SlideShare a Scribd company logo
1 of 2
Download to read offline
Mobile Phone Security Threats Categories
•	 Mobile Device and Data Security Threats   
Threats related to unauthorised or intentional physical access to mobile phone and Lost or Stolen mobile 	
phones.
Threats related to mobile phone connectivity to unknown systems, phones and networks using 	techno-
logies like Bluetooth, WiFi, USB etc.
Threats arising from vulnerabilities in Mobile Applications and Operating Systems .
•	 Mobile Connectivity Security Threats
•	 Mobile Application and Operating  System Security Threats
Typical impact of attacks against Mobile Phones
• Exposure or Loss of user's personal Information/Data, stored/transmitted through mobile phone.
• Monetary Loss due to malicious software unknowingly utilizing premium and highly priced SMS and Call
Services.
• privacy attacks which includes the tracing of mobile phone location along with private SMSs and calls 	 	
without user’s knowledge.
• Loosing control over mobile phone and unknowingly becoming zombie for targeted attacks.
Mitigation against Mobile Device and Data Security Attacks
Record IMEI number:
w Record the unique 15 digit IMEI number. In case Mobile phone is stolen/lost, this IMEI number
is required for registering complaint at Police station and may help in tracking your mobile
phone through service provider.
Do’s and don’ts for Mobile Device
Enable Device locking:
w Use autolock to automatically lock the phone or keypad lock protected by passcode/	 	
security patterns to restrict acess to your mobile phone.
Use a PIN to lock SIM card:
w Use a PIN (Personal Identification Number) for SIM (Subscriber Identity Module) card to
prevent people from making use of it when stolen. After turning on SIM security, each
time phone starts it will prompt to enter SIM PIN.
w  Use password to protect information on the memory card.
Report lost or stolen devices
w Report lost or stolen devices immediately to the nearest Police Station and concerned service provider.		
Use mobile tracking feature.
w Use the feature of Mobile Tracking which could help if the mobile phone is lost/stolen. Every time a new
SIM card is inserted in the mobile phone, it would automatically send messages to two preselected phone
numbers of your choice, so that you can track your Mobile device.
Do’s:
Mobile Phone Security
Note: This is usually printed on the phone below
the battery, or can be accessed by keying *#06# on
most of the phones.
Steps to be followed before
Mobile Phone usage :
aFOR MORE INFORMATION REFER MANUFACTURER
MANUAL
Mobile phones are becoming ever more popular
and are rapidly becoming attractive targets for mali-
cious attacks. Mobile phones face the same security
challenges as traditional desktop computers, but their
mobility means they are also exposed to a set of risks
quite different to those of a computer in a fixed loca-
tion. Mobile phones can be infected with worms, tro-
jan horses or other virus families, which can compro-
mise your security and privacy or even gain complete
control over the device. This guide provides the nec-
essary steps, do’s, don’ts  tips to secure your mobile
devices.
STEP 1 : Read the manufacturer’s manual carefully
and follow the guidelines as specified to setup your
mobile phone.
STEP 2 : Record the IMEI (International Mobile
Equipment Identity) number for tracking your mo-
bile in case you lose it.
Don’ts:
•	 Never leave your mobile device unattended.
•	 Turn off applications [camera, audio/video players] and connections [Bluetooth, infrared, Wi-Fi]
when not in use. Keeping the connections on may pose security issues and also cause to drain out
the battery.
Do’s and Don’ts for Data Security:
Do’s:
Backup data regularly
Reset to factory settings:
Bluetooth:
Mitigation against Mobile Connectivity Security Attacks
Do’s:
w Use Bluetooth in hidden mode so that even if the device is using Bluetooth it is not visible to oth- 	
ers.
w Change the name of the device to a different name to avoid recognition ofyour Mobile phone model.
Note: The default name will be the mobile model number for Bluetooth devices.
w Put a password while pairing with other devices. The devices with the same password can connect 	
to your computer	 	
w Disable Bluetooth when it is not actively transmitting information.
w Use Bluetooth with temporary time limit after which it automatically disables so that the device is 	
not available continuously for others.
Back up
Don’ts:
w Never allow unknown devices to connect through Bluetooth.
w Never switch on Bluetooth continuously.
w Never put Bluetooth in always discoverable mode.
  Note: Attackers can take advantage of its default always-on, always discoverable settings to 	 	
launch attacks.
Bluetooth is a wireless technology that allows different devices to connect to one another and share
data, such as ringtones or photos. Wireless signals transmitted with Bluetooth cover short distanes, 	
typically 30 feet (10 meters).
Make sure to reset to factory settings when a phone is permanently given to another user to on 	
sure that personal data in the phone is wiped out.
w
Backup data regularly and set up your phone such that it backs up your data when you sync it. You 	
can also back up data on a separate memory card.This can be done by using theVendor’s document
backup procedure.
w
Do’s:
w Connect only to the trusted networks.
w Use Wi-Fi only when required. It is advisable to switch off the service when not in use.
w Beware while connecting to public networks, as they may not be secure.
Don’ts:
w Never connect to unknown networks or untrusted networks.
Mobile as USB:
The mobile phones can be used as USB memory devices when connected to a computer. A USB cable is 	
provided with the mobile phone to connect to computer. Your mobile’s phone memory and memory 	 	
stick can be accessed as USB devices.
w Your mobile’s phone memory and memory stick can be accessed as USB devices.
Do’s:
w When a mobile phone is connected to a personal computer, scan the external phone memory and 	
memory card using an updated anti virus.
w Take regular backup of your phone and external memory card because if an event like a system crash or 	
malware penetration occurs, at least your data is safe.
w Before transferring the data to Mobile from computer, the data should be scanned with latest Antivirus 	
with all updates.
Don’ts:
w Never keep sensitive information like user names/passwords on mobile phones.
w Never forward the virus affected data to other Mobiles.
Mitigation against Mobile Application and Operating System Attacks
Application and Mobile Operating System:
•	 Update the mobile operating system regularly.
•	 Upgrade the operating system to its latest version.
•	 Always install applications from trusted sources.
•	 Consider installing security software from a reputable provider and update them regularly.
•	 It’s always helpful to check the features before downloading an application. Some applications may use your
personal data.
•	 If you’re downloading an app from a third party, do a little research to make sure the app is reputable.
Locationtrackingservicesallowthewhereaboutsofregisteredcellphonestobeknownandmonitored.Whileitcanbedoneopenly	
for legitimatepurposes,itmayalsobeusedformaliciouspurposes.
Checkthesourceofallyourfilesandappstomakesurethey’resafebeforeyoudownload.
Wi-Fi :
Wi-Fi is short for“Wireless Fidelity.”Wi-Fi refers to wireless networking technology that allows computers 		
and other devices to communicate over a wireless signal.
Many mobile devices, video game systems, and other standalone devices also include Wi-Fi capability, 		
enabling them to connect to wireless networks. These devices may be able to connect to the Internet 		
using Wi-Fi.

More Related Content

What's hot

Smartphone Ownage: The state of mobile botnets and rootkits
Smartphone Ownage: The state of mobile botnets and rootkitsSmartphone Ownage: The state of mobile botnets and rootkits
Smartphone Ownage: The state of mobile botnets and rootkitsJimmy Shah
 
Mobile security by Tajwar khan
Mobile security by Tajwar khanMobile security by Tajwar khan
Mobile security by Tajwar khanTajwar khan
 
Mobile Security
Mobile SecurityMobile Security
Mobile SecurityKevin Lee
 
Smartphone security
Smartphone  securitySmartphone  security
Smartphone securityManish Gupta
 
Mobile protection
Mobile protection Mobile protection
Mobile protection preetpatel72
 
10940 img sytr12_mobile_malware
10940 img sytr12_mobile_malware10940 img sytr12_mobile_malware
10940 img sytr12_mobile_malwareSytelReplyUK
 
C0c0n 2011 mobile security presentation v1.2
C0c0n 2011 mobile  security presentation v1.2C0c0n 2011 mobile  security presentation v1.2
C0c0n 2011 mobile security presentation v1.2Santosh Satam
 
Mobile security
Mobile securityMobile security
Mobile securityMphasis
 
2010: Mobile Security - WHYMCA Developer Conference
2010: Mobile Security - WHYMCA Developer Conference2010: Mobile Security - WHYMCA Developer Conference
2010: Mobile Security - WHYMCA Developer ConferenceFabio Pietrosanti
 
Report of android hacking
Report of android hackingReport of android hacking
Report of android hackingdiv2345
 
Why you need antivirus protection on your smartphone
Why you need antivirus protection on your smartphoneWhy you need antivirus protection on your smartphone
Why you need antivirus protection on your smartphoneBrian Gongol
 
2010: Mobile Security - Intense overview
2010: Mobile Security - Intense overview2010: Mobile Security - Intense overview
2010: Mobile Security - Intense overviewFabio Pietrosanti
 

What's hot (20)

Him
HimHim
Him
 
Smartphone Ownage: The state of mobile botnets and rootkits
Smartphone Ownage: The state of mobile botnets and rootkitsSmartphone Ownage: The state of mobile botnets and rootkits
Smartphone Ownage: The state of mobile botnets and rootkits
 
Mobile security by Tajwar khan
Mobile security by Tajwar khanMobile security by Tajwar khan
Mobile security by Tajwar khan
 
Mobile Security
Mobile SecurityMobile Security
Mobile Security
 
Cp3201 mobile security final
Cp3201 mobile security finalCp3201 mobile security final
Cp3201 mobile security final
 
Smartphone security
Smartphone  securitySmartphone  security
Smartphone security
 
Mobile security - Intense overview
Mobile security - Intense overviewMobile security - Intense overview
Mobile security - Intense overview
 
Mobile protection
Mobile protection Mobile protection
Mobile protection
 
Spy android malware - eScan
Spy android malware - eScanSpy android malware - eScan
Spy android malware - eScan
 
10940 img sytr12_mobile_malware
10940 img sytr12_mobile_malware10940 img sytr12_mobile_malware
10940 img sytr12_mobile_malware
 
Mobile security
Mobile securityMobile security
Mobile security
 
C0c0n 2011 mobile security presentation v1.2
C0c0n 2011 mobile  security presentation v1.2C0c0n 2011 mobile  security presentation v1.2
C0c0n 2011 mobile security presentation v1.2
 
Mobile security
Mobile securityMobile security
Mobile security
 
Cyber security
Cyber securityCyber security
Cyber security
 
2010: Mobile Security - WHYMCA Developer Conference
2010: Mobile Security - WHYMCA Developer Conference2010: Mobile Security - WHYMCA Developer Conference
2010: Mobile Security - WHYMCA Developer Conference
 
Top 6-Security-Threats-on-iOS
Top 6-Security-Threats-on-iOSTop 6-Security-Threats-on-iOS
Top 6-Security-Threats-on-iOS
 
Report of android hacking
Report of android hackingReport of android hacking
Report of android hacking
 
Smartphone Smart Card 061013
Smartphone Smart Card 061013Smartphone Smart Card 061013
Smartphone Smart Card 061013
 
Why you need antivirus protection on your smartphone
Why you need antivirus protection on your smartphoneWhy you need antivirus protection on your smartphone
Why you need antivirus protection on your smartphone
 
2010: Mobile Security - Intense overview
2010: Mobile Security - Intense overview2010: Mobile Security - Intense overview
2010: Mobile Security - Intense overview
 

Similar to Mobile phone security

Smartphone 7 aug14
Smartphone 7 aug14Smartphone 7 aug14
Smartphone 7 aug14Naval OPSEC
 
10 Reasons to Choose Connect Safe Antivirus
10 Reasons to Choose Connect Safe Antivirus10 Reasons to Choose Connect Safe Antivirus
10 Reasons to Choose Connect Safe Antivirusconnectsafe
 
8 steps to smartphone security for android
8 steps to smartphone security for android8 steps to smartphone security for android
8 steps to smartphone security for androidiYogi
 
MUC -Summary - Lessons.docx
MUC -Summary - Lessons.docxMUC -Summary - Lessons.docx
MUC -Summary - Lessons.docxssuser4c58f5
 
How to Keep Your Phone Safe from Hackers (1).pptx
How to Keep Your Phone Safe from Hackers (1).pptxHow to Keep Your Phone Safe from Hackers (1).pptx
How to Keep Your Phone Safe from Hackers (1).pptx4Freedom Mobile
 
Mobile Device Security
Mobile Device SecurityMobile Device Security
Mobile Device SecurityNemwos
 
Mobisheild sales promotion presentation.
Mobisheild  sales promotion  presentation.Mobisheild  sales promotion  presentation.
Mobisheild sales promotion presentation.Arijit Ghosh
 
Attacks on Mobiles\Cell Phones
Attacks on Mobiles\Cell PhonesAttacks on Mobiles\Cell Phones
Attacks on Mobiles\Cell PhonesFaizan Shaikh
 
Advocacy, Technology, and Safety Online Course
Advocacy, Technology, and Safety Online CourseAdvocacy, Technology, and Safety Online Course
Advocacy, Technology, and Safety Online CourseAdam Varn
 
Securing Mobile & Online Identity in the Cyber World
Securing Mobile & Online Identity in the Cyber WorldSecuring Mobile & Online Identity in the Cyber World
Securing Mobile & Online Identity in the Cyber WorldEmil Tan
 
Mobile Security 101
Mobile Security 101Mobile Security 101
Mobile Security 101Lookout
 
Mobile Phone Seizure Guide by Raghu Khimani
Mobile Phone Seizure Guide by Raghu KhimaniMobile Phone Seizure Guide by Raghu Khimani
Mobile Phone Seizure Guide by Raghu KhimaniDr Raghu Khimani
 
Smartphone Security Guide: The Easiest Way to Keep Your Phone & Data Secure
Smartphone Security Guide: The Easiest Way to Keep Your Phone & Data SecureSmartphone Security Guide: The Easiest Way to Keep Your Phone & Data Secure
Smartphone Security Guide: The Easiest Way to Keep Your Phone & Data SecureHeimdal Security
 
Attacks on Mobile Devices by Nitish.pptx
Attacks on Mobile Devices by Nitish.pptxAttacks on Mobile Devices by Nitish.pptx
Attacks on Mobile Devices by Nitish.pptxNitishChoudhary23
 
Mobile Wallet Services Protection
Mobile Wallet Services ProtectionMobile Wallet Services Protection
Mobile Wallet Services Protection- Mark - Fullbright
 
ISACA CACS 2012 - Mobile Device Security and Privacy
ISACA CACS 2012 - Mobile Device Security and PrivacyISACA CACS 2012 - Mobile Device Security and Privacy
ISACA CACS 2012 - Mobile Device Security and PrivacyMichael Davis
 

Similar to Mobile phone security (20)

Smartphone 7 aug14
Smartphone 7 aug14Smartphone 7 aug14
Smartphone 7 aug14
 
10 Reasons to Choose Connect Safe Antivirus
10 Reasons to Choose Connect Safe Antivirus10 Reasons to Choose Connect Safe Antivirus
10 Reasons to Choose Connect Safe Antivirus
 
8 steps to smartphone security for android
8 steps to smartphone security for android8 steps to smartphone security for android
8 steps to smartphone security for android
 
Mobile security
Mobile security Mobile security
Mobile security
 
MUC -Summary - Lessons.docx
MUC -Summary - Lessons.docxMUC -Summary - Lessons.docx
MUC -Summary - Lessons.docx
 
Mobile security
Mobile securityMobile security
Mobile security
 
How to Keep Your Phone Safe from Hackers (1).pptx
How to Keep Your Phone Safe from Hackers (1).pptxHow to Keep Your Phone Safe from Hackers (1).pptx
How to Keep Your Phone Safe from Hackers (1).pptx
 
Mobile Device Security
Mobile Device SecurityMobile Device Security
Mobile Device Security
 
Mobisheild sales promotion presentation.
Mobisheild  sales promotion  presentation.Mobisheild  sales promotion  presentation.
Mobisheild sales promotion presentation.
 
Attacks on Mobiles\Cell Phones
Attacks on Mobiles\Cell PhonesAttacks on Mobiles\Cell Phones
Attacks on Mobiles\Cell Phones
 
Advocacy, Technology, and Safety Online Course
Advocacy, Technology, and Safety Online CourseAdvocacy, Technology, and Safety Online Course
Advocacy, Technology, and Safety Online Course
 
CTO Cybersecurity Forum 2013 David Turahi
CTO Cybersecurity Forum 2013 David TurahiCTO Cybersecurity Forum 2013 David Turahi
CTO Cybersecurity Forum 2013 David Turahi
 
Securing Mobile & Online Identity in the Cyber World
Securing Mobile & Online Identity in the Cyber WorldSecuring Mobile & Online Identity in the Cyber World
Securing Mobile & Online Identity in the Cyber World
 
Mobile Security 101
Mobile Security 101Mobile Security 101
Mobile Security 101
 
Mobile Phone Seizure Guide by Raghu Khimani
Mobile Phone Seizure Guide by Raghu KhimaniMobile Phone Seizure Guide by Raghu Khimani
Mobile Phone Seizure Guide by Raghu Khimani
 
Smartphone Security Guide: The Easiest Way to Keep Your Phone & Data Secure
Smartphone Security Guide: The Easiest Way to Keep Your Phone & Data SecureSmartphone Security Guide: The Easiest Way to Keep Your Phone & Data Secure
Smartphone Security Guide: The Easiest Way to Keep Your Phone & Data Secure
 
Attacks on Mobile Devices by Nitish.pptx
Attacks on Mobile Devices by Nitish.pptxAttacks on Mobile Devices by Nitish.pptx
Attacks on Mobile Devices by Nitish.pptx
 
Mobile Wallet Services Protection
Mobile Wallet Services ProtectionMobile Wallet Services Protection
Mobile Wallet Services Protection
 
3 steps security
3 steps security3 steps security
3 steps security
 
ISACA CACS 2012 - Mobile Device Security and Privacy
ISACA CACS 2012 - Mobile Device Security and PrivacyISACA CACS 2012 - Mobile Device Security and Privacy
ISACA CACS 2012 - Mobile Device Security and Privacy
 

Recently uploaded

(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...RajaP95
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineeringmalavadedarshan25
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZTE
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...Call Girls in Nagpur High Profile
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 

Recently uploaded (20)

(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineering
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 

Mobile phone security

  • 1. Mobile Phone Security Threats Categories • Mobile Device and Data Security Threats Threats related to unauthorised or intentional physical access to mobile phone and Lost or Stolen mobile phones. Threats related to mobile phone connectivity to unknown systems, phones and networks using techno- logies like Bluetooth, WiFi, USB etc. Threats arising from vulnerabilities in Mobile Applications and Operating Systems . • Mobile Connectivity Security Threats • Mobile Application and Operating System Security Threats Typical impact of attacks against Mobile Phones • Exposure or Loss of user's personal Information/Data, stored/transmitted through mobile phone. • Monetary Loss due to malicious software unknowingly utilizing premium and highly priced SMS and Call Services. • privacy attacks which includes the tracing of mobile phone location along with private SMSs and calls without user’s knowledge. • Loosing control over mobile phone and unknowingly becoming zombie for targeted attacks. Mitigation against Mobile Device and Data Security Attacks Record IMEI number: w Record the unique 15 digit IMEI number. In case Mobile phone is stolen/lost, this IMEI number is required for registering complaint at Police station and may help in tracking your mobile phone through service provider. Do’s and don’ts for Mobile Device Enable Device locking: w Use autolock to automatically lock the phone or keypad lock protected by passcode/ security patterns to restrict acess to your mobile phone. Use a PIN to lock SIM card: w Use a PIN (Personal Identification Number) for SIM (Subscriber Identity Module) card to prevent people from making use of it when stolen. After turning on SIM security, each time phone starts it will prompt to enter SIM PIN. w Use password to protect information on the memory card. Report lost or stolen devices w Report lost or stolen devices immediately to the nearest Police Station and concerned service provider. Use mobile tracking feature. w Use the feature of Mobile Tracking which could help if the mobile phone is lost/stolen. Every time a new SIM card is inserted in the mobile phone, it would automatically send messages to two preselected phone numbers of your choice, so that you can track your Mobile device. Do’s: Mobile Phone Security Note: This is usually printed on the phone below the battery, or can be accessed by keying *#06# on most of the phones. Steps to be followed before Mobile Phone usage : aFOR MORE INFORMATION REFER MANUFACTURER MANUAL Mobile phones are becoming ever more popular and are rapidly becoming attractive targets for mali- cious attacks. Mobile phones face the same security challenges as traditional desktop computers, but their mobility means they are also exposed to a set of risks quite different to those of a computer in a fixed loca- tion. Mobile phones can be infected with worms, tro- jan horses or other virus families, which can compro- mise your security and privacy or even gain complete control over the device. This guide provides the nec- essary steps, do’s, don’ts tips to secure your mobile devices. STEP 1 : Read the manufacturer’s manual carefully and follow the guidelines as specified to setup your mobile phone. STEP 2 : Record the IMEI (International Mobile Equipment Identity) number for tracking your mo- bile in case you lose it.
  • 2. Don’ts: • Never leave your mobile device unattended. • Turn off applications [camera, audio/video players] and connections [Bluetooth, infrared, Wi-Fi] when not in use. Keeping the connections on may pose security issues and also cause to drain out the battery. Do’s and Don’ts for Data Security: Do’s: Backup data regularly Reset to factory settings: Bluetooth: Mitigation against Mobile Connectivity Security Attacks Do’s: w Use Bluetooth in hidden mode so that even if the device is using Bluetooth it is not visible to oth- ers. w Change the name of the device to a different name to avoid recognition ofyour Mobile phone model. Note: The default name will be the mobile model number for Bluetooth devices. w Put a password while pairing with other devices. The devices with the same password can connect to your computer w Disable Bluetooth when it is not actively transmitting information. w Use Bluetooth with temporary time limit after which it automatically disables so that the device is not available continuously for others. Back up Don’ts: w Never allow unknown devices to connect through Bluetooth. w Never switch on Bluetooth continuously. w Never put Bluetooth in always discoverable mode. Note: Attackers can take advantage of its default always-on, always discoverable settings to launch attacks. Bluetooth is a wireless technology that allows different devices to connect to one another and share data, such as ringtones or photos. Wireless signals transmitted with Bluetooth cover short distanes, typically 30 feet (10 meters). Make sure to reset to factory settings when a phone is permanently given to another user to on sure that personal data in the phone is wiped out. w Backup data regularly and set up your phone such that it backs up your data when you sync it. You can also back up data on a separate memory card.This can be done by using theVendor’s document backup procedure. w Do’s: w Connect only to the trusted networks. w Use Wi-Fi only when required. It is advisable to switch off the service when not in use. w Beware while connecting to public networks, as they may not be secure. Don’ts: w Never connect to unknown networks or untrusted networks. Mobile as USB: The mobile phones can be used as USB memory devices when connected to a computer. A USB cable is provided with the mobile phone to connect to computer. Your mobile’s phone memory and memory stick can be accessed as USB devices. w Your mobile’s phone memory and memory stick can be accessed as USB devices. Do’s: w When a mobile phone is connected to a personal computer, scan the external phone memory and memory card using an updated anti virus. w Take regular backup of your phone and external memory card because if an event like a system crash or malware penetration occurs, at least your data is safe. w Before transferring the data to Mobile from computer, the data should be scanned with latest Antivirus with all updates. Don’ts: w Never keep sensitive information like user names/passwords on mobile phones. w Never forward the virus affected data to other Mobiles. Mitigation against Mobile Application and Operating System Attacks Application and Mobile Operating System: • Update the mobile operating system regularly. • Upgrade the operating system to its latest version. • Always install applications from trusted sources. • Consider installing security software from a reputable provider and update them regularly. • It’s always helpful to check the features before downloading an application. Some applications may use your personal data. • If you’re downloading an app from a third party, do a little research to make sure the app is reputable. Locationtrackingservicesallowthewhereaboutsofregisteredcellphonestobeknownandmonitored.Whileitcanbedoneopenly for legitimatepurposes,itmayalsobeusedformaliciouspurposes. Checkthesourceofallyourfilesandappstomakesurethey’resafebeforeyoudownload. Wi-Fi : Wi-Fi is short for“Wireless Fidelity.”Wi-Fi refers to wireless networking technology that allows computers and other devices to communicate over a wireless signal. Many mobile devices, video game systems, and other standalone devices also include Wi-Fi capability, enabling them to connect to wireless networks. These devices may be able to connect to the Internet using Wi-Fi.