Wireless and mobile security


Published on

My Presentation at National Seminar on Recent Wireless and Mobile Trends

Published in: Education
1 Like
  • Be the first to comment

No Downloads
Total Views
On Slideshare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide
  • Wired Equivalent Protocol
  • Wireless and mobile security

    1. 1. Wireless and Mobile Security<br />Null-The open Security Community<br />Pushkar<br />
    2. 2. News…<br />Varanasi Bomb Blast Mail sent through hacked WiFiof a DJ in NaviMumbai.<br />Out of 2300 connections only 16% are secured in Pune City – Cyber Crime Cell, Pune.<br />Police making it compulsory to secure wifi.<br />Geimini Trojan attacks Android users on New Year.<br />
    3. 3. WIRELESS Technology<br />
    4. 4. Wireless Network Standards….<br />
    5. 5. Attacks…<br />Identity Theft – Hacking a wireless network and using it.<br /> Use it for fun.<br /> Use it for free.<br /> Use it for crime.<br />MITM – Sniff the users information.<br />Corporate espionage.<br />Sniff passwords<br />DoS– Interrupt work.<br />
    6. 6. Wireless Security Measures…<br />No Security  <br />WEP – Wireless Equivalent Protocol<br />Simple Low level Security<br />40 bit shared key used.<br />only ensured the data received is the same or not.<br />can be easily cracked now.<br />
    7. 7. Wireless Security measures contd…<br />WPA – Wi-Fi Protected Access.<br /> 128bit, <br /> TKIP – Dynamically offering keys for connection.<br /> Encrypted using Michael Algorithm.<br />WPA2 –<br />128bit,<br />AES encryption algorithm.<br />More reliable and most widely used.<br />
    8. 8. Mobiles – Smartphones…<br />The next generation technology.<br />Compact and efficient devices.<br />A practical and cost-effective alternative to laptops.<br />Need of the hour.<br />Work on Move.<br />
    9. 9. Who are the users …<br />You, me and all,<br />Corporate Directors, Managers, Executives,<br />Salesman, Suppliers, Contractors,<br />Government Officials<br />College Students,<br />
    10. 10. Affecting factors…<br />Mobile Communication Capabilities :<br />Cellular – MITM in voice transmission, with using less secured protocols or encrypting/decrypting techniques.<br />WiFi-MITM<br />Blutooth /Infrared - Personal Area Network<br />SMS—Scripts to send spam sms from the device, inject malware on the phones.<br />Corporate Firewall,<br />Inside the firewall,<br /> Access to all the data on network,<br />Outside the firewall<br /> Data is in the air,<br />
    11. 11. Threats…<br />Physical : <br />Device theft, loss of device<br /> Misuse by trusted people (colleagues, friends, family)<br />Malwares:<br /> Mobile Malwares-new and emerging threat<br /> Infection vectors are more.<br />Eg., Mabir/Cabir virus: can infect Symbian OS via Bluetooth or SMS.<br />Dampigtrojan: corrupts the system’s uninstallation settings.<br />
    12. 12. Threats contd…<br />Mobile App Downloads :<br />Free nature of apps,<br /> “Jail-breaking” – process which allows users to installed pirated or unchecked applications.<br />Application Isolation.<br />Secure Data Storage:<br /> Password protection, mobile number fixed for each device, auto mounting disable.<br />Strong Authentication with poor keyboards.<br />Secure Operating Systems<br />
    13. 13. Platforms…<br />Android Operating System :<br />OS by google, open source.<br />Used by many mobile device producing companies.<br />iOS :<br />Apple OS.<br />Used in iPhones, iPads<br />Windows Mobile OS /Windows Phone 7 : <br />Mobile OS from Microsoft.<br />Symbian OS /Symbian^3 :<br />Used in Nokia devices.<br />
    14. 14. Security Measures…<br />Platform-Centric Security : Protecting the device/network instead of data.<br />Data-Centric Security : Protecting Data instead of devices/networks. <br />Components in mobile security :<br /> Authentication and Authorization :<br /> Firewall Security :<br /> Over-the-air security :<br /> Offline security :<br />
    15. 15. Security Measures <br />Authentication and Authorization :<br /> Authorize the device use as well as the application use by proper authentication.<br />Firewall Security :<br />Include and register mobile devices with company firewalls. Only give access to registered users.<br />Over-the-air security :<br />Encrypt the data when sent onto public mobile networks.<br />Offline security :<br />Prevent mobile device to reach in the wrong hands.<br />
    16. 16. Security Measures …<br />Security over PAN :<br /> Security for Bluetooth /Infrared data transmission.<br />Security over mobile Malwares :<br />Install trusted anti-virus scanners in mobiles.<br />
    17. 17. Wifi Cracking Demo<br />
    18. 18. Conclusion …<br />Work while on move with CAUTION …<br />
    19. 19. Thank You <br />