a firewall is like locking the front door to your house—it helps keep intruders.
Smartphone Security How safe are you?. Main Points 1. Malware/Spyware 2. Other Mischief 3. How a phone might get infected 4. Staying Safe a. Malware b.
 How Safe Are Smart Phones? By Sean Breslin. Can We Trust Our Phones?  Our cell phone, for most of us, is always by our side  If it is always with.
By Joshua T. I. Towers $13.3 billion was the direct cost of malware for business in 2006 “direct costs are defined as labor costs to analyze, repair.
Free Software Alternatives: Avast! Anti-virus
MOBILE MALWARE TOPIC #5 – INFORMATION ASSURANCE AND SECURITY Michael Fine 1.
By Paul Capers.  A cell phone is a portable telephone that does not use a wired connection. It connects to a wireless carrier network using radio waves.
Trojan Virus Presented by Andy Lindberg & Denver Bohling.
Securing Your Home Computer Presenter: Donnie Green Date: February 11, 2009 National Aeronautics and Space Administration
Introduction to Mobile Malware
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
Mobile Operating System Security A PRESENTATION BY DANIEL ADAMS CSC 345 DR. BOX.
UNDERSTANDING THE RISKS & CHALLENGES OF Cyber Security DAVID NIMMO InDepth IT Solutions DAVID HIGGINS WatchGuard NEIL PARKER BridgePoint Group A BridgePoint.
Malware: Defenses. Kinds of malware Viruses  Macro Viruses  Memory-resident viruses  File infector viruses  Boot Viruses  Trojan Horses  Hoaxes.
MOBILE DEVICE SECURITY. WHAT IS MOBILE DEVICE SECURITY? Mobile Devices  Smartphones  Laptops  Tablets  USB Memory  Portable Media Player  Handheld.
Mobile Devices Carry Hidden Threats With Financial Consequences Hold StillInstalled.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
Security Awareness ITS SECURITY TRAINING. Why am I here ? Isn’t security an IT problem ?  Technology can address only a small fraction of security risks.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
I.T Security Advice for Dummies By Kirsty Pollard Kirsty Pollard Campsmount Academy.
Administrator Protect against Malware by: Brittany Slisher and Gary Asciutto.
Mobile Security iPhone and Android OS. iPhone Security Features Find my iPhone Remote wipe Automated back up at sync Auto lock / passcode lock Wipe after.
Calling all Ninjas! Get stealthy And increase productivity.
 Computer News/Tip  Facebook  Your Computer Problems  Next meeting January 11th  New & website 
What is Spam? d min.
Grants Management Training 200 Cyber Security There are two kinds of people in America today: Those who have experienced a cyber-attack and know it, and.
SMARTPHONE FORENSICS 101 General Overview of Smartphone Investigations.
Computer Skills and Applications Computer Security.
Protecting Your Computing Devices Antivirus, Anti-Spyware, Ad blocking, Antitheft and OS Maintenance.
MobileSecurity Vulnerability Assessment Tools for the Enterprise Mobile Security Vulnerability Assessment Tools for the Enterprise Integrating Mobile/BYOD.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
Blogs How to use the bog safely and secure? Create new username. Create a strong password to your account. Create the password to your uploaded files.
Global Mobile Anti-malware Market WEBSITE Single User License: US$ 2500 No of Pages: 55 Corporate User License: US$
By: Matthew Newsome.  The Internet was created so the US Department of Defense can share information between each other, which took place in the 1960’s.
Social Media Whats Out? What’s In? What’s New?. Social Media- What’s Out: Ask.fm Tumblr Facebook.
DEVICE MANAGEMENT AND SECURITY NTM 1700/1702. LEARNING OUTCOMES 1. Students will manipulate multiple platforms and troubleshoot problems when they arise.
Mobile Security Tom Taylor. Roadmap Security Risks Security Risks Examples of Attacks Examples of Attacks Personal Protection Personal Protection Business.
Zemana AntiLogger (2012) Zemana AntiLogger (2012) Zemana Antilogger has been specifically developed to protect PC from numerous security.
KASPERSKY INTERNET SECURITY multi-device  Average number of devices in households: 4.5  Consumer device diversity will continue to expand.
Kaspersky Small Office Security INTRODUCING New for 2014!
Mobile Device Security Threats Christina Blakley Host Computer Security.
STOP. THINK. CONNECT. Online Safety Quiz. Round 1: Safety and Security.
CDAC ITS Security Awareness How to help your daily computer activities remain safe and sane.
Computer Security Keeping you and your computer safe in the digital world.
Mobile device security Practical advice on how to keep your mobile device and the data on it safe.
LOGO iPhone to Galaxy Note Transfer Transfer iPhone Data to Galaxy Note 3/Note 4/Note 5/Note Edge.
For more information on Rouge, visit:
KASPERSKY INTERNET SECURITY FOR ANDROID. YOUR MOBILE DEVICES NEED PROTECTION More online communications and transaction are happening on tablets and phones.
Mobile Threats: Ransomware, RAT’s, & the Compromised App Market
Whats Out? What’s In? What’s New?
How to Fix Trojan.Poweliks Using Norton Antivirus?
A Trojan is a computer program that contains the malicious code and it misleads users and user's computer. It aims to designed to perform something is.
Staying Austin College
MOA Delta Mobile OA Installation Guide 2015/12/16.
Call AVG Antivirus Support | Fix Your PC
Norton technical support Norton.com/Setup | Norton Setup and Install with Product Key Norton Antvirus Activation For protection against.
Top 4 Data Recovery Software for Mobile in 2018 for free download
CHAPTER 2: OPERATING SYSTEMS (Part 2) COMPUTER SKILLS.
Hacking mobile devices
Industry Best Practices – Security For Smartphones / Mobile Devices
Managing and Monitoring Screen Time
How to keep the bad guys out and your data safe
How to Stay Safe Online Rollie Edwards.
Security in mobile technologies
Presentation transcript:

 Smartphone overview › Platform comparison  App Construction  Smartphone malware and viruses  Security threats  Keeping your Smartphone clean

 3 Major Phone Operating Systems 1. iSO 2. Andriod 3. Windows Phone

 Choose a platform  xCode for iOS  Java/Python for Android  Browse app store for ideas  Register to be an app developer  Download guides/tutorials online  Test app frequently throughout creation

 Unwanted Executable File › Spreads via app downloads › Multimedia Messaging Service(MMS) attachments › Bluetooth transfers

 App downloading  Uploading information from computer  File transfer between phones (Bluetooth)

 Malware Architect’s Dream › Apps are often rushed to the market › Creates a potential window for nasty apps to slip through  GD9ikg GD9ikg

 AWOL Androids  Flimsy passwords  Naked data  Unsafe surfing (Lack of visibility and control, especially Facebook)  Nosey apps  Repackaged and fraudulent apps  Android malware  Fake anti-malware (rogue antivirus)  Lack of visibility and control

 Clicking on links that lead to downloading viruses and malware

 Symbian is the leading target for attacks  Many viruses are developed in Russia and China, much like they are for PC

 Droid Dream  SW Secure Phone  Geinimi › Botnet-like composure › Trojan that compromises significant amounts of personal data off phone

 Affects jailbroken iPhones  Changes background to picture of Rick Astley  Result of user not changing default password for phone  Moral of the story – don’t jailbreak phones

 Windows Mobile attacker  Masks itself as an app  Makes phone call internationally, racking up bills

 Don’t jailbreak or alter devices  Don’t install suspicious apps  Avoid unreliable websites  Install virus vaccines  Utilize secure Wi-Fi  Turn off Bluetooth when not in use

 Enable auto-lock  Enable passcode lock  Use Wi-Fi safely  Browse via Safari  Set device usage restrictions

1. BullGuard 2. SMobile 3. Kaspersky 4. ESET 5. Lookout Premium 6. Norton 7. F-Secure 8. BitDefender 9. NetQin 10. SimWorks

 Pros › Provides malware protection and security if lost or stolen  Cons › Lacks GPS locate device if lost or stolen

 &feature=BF&list=PLB9404F6CCA3CF70B&index =3 &feature=BF&list=PLB9404F6CCA3CF70B&index =3

Best defense is a good offense. › Install updates ASAP › Avoid apps from websites you don’t trust › Surf Smart

  google-nearly-tied/ google-nearly-tied/9590  security-firm security-firm  smartphone-from-viruses-and-malware html smartphone-from-viruses-and-malware html   these-11-android-and-iphone- -apps/8296?tag=content;drawer-container these-11-android-and-iphone- -apps/8296?tag=content;drawer-container  Alarming-Complacency-Users-Mobile Alarming-Complacency-Users-Mobile   photo/ photo/