Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Mobile security

5,874 views

Published on

presentation on Mobile security ,including all basic .

Published in: Technology
  • You can try to use this service ⇒ www.WritePaper.info ⇐ I have used it several times in college and was absolutely satisfied with the result.
       Reply 
    Are you sure you want to  Yes  No
    Your message goes here
  • Hi there! I just wanted to share a list of sites that helped me a lot during my studies: .................................................................................................................................... www.EssayWrite.best - Write an essay .................................................................................................................................... www.LitReview.xyz - Summary of books .................................................................................................................................... www.Coursework.best - Online coursework .................................................................................................................................... www.Dissertations.me - proquest dissertations .................................................................................................................................... www.ReMovie.club - Movies reviews .................................................................................................................................... www.WebSlides.vip - Best powerpoint presentations .................................................................................................................................... www.WritePaper.info - Write a research paper .................................................................................................................................... www.EddyHelp.com - Homework help online .................................................................................................................................... www.MyResumeHelp.net - Professional resume writing service .................................................................................................................................. www.HelpWriting.net - Help with writing any papers ......................................................................................................................................... Save so as not to lose
       Reply 
    Are you sure you want to  Yes  No
    Your message goes here
  • Dating direct: ♥♥♥ http://bit.ly/2Qu6Caa ♥♥♥
       Reply 
    Are you sure you want to  Yes  No
    Your message goes here
  • Follow the link, new dating source: ❤❤❤ http://bit.ly/2Qu6Caa ❤❤❤
       Reply 
    Are you sure you want to  Yes  No
    Your message goes here
  • DOWNLOAD FULL BOOKS, INTO AVAILABLE FORMAT ......................................................................................................................... ......................................................................................................................... 1.DOWNLOAD FULL. PDF EBOOK here { https://tinyurl.com/y8nn3gmc } ......................................................................................................................... 1.DOWNLOAD FULL. EPUB Ebook here { https://tinyurl.com/y8nn3gmc } ......................................................................................................................... 1.DOWNLOAD FULL. doc Ebook here { https://tinyurl.com/y8nn3gmc } ......................................................................................................................... 1.DOWNLOAD FULL. PDF EBOOK here { https://tinyurl.com/y8nn3gmc } ......................................................................................................................... 1.DOWNLOAD FULL. EPUB Ebook here { https://tinyurl.com/y8nn3gmc } ......................................................................................................................... 1.DOWNLOAD FULL. doc Ebook here { https://tinyurl.com/y8nn3gmc } ......................................................................................................................... ......................................................................................................................... ......................................................................................................................... .............. Browse by Genre Available eBooks ......................................................................................................................... Art, Biography, Business, Chick Lit, Children's, Christian, Classics, Comics, Contemporary, Cookbooks, Crime, Ebooks, Fantasy, Fiction, Graphic Novels, Historical Fiction, History, Horror, Humor And Comedy, Manga, Memoir, Music, Mystery, Non Fiction, Paranormal, Philosophy, Poetry, Psychology, Religion, Romance, Science, Science Fiction, Self Help, Suspense, Spirituality, Sports, Thriller, Travel, Young Adult,
       Reply 
    Are you sure you want to  Yes  No
    Your message goes here

Mobile security

  1. 1. MOBILE SECURITY By DILIP DUBEY ( 13STUHHCS0057 )
  2. 2. CONTENTS  INTRODUCTION  SECURITY ISSUE WITH MOBILE PHONE  TYPES OF MOBILE SECURITY  MOBILE THREATS  TIPS TO STAY SAFE  CONCLUSION
  3. 3. INTRODUCTION  Used to call and send text messages.  Have Internet access, built-in video cameras and the ability to install additional software  Contain a lot of private data and, unfortunately, a phone can be lost easily.
  4. 4. SECURITY ISSUE WITH MOBILE PHONE  Physical Security A phone can be Confiscated or stolen. We should always enable some kind of password protection on our phone.  Voice Although the voice on a mobile phone channel is encrypted, this encryption was hacked some time ago and is not considered safe anymore. Normal voice communications are very insecure as they are not encrypted.
  5. 5.  SMS Text messages are sent in plain text over the network, so they are also not considered Secure.  IMEI No. Beware that your phone also has a unique identifier, (known as the IMEI number i.e (International Mobile Equipment Identity)) so switching SIM cards will not guarantee to protect your privacy.
  6. 6. TYPES OF MOBILE SECURITY Mobile device security. Mobile application security.
  7. 7. Mobile Device Security  Screen locks. All mobile devices (e.g., phones, tablets, and laptops) should have the screen lock set.
  8. 8.  Lockout settings. After a specific no. of unsuccessful unlock attempts, the device will get locked which can only be opened through user’s ID.  GPS. Many mobile devices have GPS capabilities, allowing the device to be located if it is lost or stolen.  Remote wiping. Some mobile devices allow for the device to be wiped (all data and applications are removed) remotely. This can be used if a device is unrecoverable.
  9. 9. Application controls.  Many mobile applications attempt to access unnecessary user information (e.g., the location of the device). Controls should be used to limit the data that applications can access and to restrict the actions that applications may undertake.
  10. 10. Mobile Application Security  Encryption. Ensure that mobile applications are encrypting sensitive data that is stored on the device. Encryption keys must also be created and stored securely.  Authentication. A best practice is for the mobile application to authenticate the user and to base access to data on the user’s authentication level.
  11. 11.  Geotagging. Geotagging is most commonly used for photographs and can help people get a lot of specific information about where the picture was taken or the exact location of friend who logged on to service. Application whitelisting.  It is a device administration practice used to prevent unauthorized application from running. The purpose is primarily to protect device and networks from harmful application.
  12. 12. An application will trust an unknown security environment if it is trusted by a security environment that the application trusts.
  13. 13. Mobile Threats  Application Based Threats  Web Based Threats.  Network Threats.
  14. 14.  Application Based Threats. Downloadable applications present many security issues on mobile devices, including both software specifically designed to be malicious as well as software that can be exploited for malicious purposes. It contains (Malware, Spyware, Privacy Threats, Vulnerable application)  Web –Based Threats. Because mobile devices are often constantly connected to the Internet and used to access web-based services, web-based threats that have historically been a problem for PCs also pose issues for mobile devices It contains (Phishing Scams, Drive-By Download, Browser Exploits).
  15. 15.  Network Threats Mobile devices typically support cellular networks as well as local wireless networks. It contains (Network Exploits, Wi-Fi Sniffing).
  16. 16. TIPS TO STAY SAFE  Only download apps from trusted sources.
  17. 17. Set a password .
  18. 18. Download a mobile security tool.
  19. 19.  Be alert for unusual behaviors on your phone(unusual text messages, strange charges to the phone bill , decreased battery life)
  20. 20. CONCLUSION Our mobile devices contains important and delicate data which needs to be kept safe and secure . With the simple tips given in presentation , we can keep our data safe and secure

×