By Paul Capers.  A cell phone is a portable telephone that does not use a wired connection. It connects to a wireless carrier network using radio waves.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

Northside I.S.D. Acceptable Use Policy
Smartphone and Mobile Device Security IT Communication Liaisons Meeting October 11, 2012 Theresa Semmens, CITSO.
Term 2, 2011 Week 1. CONTENTS Sending and receiving devices Mobile devices connected to networks – Smart phones – Personal digital assistants – Hand-held.
Kadra Alvaro April,2010. Introduction: The Android Platform Threats to Smartphones Android-Specific Threats How to Secure Your Android Device The Future.
Lesson 01: The Digital Experience  Transition from traditional devices to multipurpose digital devices. Wired phones move to cell phones and now smart.
David Waitt Kate Disney 2008 April Digitizing An Analog World.
Computers Are Your Future Twelfth Edition Chapter 8: Wired and Wireless Communication Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Presented by: Luke Speed Computer Security. Why is computer security important! Intruders hack into computers to steal personal information that the user.
Bluetooth Technology. What is Bluetooth? Bluetooth is a short- range communications technology that allows devices to communicate with each other without.
CS691 Robin Kimzey Cell Phone Security a little computer in your pocket an easy target for malcontents.
MOBILE MALWARE TOPIC #5 – INFORMATION ASSURANCE AND SECURITY Michael Fine 1.
Smartphones. Lesson Objectives To understand and demonstrate an understanding of Smartphones.
Information about the computer By Sophia and Christina C.
 An electrical device that sends or receives radio or television signals through electromagnetic waves.
Computer and Internet Basics.
Internet Devices In a changing world these devices keep us running! In a changing world these devices keep us running!
Mobile phone: A mobile phone (also known as a cellular phone, cell phone and a hand phone) is a device which can make and receive telephone calls over.
XP New Perspectives on The Internet, Sixth Edition— Comprehensive Tutorial 6 1 Real-Time Communication on the Internet Exploring Wireless Networks Tutorial.
AS ICT.  A portable communication device is a pocket sized device that is carried around by an individual  They typically have a display screen with.
Chapter 4: Computer Networks
Introduction Our Topic: Mobile Security Why is mobile security important?
Cyber Crimes.
THREATS TO MOBILE NETWORK SECURITY
MOBILE DEVICE SECURITY. WHAT IS MOBILE DEVICE SECURITY? Mobile Devices  Smartphones  Laptops  Tablets  USB Memory  Portable Media Player  Handheld.
Introductory Communications Objectives  To gain an overview of: Modems and digital telephone lines Analogue to digital conversion and digital to analogue.
Networks and Hackers Copyright © Texas Education Agency, All rights reserved. 1.
Bluetooth By Richard B. Heisler, Jr. Villanova University Distributed Systems CSC 8530 Fall 2006 Instructor - Dr. Paul A. Schragger.
ESCCO Data Security Training David Dixon September 2014.
Staying Safe Online Keep your Information Secure.
You, Me & Technology. Overview Technology –Our relationship with technology Threats –What, Who, When, Where, Why & How Protection –What we can do to protect.
COMMUNICATION SYSTEM (2) CT1401 LECTURE-9 : MOBILE PHONE BY : AFNAN ALAYYASH SUPERVISION : DR.OUIEM BCHIR.
Why go Wireless? By Cheryl Aupperle The Start…. Wireless communication is something we all are familiar with. Think about using a walkie- talkie, listening.
Seminar On Cellular Virus
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
Networking Two or more computers linked together so that it is capable of sending messages between them. Network Stand Alone Computer.
Wide Area Networks Vedant Saran. What is WAN?  A Wide Area Network(WAN) is a network that spreads over a large area such as office companies in different.
1 of6 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2007 Microsoft Corporation.
Wireless Security: Protect yourself when you’re mobile.
The Internet When was it created and why?. What Is the Internet? A network of computer networks. It connects networks all over the world through the use.
By Will Peeden.  Voice over Internet Protocol  A way to make phone calls over the internet.  A way to bypass the standard phone company and their charges.
1 C-DAC/Kolkata C-DAC All Rights Reserved Computer Security.
What will the Future Bring? By: Erin Merkel. Cell Phones are a major advantage in today’s society. Without the invention of this technology there would.
Computers Are Your Future Eleventh Edition Chapter 8: Wired & Wireless Communication Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall1.
What is a Computer? Computer generally means a programmable machine. The two principal characteristics of a computer are: it responds to a specific set.
Copyright (c) 2011 Presentation Point (
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
Introduction to Information Systems Lecture 06 Telecommunications and Networks Business Value of Networks Jaeki Song.
Enforcing Cyber security in Mobile Applications – Public Sector Use Case SAPHINA MCHOME, VIOLA RUKIZA TANZANIA REVENUE AUTHORITY INFORMATION AND COMMUNICATION.
Topic 5: Basic Security.
Wireless Networks. Wireless Network A wireless network transports data from one device to another without cables or wires – RF signals – Microwaves –
Agenda Last class: Network Protocols Today: Wireless Technology –How do computers talk to each other… with no wire connecting them?
SMARTPHONE FORENSICS 101 General Overview of Smartphone Investigations.
INTRODUCTION & QUESTIONS.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
SECURITY ISSUES. TYPES BLUE JACKING SENDING MESSAGES TO OPEN BLUETOOTH CONNECTION VIRUSES HARMFUL PROGRAMS THAT SPREAD WITHIN DIGITAL DEVICES COOKIES.
Don’t Log in!. Recap on the previous units I’ve tried to make it as concise as possible but there is a bit of writing, to ensure that you have some notes.
© 2015 albert-learning.com Internet 101. © 2015 albert-learning.com Internet 101 Vocabulary  Browser - a program used to view the Internet.  Click -
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
Understand how a router works and its purpose
Introduction to Networking. What is a Network? Discuss in groups.
By: Matthew Newsome.  The Internet was created so the US Department of Defense can share information between each other, which took place in the 1960’s.
Mobile Phone Forensics Michael Jones. Overview Mobile phones in crime The mobile phone system Components of a mobile phone The challenge of forensics.
By: Jasmin Smith  ability to control what information one reveals about one’s self over the Internet.
How to Make Yourself More Secure Using Public Computers and Free Public Wi-Fi.
Instructor Materials Chapter 6 Building a Home Network
Mobile Phone Techniques
Topic 6: Issues Press F5 to view!
LM 7. Mobile Network Overview
Presentation transcript:

By Paul Capers

 A cell phone is a portable telephone that does not use a wired connection. It connects to a wireless carrier network using radio waves  The ability to communicate over cellular networks distinguishes it self from other types of handheld devices.

 Cell Phones communicate through the air by radio waves with a base station  Cellular networks provide coverage based on dividing a large geographical service area into smaller areas of coverage called cells.  Cells play an important role in reuse of radio frequencies in the limited radio spectrum available to allow more calls to occur than otherwise would be possible.

 The importance of having a cell phone in this day in age is valuable to our lives. It has become a necessity for many people in today’s society. Giving the ability to keep in touch with family, business associates, and having the capability of sending are only a few of the reasons for the ever- increasing importance of cell phones.

 Text messaging  GPS  Music  Sound &Video recording  Sending /Receiving Pictures  Microsoft office applications  Camera/camcorder  Games  Bluetooth  Wi-Fi connectivity  Instant messaging  Surfing the web   and a range of other things of that sort.

 Even though a cell phone presents great features and capabilities, these phones need security.  Cell phones is nothing less than a simplified computer

 Personal/ Business Use  Prevent others from listening to your private conversations  Protect sensitive financial information  Protect s/Calender/address book  Prevent fraudulent billing

 The first known cell-phone virus appeared in 2004 called Cabir.A—it affected only a small number of Bluetooth-enabled phones.  Common Viruses today  Cabir.A  Skulls.A  Commwarrior.A  Locknut.B  Fontal.A

 Results From a Virus  It will spread throughout the phone.  Access and/or delete contact information and calendar entries  Send an infected SMS/MMS messages to every number in your phone book  Send costly messages/calls  Kill your battery The Point is, cell phone viruses are here and will only grow in popularity

 Stolen/Lost  VoIp  Bluetooth  Eavesdropping

 Cell Phones are small. One of the reasons why they are so popular. On the other hand, small things have a way of getting lost or stolen. HOW MANY PEOPLE LOST THERE PHONE BEFORE?  It is highly recommended that you lock your phone with a password. The finder of the phone may have your device, but at least they won’t have your personal information or be able to use your device.

 Voice over IP is a growing occurrence, as are its security problems. With a little time and a solid understanding of a VoIP system, it can be easy to target phone systems and trick them into passing fake information. This could be as simple as changing the caller ID number listed with the phone call, or as dangerous as being able to bypass security checks and accessing a mobile phone users account

 Bluetooth is a wireless technology that allows local devices to generate a small network through which information can be passed. This information usually consists of addresses and small files. Bluetooth settings must be correctly applied. If the settings are not applied correctly, an attacker can gain access to your call history, address book, calendar entries, and much more.  To avoid such problems you should simply disable your bluetooth when not in use.

 At one point in time eavesdropping was a big problem for analog phone users. Due to the fact that FM radio signals were easily monitored using scanners.  The majority of cell phones today are digital.  Therefore they are less vulnerable to eavesdropping.

 Paris Hilton: hackers gained access to her sidekick and downloaded all of her stored video, text and data files and posted her address book on the Internet.

 President Barack Obama  Cyber terrorist Kasper Hauser has accessed President Barack Obama's encrypted Blackberry messages  Obama's Blackberry contained sensitive messages from the Commander in Chief to Vice President Joe Biden, Secretary of State Hillary Clinton, California Governor Arnold Schwarzenegger - even Nuclear Command Control itself.

 kardashinavideo.html kardashinavideo.html

 Turn off Bluetooth discoverable mode  Check Security Updates  Use a mobile anti-virus program  NetQuin(Droid)  LookOut Mobile Security(Droid)  F-Secure  McAfee  Symantec  Lock Phone with password  Have a voic password  Frequently change your password