Supporting the global efforts in strengthening the safety, security and resilience of Cyberspace, the Commonwealth Cybersecurity Forum 2013, organised by the Commonwealth Telecommunications Organisation. The ceremonial opening examined how Cyberspace could be governed and utilised in a manner to foster freedom and entrepreneurship, while protecting individuals, property and the state, leading to socio-economic development. Speakers of this session, Mr Mario Maniewicz, Chief, Department of Infrastructure, Enabling Environment and E-Applications, ITU; Mr David Pollington, Director, International Security Relations, Microsoft; Mr Alexander Seger, Secretary, Cybercrime Convention Committee, Council of Europe; Mr Nigel Hickson, Vice President, Europe, ICANN and Mr Pierre Dandjinou, Vice President, Africa, ICANN, added their perspectives on various approaches to Cybergovernance, with general agreement on the role Cyberspace could play to facilitate development equitably and fairly across the world.
Hosted by the Ministry of Posts and Telecommunications of Cameroon together with the Telecommunications Regulatory Board of Cameroon and backed by partners and industry supporters including ICANN, Council of Europe, Microsoft, MTN Cameroon, AFRINIC and Internet Watch Foundation, the Commonwealth Cybersecurity Forum 2013 seeks to broaden stakeholder dialogue to facilitate practical action in Cybergovernance and Cybersecurity, some of which will be reflected in the CTO’s own work programmes under its Cybersecurity agenda.
2. Benefits Mobility
Size
A smart phone is a mobile phone
offering advanced capabilities
beyond a typical mobile phone,
often with computer like
functionality. There is no
industry standard definition of a
smart phone.
3.
4. Inherent risk
to exposure of
personal
information
carried on and
transmitted
through the
device
Phones are easily lost
Devices are associated with and
linked to a particular user for billing
and account purposes.
Increased mobility means increased
exposure.
Applications used on smartphones
are unsafe.
5. Password Protection
• Lack of leads to great exposure
Jail breaking/Rooting
• Exposes phone to remote installation of
software (Might be malware)
Accounts linked to credit cards
• Can easily leak your financial information when
compromised
6. Applications
• Can access and reveal a lot of personal information
• Security leak if not updated
Email Accounts
• Amalgamation of communications
7. How much does your phone know about you?
•Almost everything
Mobile malware
•App based
•Web based
•SMS/Text message-based
Securing your smartphone
•Passcode
•Antivirus software
•Software updates
8. App permissions/access
•Pay attention to permissions app requests
for
Location services: GPs and WiFi
•Disclose location information
•Disclose of transmitted information (public
WiFi)
10. Spyware –
software that self-installs on a computer,
enabling information to be covertly obtained
about a person’s internet use, passwords, etc.
11. Botnets –
A network of private computers infected with
malicious software and controlled as a group
without the owner’s knowledge, e.g. to send
spam
12. Trojan –
A Trojan horse, or Trojan is a malware that
appears to perform a desirable function for
the user prior to run or install but instead
facilitates unauthorized access to a user’s
computer system
13. Virus –
A Virus is a software program capable of
reproducing itself and usually of causing
great damage to files or other programs on
the same computer
14. Worm –
A computer worm is a self-replicating
malware computer program in order to
spread to other computers. It uses a
computer network to spread itself relying on
security failures on the target computer.
Unlike a virus it does not need to attach itself
to an existing program
15. Geolocation –
Geolocation is the identification of the real-
world geographic location of an object, such
as a cell phone or an internet-connected
computer terminal. For example, a picture
taken with a smart phone may record the
location within the file. When the file is
posted on a social network site, any viewer
may be able to determine the location from
the data saved on the picture file
17. Steps to take incase you are victim of
compromise
• If antivirus is installed, scan and remove
malware
• If unable to remove malware, use wiping
program
18. Password protect your phone
Install security software
Be aware of what you are doing with your
phone
Do not “jail-break” or “root” your phone
Application access
Review permission given to applications
when installing them
19. Install “phone-finder” app
Enroll in a backup/wiping program
Limit your activities while using public WiFi
Crosscheck URLs while making purchases
using your phone
Turn off Geolocation and GPS
20. If your phone is stolen
• If enrolled in backup/wiping program
• Contact administrator and wipe immediately
• Contact service provider to cancel your service
• if not enrolled in a backup/wiping program
• Treat loss as you would treat loss of wallet or
purse
y
In case of disposal
•Wipe phone clean