Presentation is loading. Please wait.

Presentation is loading. Please wait.

Mobile Device Security Threats Christina Blakley Host Computer Security.

Similar presentations


Presentation on theme: "Mobile Device Security Threats Christina Blakley Host Computer Security."— Presentation transcript:

1 Mobile Device Security Threats Christina Blakley Host Computer Security

2 Outline I. Threats against mobile devices II. Where do the threats come from? III. What are the consequences? IV. Countermeasures V. How to protect against threats.

3 Threats Against Mobile Devices  Security Locks/Passwords  Application Markets  SMS  Social Engineering  Physical Lost of Device

4 Security Locks and Passwords  54% of smartphone users use important dates or people as passcodes to phones.  Social Engineering can aid attackers in retrieving passcodes to phones  Advances in security locks of phones include:  Biometrics  Behavioral: Voice and handwriting  Physiological: facial recognition and fingerprint  Biometrics on cell phones have all been hacked thus far with iPhone fingerprint scanner being the latest.  Most secure is passcode is 8-character combination of numbers, letters, and symbols.

5 Application Markets  Ability to download third party software to mobile devices  Platforms includes IOS, Android, Windows, and Blackberry.  Anyone can become a developer  Currently only Apple and Blackberry have app regulation policies.  Apps in the app store that contain malicious software  Mobile Devices have the ability to download software outside of app store through manipulation of the bootloader.  Rootkits/”Jailbreaking” are also ways in which hackers can enter into devices.

6 Short Message Service  Text messaging allows you to transmit data from one mobile device to another  Spam unsolicited commercial email. However email is no longer the only form of spam, it now comes in the form of SMS  Phone numbers are being sold by companies  Phishing is the act of attempting to acquire personal information such as passwords and credit card information masquerading as a trustworthy entity.  The attackers typically use urgent messages to get the victims attention.  Walmart was the subject of a phishing attack when a SMS was sent to a large number of people offering a $1000 gift card.

7 Physical Lost of Device  More than 33% of mobile device users do not put passwords on their devices  Out of that 33%, 90% of them stated they have sensitive personal information stored in their phones.  Americans lost $30 billion worth of mobile phones in 2011.  Many applications with sensitive information such as banking do not always require user to re-login.  Many users use notepads applications to store passwords for accounts.  Could result in substantial lost for the victim.

8 Consequences  Denial of Service and system unavailability attacks  Trojan horses entering phones through applications  False billing from providers  Unwanted disclosure of Stored information  Deleted, corrupted, or stolen user data  Gateway to users other personal accounts

9 Countermeasures  Preventative  Regulation of all app stores  Overhaul of mobile device anti-virus  Spam block  Require password protection  Detective  Remote security wipe  Hard reset

10 How can you protect yourself?  Limit personal information in phone.  Use external storage system.  Password protect device  Use privacy screen protector to prevent shoulder surfing  Do not alter phone with untrusted software.

11 Works Cited  "Here's What People Are Doing On Their Smartphones And Tablets." Business Insider. N.p., n.d. Web. 05 Dec. 2013.  Indiana University of PA, comp. Person Custom Business Resources. N.p.: n.p., n.d. Print.  "Top Threats to Mobile Devices." - BankInfoSecurity. Roman, Jeffrey., n.d. Web. 05 Dec. 2013.  PowerPoints, Host Computer Security, Dr. Obliety


Download ppt "Mobile Device Security Threats Christina Blakley Host Computer Security."

Similar presentations


Ads by Google