• Share
  • Email
  • Embed
  • Like
  • Save
  • Private Content
Advanced Technology: Mohammed Alam "Mobile Security Strategy"
 

Advanced Technology: Mohammed Alam "Mobile Security Strategy"

on

  • 355 views

 

Statistics

Views

Total Views
355
Views on SlideShare
355
Embed Views
0

Actions

Likes
1
Downloads
0
Comments
0

0 Embeds 0

No embeds

Accessibility

Categories

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

    Advanced Technology: Mohammed Alam "Mobile Security Strategy" Advanced Technology: Mohammed Alam "Mobile Security Strategy" Presentation Transcript

    • Mobile Security Strategy Top 3 Lessons from the Trenches November 2013 Authored by: Mohammad Alam
    • What makes a great show?
    • Story Casting Execution
    • The Story • Productivity • Convenience • Data loss
    • • Always on • Always with us • Collecting information • Recording our lives
    • Data loss from missing mobile devices ranks as the top mobile device threat – CSA Survey
    • The Attack • Prevent Remote Wipe • Bypass PIN • Extract • Decrypt
    • Prevent remote wipe – No 3G/4G, No Wifi
    • How strong is your PIN? • 4-digit simple: 13 minutes • 6-digit simple: 22 hours • 5-digit complex: 2.3 years!
    • Get the goods • Your contacts, e-mail, phone #, documents • Your websites, apps, phone, twitter, YouTube • Audio, video, photos • GPS locations • Secrets stored in keychain
    • Extract the password
    • Extract your corporate login
    • Get your contacts
    • A Better Story… Protect… your Privacy …using Strong PIN
    • The Casting
    • One member of the cast
    • With a major flaw
    • The advertisement
    • Clues hidden inside code
    • Neutralizing the poison pill • Find the poison pill • Apply the antidotes – Remove poison pill file – Allow jailbroken phone use
    • The App wasn’t wiped
    • Better casting… Test… Main security features of …Key technologies
    • The Execution Casting Story Execution Mobile Security Strategy
    • THANK YOU! Contact Information Please send your questions to malam@trustsds.com Mohammad Alam Chief Technology Officer Secure Digital Solutions 952-544-0234 Web: www.SecureDigitalSolutions.com