1 Monitoring mobile communication network, how does it work? How to prevent such thing about that? 潘維亞 (P78017058) 周明哲 (P48027049) 劉子揚 (N96011156)

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

How to protect yourself, your computer, and others on the internet
Internet Safety Gleneagles Computer Club February 16, 2015 by Deborah Benson.
Phishing Scams use spoofed s and websites as lures to prompt people to voluntarily hand over sensitive information Phishing s may contain.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Malicious Attacks By Chris Berg-Jones, Ethan Ungchusri, and Angela Wang.
The Ecommerce Security Environment For most law-abiding citizens, the internet holds the promise of a global marketplace, providing access to people and.
Threats To A Computer Network
Security Awareness: Applying Practical Security in Your World, Second Edition Chapter 5 Network Security.
Security Awareness: Applying Practical Security in Your World
Phishing – Read Behind The Lines Veljko Pejović
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
Electronic Payment By: El Panda. What is an electronic payment? Electronic money (also known as e-currency, e-money, electronic cash, electronic currency,
Scams Stevie's Scam School videos
MOBILE MALWARE TOPIC #5 – INFORMATION ASSURANCE AND SECURITY Michael Fine 1.
Quiz Review.
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
Threats to I.T Internet security By Cameron Mundy.
COMPUTER CRIME AND TYPES OF CRIME Prepared by: NURUL FATIHAH BT ANAS.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
CS101 Lecture 14 Security. Network = Security Risks The majority of the bad things that can be done deliberately to you or your computer happen when you.
Your Trusted Partner In All Things IT. 20 Years of IT Experience University Automotive Food Service Banking Insurance Legal Medical Dental Software Development.
Cyber Crime & Security Raghunath M D BSNL Mobile Services,
Cyber Crimes.
PART THREE E-commerce in Action Norton University E-commerce in Action.
MOBILE DEVICE SECURITY. WHAT IS MOBILE DEVICE SECURITY? Mobile Devices  Smartphones  Laptops  Tablets  USB Memory  Portable Media Player  Handheld.
Staying Safe Online Keep your Information Secure.
IT security By Tilly Gerlack.
Adam Soph, Alexandra Smith, Landon Peterson. Phishing is a way of attempting to acquire information such as usernames, passwords, and credit card details.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
Staying Safe Online Aberdeen Grammar School. Things to do online Keep in touch with friends and family using , twitter and social networking sites.
CHAPTER 11 Spoofing Attack. INTRODUCTION Definition Spoofing is the act of using one machine in the network communication to impersonate another. The.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
By: Emma Barnett CELL PHONE GPS: SAFETY OR STALKING DEVICES?
Phishing Pharming Spam. Phishing: Definition  A method of identity theft carried out through the creation of a website that seems to represent a legitimate.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
About Phishing Phishing is a criminal activity using social engineering techniques.criminalsocial engineering Phishers attempt to fraudulently acquire.
How Phishing Works Prof. Vipul Chudasama.
What is risk online operation:  massive movement of operation to the internet has attracted hackers who try to interrupt such operation daily.  To unauthorized.
Topic 5: Basic Security.
Convenience product security Collin Busch. What is a convenience product? A convenience product is a device or application that makes your life easier.
Grants Management Training 200 Cyber Security There are two kinds of people in America today: Those who have experienced a cyber-attack and know it, and.
Module  Introduction Introduction  Techniques and tools used to commit computer crimes Techniques and tools used to commit computer crimes.
Computer crimes.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
INTRODUCTION & QUESTIONS.
5 different ways to get tricked on the internet. 1. Viruses A virus is a computer malware program that copies it’s files to the computer. This may allow.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
Policies and Security for Internet Access
Any criminal action perpetrated primarily through the use of a computer.
FLTCYBERCOM / C10F    U.S. FLEET CYBER COMMAND / U.S. TENTH FLEET    1 Overall Classification of this Briefing is UNCLASSIFIED//FOUO Phishing.
Spoofing The False Digital Identity. What is Spoofing?  Spoofing is the action of making something look like something that it is not in order to gain.
Zeus Virus By: Chris Foley. Overview  What is Zeus  What Zeus Did  The FBI investigation  The virus for phones  Removal and detection  Conclusion.
Android and IOS Permissions Why are they here and what do they want from me?
Created by the E-PoliceSlide 122 February, 2012 Dangers of s By Michael Kuc.
18-1 PRENTICE HALL ©2008 Pearson Education, Inc. Upper Saddle River, NJ FORENSIC SCIENCE An Introduction By Richard Saferstein.
SAMET KARTAL No one wants to share own information with unknown person. Sometimes while sharing something with someone people wants to keep.
Internet Security TEAMS March 18 th, ISP:Internet Service Provider.
CNP Fraud. Occurs when a fraudster falsifies an application to acquire a credit card using an individual’s personal information. (Eg: postal intercept)
IT Security  .
Information Security.
Phishing is a form of social engineering that attempts to steal sensitive information.
Spoofing Basics Presentation developed by A.F.M Bakabillah Cyber Security and Networking Consultant MCSA: Messaging, MCSE RHCE ITIL CEH.
Cybersecurity Awareness
Computer Security.
How to keep the bad guys out and your data safe
Computer Security By: Muhammed Anwar.
Spear Phishing Awareness
Security in mobile technologies
Presentation transcript:

1 Monitoring mobile communication network, how does it work? How to prevent such thing about that? 潘維亞 (P ) 周明哲 (P ) 劉子揚 (N )

2 Contents How mobile communications work Why monitoring? Monitoring in the mobile communication network o Mobile Spy o Mobile Security  Attacks based on communication network Case study : Online i-banking hacks o How does it work? o How to prevent it?

3 How mobile communications work Every day, we make calls, send messages or connect to the Internet using mobile devices but rarely stop to wonder how it all works. So what is actually going on behind the scenes to enable your mobile to do what it does?

4 How mobile communications work Mobile communications work by using low power radio waves necessary to carry speech and data. When a call is made, the signal is handed across a network of linked geographic areas called cells - hence the term cellphone - until it reaches its destination. A piece of equipment called a base station transmits signals from one cell to the next, or to land-line networks. Each cell is the area that each base station covers. Base stations are often called masts, towers or cell-sites. Mobile communication is a communication network that does not involve cable or wire connection between two entities. The current mobile communications technologies are GSM (Global System for Mobile Communications) CDMA (Code Division Multiple Access).

5

6 Why monitoring? Attacker Professionals Thieves (data or identities) Black hat hackers Grey hat hackers General User Keep Credibility Increase Efficiency Reduce Costs Security

7 Mobile Communication Network Monitoring Application We monitor someone or system Remote Monitoring Using Wireless Cellular Networks Mobile Monitoring System for Smart Home Mobile Spy Cell Phone Monitoring Software Parental Monitoring Control We are monitored from someone Mobile Security Monitoring Smartphones for Anomaly Detection Attacks based on communication network

8 Mobile Spy Monitor Your Child or Employee Silently monitor phone surroundings, text messages, GPS locations, call details, photos, social media activity and more. Using the Internet capabilities of the phone, recorded activities, logs and GPS locations are quickly uploaded to your Mobile Spy account. To view the results, simply login to your secure account using any computer or mobile web browser. Logs are displayed by categories and sorted for easy browsing.

9 Mobile Security Mobile security or mobile phone security has become increasingly important in mobile computing. It is of particular concern as it relates to the security of personal information now stored on smartphones. All smartphones, as computers, are preferred targets of attacks. These attacks exploit weaknesses related to smartphones that can come from means of communication like SMS, MMS, Wi-Fi networks, and GSM. There are also attacks that exploit software vulnerabilities from both the web browser and operating system. Finally, there are forms of malicious software that rely on the weak knowledge of average users. Different security counter-measures are being developed and applied to smartphones, from security in different layers of software to the dissemination of information to end users. There are good practices to be observed at all levels, from design to use, through the development of operating systems, software layers, and downloadable apps.

10 Attacks based on communication 1 Attack based on SMS & MMS 1.1 Attack on phone system (cause malfunction) 1.2 Intercept and relay message to third party 2 Attacks based on communication networks 2.1 Attacks based on the GSM networks (IMSI-catcher) 2.2 Attacks based on Wi-Fi (Packet sniffing) 3 Attacks based on vulnerabilities in software applications 3.1 Web Browser (Phishing) 3.2 Operating System 4 Physical attacks 5 Malicious Software (Malware)

11 Attack based on SMS & MMS The attack isn’t new and SMS-stealing malware is embedded in many fake mobile applications and abuses the brands of multiple banks.

12 Attacks based on the GSM networks IMSI-catcher An IMSI catcher is essentially a false mobile tower acting between the target mobile phone(s) and the service providers real towers. As such it is considered a Man In the Middle (MITM) attack. It is used as an eavesdropping device used for interception and tracking of cellular phones and usually is undetectable for the users of mobile phones. A Man-in-the-Middle attack is a type of cyber attack where a malicious actor inserts him/herself into a conversation between two parties, impersonates both parties and gains access to information that the two parties were trying to send to each other. A Man-in-the-Middle Attack allows a malicious actor to intercept, send, and receive data meant for someone else, or not meant to be sent at all, without either outside party knowing until it is too late.

13 Attacks based on Wi-Fi Packet sniffing Packet sniffing is used to monitor packets traveling across a network. Packet sniffing software -- often called network monitoring software -- allows a user to see each byte of information that passes from a computer or server across the network. It can be used to detect network problems or intrusions and can also be used maliciously to try to get access to user names and passwords.

14 Attacks based on vulnerabilities in software applications Web Browser (Phishing) Phishing is the act of attempting to acquire information such as usernames, passwords, and credit card details (and sometimes, indirectly, money) by masquerading as a trustworthy entity in an electronic communication. Communications purporting to be from popular social web sites, auction sites, banks, online payment processors or IT administrators are commonly used to lure unsuspecting public. Phishing s may contain links to websites that are infected with malware. Phishing is typically carried out by spoofing or instant messaging, and it often directs users to enter details at a fake website whose look and feel are almost identical to the legitimate one

Case study : Online i-banking hacks A real case happened with several banks in Thailand Criminals usually got several hundreds thousand from each victim There are several methods of attack than have been used Man-in-middle Packet sniffing Phishing Identity stealing

16 Web login Username/Password Transaction Request Thai internet banking process One-Time-Password Web OTP confirm

17 Criminal’s method : Trojan on mobile phone Criminal send a fake SMS to victim by using application that change phone number of sender to bank’s phone number “For ensure your safety, we introduce you our new i-banking app. This can help you keep your information safe while using i-banking from your mobile devices. URL: ….” Message contain a URL which is linked to an application installation

18 Comparison between true and fake webpage Criminal’s method : Trojan on mobile phone

19 Criminal’s method : Trojan on mobile phone Example of fake website

20 Criminal’s method : Trojan on mobile phone Once installed, it acts as an i-banking application

21 Information stealing method Web login Username/Password Transaction Request One-Time-Password Web OTP confirm

22 Criminal has control of victim’s account Web login Username/Password Transaction Request One-Time-Password Web OTP confirm

23 How to prevent it? : Client view Never download untrusted app (not certified in App store or Play store) Never input username/password into non-official application Check the site security sign before enter any personal information Don’t use i-banking on the main saving account Active real-time monitor such as SMS or report

24 How to prevent it? : Company view Always inform client about untrusted app or website Release only matured version of application to prevent confusion of users Use better type of secondary identification system. (i.e. hard token) Passwords are generated offline. No communication between device and bank. Bank system calculates passcode to confirm the identity. Much safer that SMS system (soft token).

25 Thank you