Your SlideShare is downloading. ×
  • Like
Mobile security and privacy in 3G&LTE
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×

Now you can save presentations on your phone or tablet

Available for both IPhone and Android

Text the download link to your phone

Standard text messaging rates apply

Mobile security and privacy in 3G&LTE

  • 224 views
Published

Mobile Security & Privacy Analysis in 3G&LTE environment

Mobile Security & Privacy Analysis in 3G&LTE environment

Published in Technology
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Be the first to comment
    Be the first to like this
No Downloads

Views

Total Views
224
On SlideShare
0
From Embeds
0
Number of Embeds
1

Actions

Shares
Downloads
12
Comments
0
Likes
0

Embeds 0

No embeds

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
    No notes for slide

Transcript

  • 1. Mobile Security and Privacy in 3G & LTE:Strategies, Solutions and Market ForecastAnalysis 2012-2017URL: http://mindcommerce.com/Publications/MobileSecurityPrivacy_2012-2017.phpPublished: Sep 2012 Pages: 112Single User: $1,995.00: Company Wide: $4,995.00: Team License: $2,865.00This market has been initially driven by business concerns about protection of corporateassets and information. Mobile threats are becoming increasingly prolific as the mobileplatform continues to gain popularity through the adoption of smart devices. As end-users and businesses come to rely on smartphones and tablets in their personal andbusiness activities, they store valuable information that is attracting the attention ofcybercriminals.National mobile security markets in Europe, North America and the Asia Pacific regionwill experience the strongest growth. BRIC nations will also show signs of a burgeoningmobile security market as their populations increasingly adopt smart devices.This research evaluates the mobile security and privacy ecosystem and vendor/solutionanalysis including several case studies. It analyzes current and anticipated security andprivacy concerns and associated solutions. It identifies most likely and impactful mobilethreats and related strategies for defense. The report provides market projectionanalysis on a global, regional, and country basis for 2012 through 2017.This report also provide country-specific mobile security market analysis for Australia,Brazil, Canada, China, France, Germany, India, Russia, UK, and USA as well as regionalanalysis for the Middle East and Southeast Asia. It also includes analysis of thefollowing network operator initiatives in mobile security/privacy: Airtel, AT&T, MTS,Orange, Saudi Telecom, Telefonica, T-Mobile, Verizon, and Vodafone.Target Audience:
  • 2. • Mobile/wireless service providers• Mobile security and privacy vendors• Mobile/wireless device manufacturers• Mobile/wireless application developers• Government and regulatory organizations• Law enforcement including police and othersTable of Contents:1.0 EXECUTIVE SUMMARY 92.0 MOBILE SECURITY THREAT AND PRIVACY MARKET OVERVIEW 103.0 UNDERSTANDING MOBILE SECURITY: 113.1 DEFINING MOBILE SECURITY: 113.2 MOBILE DEVICE SECURITY 114.0 UNDERSTANDING MOBILE THREATS 134.1 WEB BASED THREAT 134.2 PHISHING SCAMS 134.3 DRIVE-BY DOWNLOADS: 134.4 BROWSER EXPLOITS: 134.5 WI-FI SNIFFING 144.6 SOCIAL ENGINEERING ATTACKS 154.7 RESOURCE ABUSE 154.8 DATA LOSS 154.9 DATA INTEGRITY THREATS 165.0 UNDERSTANDING MOBILE PRIVACY 175.1 THE TYPES OF THREAT 175.2 THE THREAT SMARTPHONES POSE TO BUSINESSES 175.3 THE SOPHISTICATION OF THE MOBILE DEVICE IS IT’S OWN WORST ENEMY: 175.4 THE BIG PROBLEM WITH DOWNLOADABLE MOBILE APPS 175.5 REMOTELY HOSTED MOBILE APPLICATIONS AND DATA: 185.6 THE PROBLEMS WITH GSM: 185.7 THE GROWTH OF MACHINE TO MACHINE (M2M) 185.8 THE BIGGEST MYTH ABOUT MOBILE SECURITY 196.0 MOBILE ATTACKS AND VULNERABILITIES REVIEW 2011 206.1 JANUARY TO DECEMBER 2011 206.2 APPLE IOS VULNERABILITIES 216.3 DIRECT ATTACKS 216.4 BROWSER-BASED THREATS 226.5 THE BASIC STEPS TO PERFORM THIS ATTACK INCLUDE: 226.6 THREAT FOR SMBS (SMALL & MEDIUM BUSINESSES) 237.0 MOBILE SECURITY THREAT BY OS PLATFORM 247.1 IOS 24
  • 3. 7.2 SUMMARY OF IOS SECURITY 247.3 ANDROID 257.4 SUMMARY OF ANDROID’S SECURITY 268.0 MOBILE MALWARE FOR DEVICES 289.0 MOBILE DEVICE SECURITY: ANTIVIRUS SOFTWARE 309.1 AVG MOBILE SECURITY 309.2 KASPERSKY MOBILE SECURITY 309.3 ESET MOBILE SECURITY 319.4 BULLGUARD MOBILE SECURITY 319.5 MCAFEE MOBILE SECURITY 319.6 LOOKOUT MOBILE SECURITY 329.7 F-SECURE MOBILE SECURITY 329.8 NORTON SMARTPHONE SECURITY 329.9 TREND MICRO MOBILE SECURITY 329.10 DR. WEB MOBILE SECURITY SUITE 3310.0 MOBILE SECURITY TREND ANALYSIS 3410.1 NETWORK SECURITY TREND 3410.1.1 RANSOMWARE TO TAKE MOBILE DEVICES HOSTAGE 3410.1.2 WORMING INTO ANDROID 3410.1.3 POLYMORPHISM WANT A CRACKER? 3410.1.4 CLAMPDOWN ON NETWORK-BASED MONEY LAUNDERING 3510.1.5 PUBLIC-PRIVATE RELATIONSHIPS IN SECURITY 3510.1.6 SCADA UNDER THE SCOPE 3510.1.7 SPONSORED ATTACKS 3610.1.8 HACKING A GOOD CAUSE 3610.2 MOBILE VIRTUAL PRIVATE NETWORK TREND 3710.3 CLOUD BASE SECURITY: 3810.4 CASE ANALYSIS: OBLIVIOUS DATA LOSS AND THE WILD WEST OF MOBILE APPSECURITY 3910.4.1 IN A WORST CASE SCENARIO, THEN, EXACTLY WHAT ARE THE RISKS OFOBLIVIOUS DATA LOSS? 4011.0 TOP SECURITY THREAT TREND IN 2012 4211.1 SOCIAL MEDIA AND THE WEB: 4211.2 SECURITY MEANS MORE THAN MICROSOFT: 4211.3 MOBILE DEVICES IN THE SPOTLIGHT 4211.4 NEW WEB AND NETWORK TECHNOLOGIES 4211.5 CASUAL CONSUMERIZATION CAUSES BACKSLIDING 4211.6 MORE HACKTIVISM AND TARGETED ATTACKS 4211.7 DATA REGULATIONS PROLIFERATE AND PENALTIES GROW 4211.8 MOBILE PAYMENT TECHNOLOGY MAY BE NEW TARGET 4311.9 CLOUD SERVICES ARE BACK IN VOGUE 43
  • 4. 11.10 THE BASICS STILL GO WRONG 4312.0 GROWTH DRIVER ON TODAY’S MOBILE SECURITY & PRIVACY LANDSCAPE 4412.1 PROLIFERATION OF SMARTPHONE & INTELLIGENT MOBILE COMPUTING DEVICES4412.2 INCREASING DEMAND OF DATA SERVICES 4512.3 GROWING DEMAND ON USING OF CORPORATE AND OPEN NETWORKS 4612.4 DEVELOPMENT OF MCOMMERCE 4612.5 MOBILE ENTERTAINMENT PROLIFERATION 4712.6 MOBILE PERSONALIZATION DEMAND AND MSECURITY 4712.7 GROWTH OF OPEN SOURCE OS LIKE ANDROID 4713.0 MOBILE SECURITY MARKET PROJECTION 2012-2017: GLOBAL VS. REGIONAL VS.NATIONAL 4913.1 GLOBAL MARKET VALUE ON SPENDING 2012-2017 4913.2 MARKET VALUE SHARE ACROSS ECO-SYSTEM 2012-2017 4913.3 REGIONAL MARKET VALUE SHARE IN % VS. MOBILE SUBSCRIBER % (APAC VS.EUROPE VS. NORTH AMERICA VS. LATIN AMERICA VS. AFRICA) 5113.4 REGIONAL MARKET VALUE IN USD MLN: APAC VS. EUROPE VS. NORTH AMERICAVS. LATIN AMERICA VS. AFRICA 2012-2017 5213.5 CAGR COMPARISON OF 2012 TO 2017(APAC VS. EUROPE VS. NORTH AMERICAVS. LATIN AMERICA VS. AFRICA) 5213.6 NATIONAL MARKET VALUE PROJECTION OF TOP 13 COUNTRIES/TERRITORIES2012-2017 5313.7 SECURITY SOFTWARE PRE-INSTALLED PROJECTION AMONG TOTALSMARTPHONES & TABLETS 2012-2017 5313.8 UP-TO-DATE SECURITY SOFTWARE USE BEHAVIOR AMONG MOBILE DEVICEOWNER: % OF INSTALLED VS. NOT INSTALLED 2012-2017 5413.9 MOBILE RELATED CYBER CRIME VICTIM VS. UNAWARE ABOUT MOBILE SECURITYMEASURE: % AMONG MOBILE DEVICE OWNER 5413.10 MOBILE OS RANKING AS PER DEVICE SECURITY 5513.10.1 WHICH MOBILE OS CAN ENSURE HIGHEST SECURITY? 5713.11 MOBILE SECURITY COMPANY MERGER & ACQUISITION TREND 2011-2012 5813.12 INVESTMENT TREND AND OPTION IN MOBILE SECURITY BUSINESS 5814.0 COUNTRY SPECIFIC MOBILE SECURITY MARKET ANALYSIS 5914.1 CHINA 5914.1.1 MOBILE SECURITY MARKET SHARE 2012 5914.1.2 TOTAL MOBILE SECURITY PRODUCT USER VS. ACTIVE USER 2012 5914.1.3 SYMBIAN VS. ANDROID: NEW VIRUS NUMBER 2010-2012 Q1 6014.1.4 SYMBIAN VS. ANDROID: TYPES OF VIRUS 2012 6014.1.5 MOBILE INTERNET USER PROJECTION 2012-2017 6114.2 USA 6114.2.1 MOBILE INTERNET USER 2012-2017 61
  • 5. 14.2.2 % OF MOBILE ANTIVIRUS SOFTWARE USER AMONG TOTAL MOBILE INTERNETUSER 6214.2.3 BOTNET ON SPREADING VIRUS 2012 6214.2.4 PLATFORM USE TO SPREAD SPAM ON MOBILE DEVICE 6314.3 UK 6314.3.1 MOBILE INTERNET USER 2012 – 2017 6314.3.2 MOBILE ANTIVIRUS SOFTWARE 2012 6414.3.3 BOTNET ON SPREADING VIRUS 6414.4 RUSSIA 6514.4.1 MOBILE INTERNET USER 6514.4.2 MOBILE ANTIVIRUS SOFTWARE USER 2012 6514.4.3 COMMON TYPES OF SPAM 2012 6614.5 FRANCE 6614.5.1 MOBILE INTERNET USER 6614.5.2 MOBILE ANTIVIRUS SOFTWARE 2012 6714.5.3 COMMON TYPES OF SPAM 2012 6714.6 BRAZIL: 6814.6.1 MOBILE INTERNET USER 6814.6.2 MOBILE ANTIVIRUS SOFTWARE: 6814.6.3 PLATFORM USE TO SPREAD SPAM ON MOBILE DEVICE 6914.7 INDIA 6914.7.1 MOBILE INTERNET USER 6914.7.2 MOBILE ANTIVIRUS SOFTWARE 2012 7014.7.3 COMMON SPAM TYPES IN INDIA 7014.8 GERMANY 7114.8.1 MOBILE INTERNET USER 7114.8.2 MOBILE ANTIVIRUS SOFTWARE 7114.8.3 PLATFORM USE TO SPREAD SPAM ON MOBILE DEVICE 7214.9 AUSTRALIA 7214.9.1 MOBILE INTERNET USER 7214.9.2 MOBILE ANTIVIRUS SOFTWARE 2012 7314.10 MIDDLE EAST 7314.10.1 MOBILE INTERNET USER 7314.10.2 MOBILE ANTIVIRUS SOFTWARE 2012 7414.11 SOUTH EAST ASIA 7414.11.1 MOBILE INTERNET USER 7414.11.2 MOBILE ANTIVIRUS SOFTWARE 2012 7514.12 CANADA 7514.12.1 MOBILE INTERNET USER 7514.12.2 MOBILE ANTIVIRUS SOFTWARE 2012 7615.0 MOBILE SECURITY VENDOR / SOLUTION PROVIDER ANALYSIS 77
  • 6. 15.1 VENDOR INVESTMENT INITIATIVE 2012 7715.1.1 LOOKOUT MOBILE 7715.1.2 SYMANTEC 7715.1.3 MCAFEE 7715.1.4 JUNIPER NETWORKS 7715.1.5 CISCO 7715.1.6 TREND MICRO 7715.2 AVAST REVIEW 7815.3 WORLDWIDE ANTIVIRUS SOFTWARE MARKET ANALYSIS 8016.0 SMARTPHONE SECURITY VULNERABILITY 8217.0 MOBILE SECURITY MERGERS AND ACQUISITIONS (M&A). 8318.0 MOBILE HANDSET / OS PROVIDER INITIATIVE ANALYSIS 8419.0 TELECOM NETWORK PROVIDER INITIATIVE ANALYSIS 8619.1 AT&T 8619.2 VODAFONE 8619.3 T-MOBILE 8619.4 ORANGE 8619.5 SAUDI TELECOM 8719.6 VERIZON 8719.7 TELEFONICA 8719.8 AIRTEL 8719.9 MTS 8820.0 MOBILE THREAT LANDSCAPE REVIEW JAN-JULY 2012 8920.1 LATEST THREATS BY TYPE 2012 (JAN – JULY) 8920.2 NEW VARIANTS OF ALREADY KNOWN FAMILIES 8921.0 MOBILE PRIVACY LANDSCAPE REVIEW: DO-NOT-TRACK DEBATE 9022.0 MOBILE SECURITY CASE ANALYSIS 9122.1 A SYMANTEC CASE: MOBILE HACKERS IN THE VALUE CHAIN 9122.2 A TROJAN CASE: THE RISE OF MOBILE THREATS WITH POLITICAL AGENDAS 9422.3 BRITISH ROYAL MOBILE PHONE HACKING CASE 9822.3.1 CAN IT BE STOPPED? 9923.0 MOBILE PRIVACY CASE ANALYSIS 10123.1 PANDALABS PRIVACY VIOLATION PREDICTION CASE – THE BIGGEST SECURITYTHREAT OF 2012 10223.1.1 MOBILE MALWARE 10323.1.2 MALWARE FOR TABLETS 10323.1.3 MAC MALWARE 10323.1.4 PC MALWARE 10323.1.5 SMBS UNDER ATTACK 10423.1.6 WINDOWS 8 10423.2 MOBILE PRIVACY THREAT CASE TO TRAVEL STORES 104
  • 7. 23.2.1 HEALTHCARE MOBILE DATA LOSS CASE STUDY 10524.0 CONCLUSION & RECOMMENDATIONS: 10624.1 CONCLUSION 10624.2 RECOMMENDED 10 BEST PROTECTION PRACTICES AGAINST MOBILE THREAT 10724.3 RECOMMENDED PROTECTION AGAINST MOBILE PRIVACY VIOLATION 10924.3.1 MOBILE ANTIVIRUS 10924.3.2 SECURE BROWSER 10924.3.3 MOBILE DEVICE MANAGEMENT (MDM) 11024.3.4 ENTERPRISE SANDBOX 11024.3.5 DATA LOSS PREVENTION (DLP) 11124.3.6 DEVICE SECURITY MODELS 111List of FiguresFigure 1: Mobile device threat Diagram 12Figure 2: % of Web Based Threat 13Figure 3: User’s email account on an Apple iPad exploited by the Firesheep tool(copyright: Yahoo) 14Figure 4: Diagram of Protection against Mobile to Mobile threat 16Figure 5: Mobile malware in multipurpose 29Figure 6: Mobile Overtaking Web (copyright: Morgan Stanley) 45Figure 7: Global Mobile Data Traffic Forecast by Region (copyright: Cisco) 45Figure 8: Growth of Mobile commerce 46Figure 9: growth of android market share 48Figure 10: Global mSecurity Market Value on Spending 2012-2017 (USD $ Bln) 49Figure 11: Market Value Share of Smartphone 2012 50Figure 12: Market Ecosystem Comparison of Smartphone(Copyright chetan SharmaConsulting) 50Figure 13: APAC vs. Europe vs. North America vs. Latin America vs. Africa: mSecurityMarket Value % 2012-2017 51Figure 14: Mobile Subscriber % of Total Global: APAC vs. Europe vs. North America vs.Latin America vs. Africa 2012-2017 51Figure 15: APAC vs. Europe vs. North America vs. Latin America vs. Africa: mSecurityMarket Value in USD mln 2012-2017 52Figure 16: CAGR comparison of APAC vs. Europe vs. North America vs. Latin Americavs. Africa during 2012-2017 52Figure 17: Mobile security software pre-installed with smartphones & tablets %projection 2012-2017 53Figure 18: % of Mobile Device Owner Installed vs. Not installed up-to-date securitysoftware 2012-2017 54Figure 19: Mobile Related Cyber Crime Victim vs. Unaware about Mobile SecurityMeasure: % among Mobile Device Owner 54
  • 8. Figure 21: Market share of mobile security company in China 2012 59Figure 22: Total Mobile Security Product User vs. Active User in China 2012 59Figure 23: Symbian vs. Anrroid new virus number 2010-2012 Q1 60Figure 24: Type of virus on Symbian vs. Android in China 2012 60Figure 25: Mobile Internet User Projection in China 2012-2017 61Figure 26: Mobile Internet user of USA 2012-2017 61Figure 27: Active vs. Inactive Mobile Antivirus User 62Figure 28: Types of Botnet in USA as of 2012 62Figure 29: Spam Types In USA as of 2012 63Figure 30: Mobile Internet User of UK 2012-2017 63Figure 31: Active vs. Inactive Mobile Antivirus software user 2012 64Figure 32: Types of Botnet in UK as of 2012 64Figure 33: Mobile Internet User of Russia 2012-2017 65Figure 34: Mobile Antivirus software user 2012 65Figure 35: Platform use to spread Spam on Mobile device 66Figure 36: Mobile Internet User 2012-2017 66Figure 37: Active vs. Inactive Mobile Antivirus software user 2012 67Figure 38: Common types of spam in Russia as of 2012 67Figure 39: Mobile Internet User 2012-2017 68Figure 40: Mobile Antivirus software user 68Figure 41: Common types of spam 2012 69Figure 42: Mobile Internet User 2012-2017 69Figure 43: Mobile Antivirus software user 70Figure 44: Common Spam Types in India 2012 70Figure 45: Mobile Internet User 2012-2017 71Figure 46: Mobile Antivirus software user 71Figure 47: Platform use to spread Spam on Mobile device 72Figure 48: Mobile Internet User 2012-2017 72Figure 49: Mobile Antivirus software user 2012 73Figure 50: Mobile Internet User 2012-2017 73Figure 51: Mobile Antivirus software user 2012 74Figure 52: Mobile Internet User 2012-2017 74Figure 53: Mobile Antivirus software user 75Figure 54: Mobile Internet User 2012-2017 75Figure 55: Mobile Antivirus software user 76Figure 56: Worlwide Antivirus Software Vendors (Copyright: opsvvat) 80Figure 57: Worldwide Mobile Device Sales [1st Qtr 2012] 84Figure 58: T-Mobile Security Interface (copyright: T-Mobile) 86Figure 59: Latest Mobile Threat by Type 2012 (Jan – July) 89Figure 60: Mobile Threats vs. Staged Payload (copyright: Symantec) 91Figure 61: Mobile Threats: Android.Jmshider (copyright: Symantec) 92
  • 9. Figure 62: Mobile Threat: Example of In-App Promotion To Download Threat (copyright:Symantec) 93Figure 63: Mobile threats - embedded Trojan (copyright: Symantec) 95Figure 64: Mobile threats- Android.Geinimi: a back door Trojan Scenario (copyright:Symantec) 96Figure 65: Mobile threats: Group III type mobile threats – storefront apps (copyright:Symantec) 97List of TablesTable 1: Mobile Personalization by Regions 47Table 2: Market Value Projection by Countries: top 13 countries 53Table 3: Mobile OS ranking while security issue considered top 55Table 4: Mobile Handset Unit vs. Market Share by OS platform 2012 85 Contact: kabir@mindcommerce.com