Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Wireless and mobile security

2,416 views

Published on

My Presentation at National Seminar on Recent Wireless and Mobile Trends
http://www.rmacs.co.in/ncrtnHome.html

Published in: Education
  • Be the first to comment

Wireless and mobile security

  1. 1. Wireless and Mobile Security<br />Null-The open Security Community<br />Pushkar<br />
  2. 2. News…<br />Varanasi Bomb Blast Mail sent through hacked WiFiof a DJ in NaviMumbai.<br />Out of 2300 connections only 16% are secured in Pune City – Cyber Crime Cell, Pune.<br />Police making it compulsory to secure wifi.<br />Geimini Trojan attacks Android users on New Year.<br />
  3. 3. WIRELESS Technology<br />
  4. 4. Wireless Network Standards….<br />
  5. 5. Attacks…<br />Identity Theft – Hacking a wireless network and using it.<br /> Use it for fun.<br /> Use it for free.<br /> Use it for crime.<br />MITM – Sniff the users information.<br />Corporate espionage.<br />Sniff passwords<br />DoS– Interrupt work.<br />
  6. 6. Wireless Security Measures…<br />No Security  <br />WEP – Wireless Equivalent Protocol<br />Simple Low level Security<br />40 bit shared key used.<br />only ensured the data received is the same or not.<br />can be easily cracked now.<br />
  7. 7. Wireless Security measures contd…<br />WPA – Wi-Fi Protected Access.<br /> 128bit, <br /> TKIP – Dynamically offering keys for connection.<br /> Encrypted using Michael Algorithm.<br />WPA2 –<br />128bit,<br />AES encryption algorithm.<br />More reliable and most widely used.<br />
  8. 8. Mobiles – Smartphones…<br />The next generation technology.<br />Compact and efficient devices.<br />A practical and cost-effective alternative to laptops.<br />Need of the hour.<br />Work on Move.<br />
  9. 9. Who are the users …<br />You, me and all,<br />Corporate Directors, Managers, Executives,<br />Salesman, Suppliers, Contractors,<br />Government Officials<br />College Students,<br />
  10. 10. Affecting factors…<br />Mobile Communication Capabilities :<br />Cellular – MITM in voice transmission, with using less secured protocols or encrypting/decrypting techniques.<br />WiFi-MITM<br />Blutooth /Infrared - Personal Area Network<br />SMS—Scripts to send spam sms from the device, inject malware on the phones.<br />Corporate Firewall,<br />Inside the firewall,<br /> Access to all the data on network,<br />Outside the firewall<br /> Data is in the air,<br />
  11. 11. Threats…<br />Physical : <br />Device theft, loss of device<br /> Misuse by trusted people (colleagues, friends, family)<br />Malwares:<br /> Mobile Malwares-new and emerging threat<br /> Infection vectors are more.<br />Eg., Mabir/Cabir virus: can infect Symbian OS via Bluetooth or SMS.<br />Dampigtrojan: corrupts the system’s uninstallation settings.<br />
  12. 12. Threats contd…<br />Mobile App Downloads :<br />Free nature of apps,<br /> “Jail-breaking” – process which allows users to installed pirated or unchecked applications.<br />Application Isolation.<br />Secure Data Storage:<br /> Password protection, mobile number fixed for each device, auto mounting disable.<br />Strong Authentication with poor keyboards.<br />Secure Operating Systems<br />
  13. 13. Platforms…<br />Android Operating System :<br />OS by google, open source.<br />Used by many mobile device producing companies.<br />iOS :<br />Apple OS.<br />Used in iPhones, iPads<br />Windows Mobile OS /Windows Phone 7 : <br />Mobile OS from Microsoft.<br />Symbian OS /Symbian^3 :<br />Used in Nokia devices.<br />
  14. 14. Security Measures…<br />Platform-Centric Security : Protecting the device/network instead of data.<br />Data-Centric Security : Protecting Data instead of devices/networks. <br />Components in mobile security :<br /> Authentication and Authorization :<br /> Firewall Security :<br /> Over-the-air security :<br /> Offline security :<br />
  15. 15. Security Measures <br />Authentication and Authorization :<br /> Authorize the device use as well as the application use by proper authentication.<br />Firewall Security :<br />Include and register mobile devices with company firewalls. Only give access to registered users.<br />Over-the-air security :<br />Encrypt the data when sent onto public mobile networks.<br />Offline security :<br />Prevent mobile device to reach in the wrong hands.<br />
  16. 16. Security Measures …<br />Security over PAN :<br /> Security for Bluetooth /Infrared data transmission.<br />Security over mobile Malwares :<br />Install trusted anti-virus scanners in mobiles.<br />
  17. 17. Wifi Cracking Demo<br />
  18. 18. Conclusion …<br />Work while on move with CAUTION …<br />
  19. 19. Thank You <br />

×