2. Introduction
Mobile devices, such as smart phones and tablets,
typically need to support multiple security objectives:
1)Confidentiality
2)Integrity
3)availability
3. Targets for attackers
Data
Identity
Availability
Attacks
Based on wi-fi
Based on network
Based on sms,mms
Based on vulnarabilities in software.
4. Sources to insecure phone
Worms: A worm is a program that reproduces on
multiple computers across a network.
Malware: A malware is a computer program that aims
to harm the system in which it resides.
Viruses: virus is malicious software designed to spread
to other computers by inserting itself into legitimate
programs and running programs in parallel.
7. security mechanisms
The threats prevented by the various measures are not
the same depending on the case. Considering the two
cases mentioned above:
1) one would protect the system from corruption by an
application.
2) The installation of a suspicious software would be
prevented.
8. Mechanism……
Rootkit Detectors.
Process isolation.
File permissions.
Memory Protection.
Development through runtime environments.
12. Solutions…..
Enable user authentication.
Verify the authenticity of downloaded
applications.
Install antimalware capability.
Install a firewall.
13. Continued….
Remotely disable lost or stolen devices.
Enable encryption for data stored on device or
memory card.
Enable whitelisting.
Provide mobile device security training.