SlideShare a Scribd company logo
1 of 11
MOBILE DEVICE SECURITY
MUHAMMAD SALMAN ZAHID
AGENDA
Overview
Execution
Model
• iOS
• Android
Risks
GPS
Attacks
Securing your
Device
1/7/2015
2
MSZ
OVERVIEW
Mainly focused on
• iOS
• Android
Same concepts also apply on other OSes
• Windows
• Blackberry
Smart Phones are simple computers
• Mobile devices don’t come with the tools required to analyze
what’s happening
• Root level access required
1/7/2015
3
MSZ
EXECUTION MODEL
Android & iOS
• Sandbox concept
• Each process runs it a partitioned environment
• No direct access to OS resources
• Not allowed to interact directly with other Applications or their data
iOS
• Strict API
• SDK enforces restrictions
• Applications must be signed and can only be deployed from a single
trusted source
Android
• Dalvik VM
• Multiple/Unknown sources
1/7/2015
4
MSZ
RISKS
• Virus
• Malware
• Buffer Overflow
• Password theft
• Key logging
Smart phones
are computers
• FB
• E-mails
• Other applications
Multiple -
Login
Applications
1/7/2015
5
MSZ
GPS
Global Positioning System
• Every smart phone has GPS
• Must aware the use of GPS
• GPS information passed on via
third parties without your
knowledge.
• For example: Face book, Maps
etc.
1/7/2015
6
MSZ
ATTACKS
• Most common among devices
• Avoid unnecessary pairing
Bluetooth
• Don’t use untrsuted Wi-Fi
Wireless
Access
Points
1/7/2015
7
MSZ
SECURING YOUR DEVICE
• Graphic pattern is commonly usedUse password
• Automatic on in iOS
• Android: we can turn it on
• Hardware must be supported else slow response
Use Encryption
• Clouds are helpful
Use backup &
Sync.
• Supported in iOS
• Need an Application in Android
Lock device on
multiple failed
attempts
1/7/2015
8
MSZ
SECURING YOUR DEVICE CONT...
• Security cameras
Be aware of
Surrounding
• Applications Installation
• iOS & Google have certificates & Codes
Level of Trust
• Regular update itAntivirus
Ignore/Delete
unknown prompted
messages/links
• Any abnormality can effect the Battery
Monitor Battery Life
1/7/2015
9
MSZ
SECURING YOUR DEVICE CONT...
1/7/2015
10
MSZ
1/7/2015MSZ
11

More Related Content

What's hot

CNIT 128 Ch 3: iOS
CNIT 128 Ch 3: iOSCNIT 128 Ch 3: iOS
CNIT 128 Ch 3: iOSSam Bowne
 
Talk on Future of Enterprise Mobile App Development
Talk on Future of Enterprise Mobile App DevelopmentTalk on Future of Enterprise Mobile App Development
Talk on Future of Enterprise Mobile App DevelopmentRomin Irani
 
TechEd NZ 2014: Enterprise Management with Microsoft System Center Configurat...
TechEd NZ 2014: Enterprise Management with Microsoft System Center Configurat...TechEd NZ 2014: Enterprise Management with Microsoft System Center Configurat...
TechEd NZ 2014: Enterprise Management with Microsoft System Center Configurat...Intergen
 
Mobile device security
Mobile device securityMobile device security
Mobile device securityLisa Herrera
 
Malware on Smartphones and Tablets - The Inconvenient Truth
Malware on Smartphones and  Tablets  - The Inconvenient  TruthMalware on Smartphones and  Tablets  - The Inconvenient  Truth
Malware on Smartphones and Tablets - The Inconvenient TruthAGILLY
 
Comparison of mobile os
Comparison of mobile osComparison of mobile os
Comparison of mobile osasrf786
 
Digital Lifestyle Trends and Threats
Digital Lifestyle Trends and ThreatsDigital Lifestyle Trends and Threats
Digital Lifestyle Trends and ThreatsAndrew Wong
 
ISACA CACS 2012 - Mobile Device Security and Privacy
ISACA CACS 2012 - Mobile Device Security and PrivacyISACA CACS 2012 - Mobile Device Security and Privacy
ISACA CACS 2012 - Mobile Device Security and PrivacyMichael Davis
 
Mobile operating system by Shabeeb
Mobile operating system by ShabeebMobile operating system by Shabeeb
Mobile operating system by ShabeebShabeeb Shabi
 
Operating Systems
Operating SystemsOperating Systems
Operating Systemsvasomozu56
 
Mobile Device Management & Data Protection
Mobile Device Management & Data ProtectionMobile Device Management & Data Protection
Mobile Device Management & Data ProtectionGeekTek IT Services
 

What's hot (11)

CNIT 128 Ch 3: iOS
CNIT 128 Ch 3: iOSCNIT 128 Ch 3: iOS
CNIT 128 Ch 3: iOS
 
Talk on Future of Enterprise Mobile App Development
Talk on Future of Enterprise Mobile App DevelopmentTalk on Future of Enterprise Mobile App Development
Talk on Future of Enterprise Mobile App Development
 
TechEd NZ 2014: Enterprise Management with Microsoft System Center Configurat...
TechEd NZ 2014: Enterprise Management with Microsoft System Center Configurat...TechEd NZ 2014: Enterprise Management with Microsoft System Center Configurat...
TechEd NZ 2014: Enterprise Management with Microsoft System Center Configurat...
 
Mobile device security
Mobile device securityMobile device security
Mobile device security
 
Malware on Smartphones and Tablets - The Inconvenient Truth
Malware on Smartphones and  Tablets  - The Inconvenient  TruthMalware on Smartphones and  Tablets  - The Inconvenient  Truth
Malware on Smartphones and Tablets - The Inconvenient Truth
 
Comparison of mobile os
Comparison of mobile osComparison of mobile os
Comparison of mobile os
 
Digital Lifestyle Trends and Threats
Digital Lifestyle Trends and ThreatsDigital Lifestyle Trends and Threats
Digital Lifestyle Trends and Threats
 
ISACA CACS 2012 - Mobile Device Security and Privacy
ISACA CACS 2012 - Mobile Device Security and PrivacyISACA CACS 2012 - Mobile Device Security and Privacy
ISACA CACS 2012 - Mobile Device Security and Privacy
 
Mobile operating system by Shabeeb
Mobile operating system by ShabeebMobile operating system by Shabeeb
Mobile operating system by Shabeeb
 
Operating Systems
Operating SystemsOperating Systems
Operating Systems
 
Mobile Device Management & Data Protection
Mobile Device Management & Data ProtectionMobile Device Management & Data Protection
Mobile Device Management & Data Protection
 

Viewers also liked

Mobile Privacy And Security
Mobile Privacy And SecurityMobile Privacy And Security
Mobile Privacy And SecurityJames Wernicke
 
Ibm Mobile Device Security Datasheet V2.0
Ibm Mobile Device Security   Datasheet   V2.0Ibm Mobile Device Security   Datasheet   V2.0
Ibm Mobile Device Security Datasheet V2.0wendyking63
 
Android Security Overview and Safe Practices for Web-Based Android Applications
Android Security Overview and Safe Practices for Web-Based Android ApplicationsAndroid Security Overview and Safe Practices for Web-Based Android Applications
Android Security Overview and Safe Practices for Web-Based Android Applicationsh4oxer
 
Android Security - Common Security Pitfalls in Android Applications
Android Security - Common Security Pitfalls in Android ApplicationsAndroid Security - Common Security Pitfalls in Android Applications
Android Security - Common Security Pitfalls in Android ApplicationsBlrDroid
 
Android security model
Android security modelAndroid security model
Android security modelrrand1
 
Android vs. iPhone for Mobile Security
Android vs. iPhone for Mobile SecurityAndroid vs. iPhone for Mobile Security
Android vs. iPhone for Mobile SecurityCloudCheckr
 
How iOS and Android Handle Security Webinar
How iOS and Android Handle Security WebinarHow iOS and Android Handle Security Webinar
How iOS and Android Handle Security WebinarDenim Group
 
Understanding Android Security
Understanding Android SecurityUnderstanding Android Security
Understanding Android SecurityAsanka Dilruk
 
Android security
Android securityAndroid security
Android securityMobile Rtpl
 
Symantec Mobile Security Whitepaper June 2011
Symantec Mobile Security Whitepaper June 2011Symantec Mobile Security Whitepaper June 2011
Symantec Mobile Security Whitepaper June 2011Symantec
 
Mobile Security
Mobile SecurityMobile Security
Mobile SecurityKevin Lee
 
Deep Dive Into Android Security
Deep Dive Into Android SecurityDeep Dive Into Android Security
Deep Dive Into Android SecurityMarakana Inc.
 
Automated Security Analysis of Android & iOS Applications with Mobile Securit...
Automated Security Analysis of Android & iOS Applications with Mobile Securit...Automated Security Analysis of Android & iOS Applications with Mobile Securit...
Automated Security Analysis of Android & iOS Applications with Mobile Securit...Ajin Abraham
 
Testing Android Security - Jose Manuel Ortega Candel - Codemotion Amsterdam 2016
Testing Android Security - Jose Manuel Ortega Candel - Codemotion Amsterdam 2016Testing Android Security - Jose Manuel Ortega Candel - Codemotion Amsterdam 2016
Testing Android Security - Jose Manuel Ortega Candel - Codemotion Amsterdam 2016Codemotion
 
Android vs ios System Architecture in OS perspective
Android vs ios System Architecture in OS perspectiveAndroid vs ios System Architecture in OS perspective
Android vs ios System Architecture in OS perspectiveRaj Pratim Bhattacharya
 

Viewers also liked (20)

Mobile security
Mobile securityMobile security
Mobile security
 
Mobile Privacy And Security
Mobile Privacy And SecurityMobile Privacy And Security
Mobile Privacy And Security
 
Ibm Mobile Device Security Datasheet V2.0
Ibm Mobile Device Security   Datasheet   V2.0Ibm Mobile Device Security   Datasheet   V2.0
Ibm Mobile Device Security Datasheet V2.0
 
Android Security Overview and Safe Practices for Web-Based Android Applications
Android Security Overview and Safe Practices for Web-Based Android ApplicationsAndroid Security Overview and Safe Practices for Web-Based Android Applications
Android Security Overview and Safe Practices for Web-Based Android Applications
 
Android Security
Android SecurityAndroid Security
Android Security
 
Android Security - Common Security Pitfalls in Android Applications
Android Security - Common Security Pitfalls in Android ApplicationsAndroid Security - Common Security Pitfalls in Android Applications
Android Security - Common Security Pitfalls in Android Applications
 
Android security model
Android security modelAndroid security model
Android security model
 
Android vs. iPhone for Mobile Security
Android vs. iPhone for Mobile SecurityAndroid vs. iPhone for Mobile Security
Android vs. iPhone for Mobile Security
 
Android system security
Android system securityAndroid system security
Android system security
 
How iOS and Android Handle Security Webinar
How iOS and Android Handle Security WebinarHow iOS and Android Handle Security Webinar
How iOS and Android Handle Security Webinar
 
Understanding Android Security
Understanding Android SecurityUnderstanding Android Security
Understanding Android Security
 
Android security
Android securityAndroid security
Android security
 
Symantec Mobile Security Whitepaper June 2011
Symantec Mobile Security Whitepaper June 2011Symantec Mobile Security Whitepaper June 2011
Symantec Mobile Security Whitepaper June 2011
 
Mobile Security
Mobile SecurityMobile Security
Mobile Security
 
Deep Dive Into Android Security
Deep Dive Into Android SecurityDeep Dive Into Android Security
Deep Dive Into Android Security
 
Automated Security Analysis of Android & iOS Applications with Mobile Securit...
Automated Security Analysis of Android & iOS Applications with Mobile Securit...Automated Security Analysis of Android & iOS Applications with Mobile Securit...
Automated Security Analysis of Android & iOS Applications with Mobile Securit...
 
Brief Tour about Android Security
Brief Tour about Android SecurityBrief Tour about Android Security
Brief Tour about Android Security
 
Mobile Security
Mobile SecurityMobile Security
Mobile Security
 
Testing Android Security - Jose Manuel Ortega Candel - Codemotion Amsterdam 2016
Testing Android Security - Jose Manuel Ortega Candel - Codemotion Amsterdam 2016Testing Android Security - Jose Manuel Ortega Candel - Codemotion Amsterdam 2016
Testing Android Security - Jose Manuel Ortega Candel - Codemotion Amsterdam 2016
 
Android vs ios System Architecture in OS perspective
Android vs ios System Architecture in OS perspectiveAndroid vs ios System Architecture in OS perspective
Android vs ios System Architecture in OS perspective
 

Similar to Mobile device security informative v2

android Security
android Security android Security
android Security darkC0de
 
Introduction to Mobile Application Development on Android
Introduction to Mobile Application Development on AndroidIntroduction to Mobile Application Development on Android
Introduction to Mobile Application Development on AndroidJulian Shen
 
Pentesting Mobile Applications (Prashant Verma)
Pentesting Mobile Applications (Prashant Verma)Pentesting Mobile Applications (Prashant Verma)
Pentesting Mobile Applications (Prashant Verma)ClubHack
 
Building a Mobile Security Program
Building a Mobile Security ProgramBuilding a Mobile Security Program
Building a Mobile Security ProgramDenim Group
 
Consumer Experiences for Enterprise
Consumer Experiences for EnterpriseConsumer Experiences for Enterprise
Consumer Experiences for EnterpriseWaterstons Ltd
 
Android vs Others Operating System
Android vs Others Operating SystemAndroid vs Others Operating System
Android vs Others Operating SystemShemul Hossain
 
Mobile Security for Smartphones and Tablets
Mobile Security for Smartphones and TabletsMobile Security for Smartphones and Tablets
Mobile Security for Smartphones and TabletsVince Verbeke
 
Android Security and Peneteration Testing
Android Security and Peneteration TestingAndroid Security and Peneteration Testing
Android Security and Peneteration TestingSurabaya Blackhat
 
Design%20Considerations%20for%20Mobile%20Security[1]
Design%20Considerations%20for%20Mobile%20Security[1]Design%20Considerations%20for%20Mobile%20Security[1]
Design%20Considerations%20for%20Mobile%20Security[1]Vikash Lalsing (CITP)
 
Mobile os and their types by shakir
Mobile os and their types by shakirMobile os and their types by shakir
Mobile os and their types by shakirShakir Memon
 
Transparent Smartphone Spying
Transparent Smartphone SpyingTransparent Smartphone Spying
Transparent Smartphone SpyingGeorgia Weidman
 
Android Hacking + Pentesting
Android Hacking + Pentesting Android Hacking + Pentesting
Android Hacking + Pentesting Sina Manavi
 
Introduction to Android - Seminar
Introduction to Android - SeminarIntroduction to Android - Seminar
Introduction to Android - SeminarAkshay Sharma
 
Introduction to Android - Seminar
Introduction to Android - SeminarIntroduction to Android - Seminar
Introduction to Android - SeminarAkshay Sharma
 
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...WSO2
 
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...WSO2
 

Similar to Mobile device security informative v2 (20)

android Security
android Security android Security
android Security
 
Introduction to Mobile Application Development on Android
Introduction to Mobile Application Development on AndroidIntroduction to Mobile Application Development on Android
Introduction to Mobile Application Development on Android
 
OWASP Mobile TOP 10 2014
OWASP Mobile TOP 10 2014OWASP Mobile TOP 10 2014
OWASP Mobile TOP 10 2014
 
Pentesting Mobile Applications (Prashant Verma)
Pentesting Mobile Applications (Prashant Verma)Pentesting Mobile Applications (Prashant Verma)
Pentesting Mobile Applications (Prashant Verma)
 
Building a Mobile Security Program
Building a Mobile Security ProgramBuilding a Mobile Security Program
Building a Mobile Security Program
 
Consumer Experiences for Enterprise
Consumer Experiences for EnterpriseConsumer Experiences for Enterprise
Consumer Experiences for Enterprise
 
Android vs Others Operating System
Android vs Others Operating SystemAndroid vs Others Operating System
Android vs Others Operating System
 
Mobile Security for Smartphones and Tablets
Mobile Security for Smartphones and TabletsMobile Security for Smartphones and Tablets
Mobile Security for Smartphones and Tablets
 
Android Security and Peneteration Testing
Android Security and Peneteration TestingAndroid Security and Peneteration Testing
Android Security and Peneteration Testing
 
Design%20Considerations%20for%20Mobile%20Security[1]
Design%20Considerations%20for%20Mobile%20Security[1]Design%20Considerations%20for%20Mobile%20Security[1]
Design%20Considerations%20for%20Mobile%20Security[1]
 
Android security
Android securityAndroid security
Android security
 
Android security
Android securityAndroid security
Android security
 
Android overview
Android overviewAndroid overview
Android overview
 
Mobile os and their types by shakir
Mobile os and their types by shakirMobile os and their types by shakir
Mobile os and their types by shakir
 
Transparent Smartphone Spying
Transparent Smartphone SpyingTransparent Smartphone Spying
Transparent Smartphone Spying
 
Android Hacking + Pentesting
Android Hacking + Pentesting Android Hacking + Pentesting
Android Hacking + Pentesting
 
Introduction to Android - Seminar
Introduction to Android - SeminarIntroduction to Android - Seminar
Introduction to Android - Seminar
 
Introduction to Android - Seminar
Introduction to Android - SeminarIntroduction to Android - Seminar
Introduction to Android - Seminar
 
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
 
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
 

Mobile device security informative v2

  • 3. OVERVIEW Mainly focused on • iOS • Android Same concepts also apply on other OSes • Windows • Blackberry Smart Phones are simple computers • Mobile devices don’t come with the tools required to analyze what’s happening • Root level access required 1/7/2015 3 MSZ
  • 4. EXECUTION MODEL Android & iOS • Sandbox concept • Each process runs it a partitioned environment • No direct access to OS resources • Not allowed to interact directly with other Applications or their data iOS • Strict API • SDK enforces restrictions • Applications must be signed and can only be deployed from a single trusted source Android • Dalvik VM • Multiple/Unknown sources 1/7/2015 4 MSZ
  • 5. RISKS • Virus • Malware • Buffer Overflow • Password theft • Key logging Smart phones are computers • FB • E-mails • Other applications Multiple - Login Applications 1/7/2015 5 MSZ
  • 6. GPS Global Positioning System • Every smart phone has GPS • Must aware the use of GPS • GPS information passed on via third parties without your knowledge. • For example: Face book, Maps etc. 1/7/2015 6 MSZ
  • 7. ATTACKS • Most common among devices • Avoid unnecessary pairing Bluetooth • Don’t use untrsuted Wi-Fi Wireless Access Points 1/7/2015 7 MSZ
  • 8. SECURING YOUR DEVICE • Graphic pattern is commonly usedUse password • Automatic on in iOS • Android: we can turn it on • Hardware must be supported else slow response Use Encryption • Clouds are helpful Use backup & Sync. • Supported in iOS • Need an Application in Android Lock device on multiple failed attempts 1/7/2015 8 MSZ
  • 9. SECURING YOUR DEVICE CONT... • Security cameras Be aware of Surrounding • Applications Installation • iOS & Google have certificates & Codes Level of Trust • Regular update itAntivirus Ignore/Delete unknown prompted messages/links • Any abnormality can effect the Battery Monitor Battery Life 1/7/2015 9 MSZ
  • 10. SECURING YOUR DEVICE CONT... 1/7/2015 10 MSZ