Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

of

Wireless and mobile security Slide 1 Wireless and mobile security Slide 2 Wireless and mobile security Slide 3 Wireless and mobile security Slide 4 Wireless and mobile security Slide 5 Wireless and mobile security Slide 6 Wireless and mobile security Slide 7 Wireless and mobile security Slide 8 Wireless and mobile security Slide 9 Wireless and mobile security Slide 10 Wireless and mobile security Slide 11 Wireless and mobile security Slide 12 Wireless and mobile security Slide 13 Wireless and mobile security Slide 14 Wireless and mobile security Slide 15 Wireless and mobile security Slide 16 Wireless and mobile security Slide 17 Wireless and mobile security Slide 18 Wireless and mobile security Slide 19
Upcoming SlideShare
wireless power transfer
Next

5 Likes

Share

Wireless and mobile security

My Presentation at National Seminar on Recent Wireless and Mobile Trends
http://www.rmacs.co.in/ncrtnHome.html

Related Books

Free with a 30 day trial from Scribd

See all

Related Audiobooks

Free with a 30 day trial from Scribd

See all

Wireless and mobile security

  1. 1. Wireless and Mobile Security<br />Null-The open Security Community<br />Pushkar<br />
  2. 2. News…<br />Varanasi Bomb Blast Mail sent through hacked WiFiof a DJ in NaviMumbai.<br />Out of 2300 connections only 16% are secured in Pune City – Cyber Crime Cell, Pune.<br />Police making it compulsory to secure wifi.<br />Geimini Trojan attacks Android users on New Year.<br />
  3. 3. WIRELESS Technology<br />
  4. 4. Wireless Network Standards….<br />
  5. 5. Attacks…<br />Identity Theft – Hacking a wireless network and using it.<br /> Use it for fun.<br /> Use it for free.<br /> Use it for crime.<br />MITM – Sniff the users information.<br />Corporate espionage.<br />Sniff passwords<br />DoS– Interrupt work.<br />
  6. 6. Wireless Security Measures…<br />No Security  <br />WEP – Wireless Equivalent Protocol<br />Simple Low level Security<br />40 bit shared key used.<br />only ensured the data received is the same or not.<br />can be easily cracked now.<br />
  7. 7. Wireless Security measures contd…<br />WPA – Wi-Fi Protected Access.<br /> 128bit, <br /> TKIP – Dynamically offering keys for connection.<br /> Encrypted using Michael Algorithm.<br />WPA2 –<br />128bit,<br />AES encryption algorithm.<br />More reliable and most widely used.<br />
  8. 8. Mobiles – Smartphones…<br />The next generation technology.<br />Compact and efficient devices.<br />A practical and cost-effective alternative to laptops.<br />Need of the hour.<br />Work on Move.<br />
  9. 9. Who are the users …<br />You, me and all,<br />Corporate Directors, Managers, Executives,<br />Salesman, Suppliers, Contractors,<br />Government Officials<br />College Students,<br />
  10. 10. Affecting factors…<br />Mobile Communication Capabilities :<br />Cellular – MITM in voice transmission, with using less secured protocols or encrypting/decrypting techniques.<br />WiFi-MITM<br />Blutooth /Infrared - Personal Area Network<br />SMS—Scripts to send spam sms from the device, inject malware on the phones.<br />Corporate Firewall,<br />Inside the firewall,<br /> Access to all the data on network,<br />Outside the firewall<br /> Data is in the air,<br />
  11. 11. Threats…<br />Physical : <br />Device theft, loss of device<br /> Misuse by trusted people (colleagues, friends, family)<br />Malwares:<br /> Mobile Malwares-new and emerging threat<br /> Infection vectors are more.<br />Eg., Mabir/Cabir virus: can infect Symbian OS via Bluetooth or SMS.<br />Dampigtrojan: corrupts the system’s uninstallation settings.<br />
  12. 12. Threats contd…<br />Mobile App Downloads :<br />Free nature of apps,<br /> “Jail-breaking” – process which allows users to installed pirated or unchecked applications.<br />Application Isolation.<br />Secure Data Storage:<br /> Password protection, mobile number fixed for each device, auto mounting disable.<br />Strong Authentication with poor keyboards.<br />Secure Operating Systems<br />
  13. 13. Platforms…<br />Android Operating System :<br />OS by google, open source.<br />Used by many mobile device producing companies.<br />iOS :<br />Apple OS.<br />Used in iPhones, iPads<br />Windows Mobile OS /Windows Phone 7 : <br />Mobile OS from Microsoft.<br />Symbian OS /Symbian^3 :<br />Used in Nokia devices.<br />
  14. 14. Security Measures…<br />Platform-Centric Security : Protecting the device/network instead of data.<br />Data-Centric Security : Protecting Data instead of devices/networks. <br />Components in mobile security :<br /> Authentication and Authorization :<br /> Firewall Security :<br /> Over-the-air security :<br /> Offline security :<br />
  15. 15. Security Measures <br />Authentication and Authorization :<br /> Authorize the device use as well as the application use by proper authentication.<br />Firewall Security :<br />Include and register mobile devices with company firewalls. Only give access to registered users.<br />Over-the-air security :<br />Encrypt the data when sent onto public mobile networks.<br />Offline security :<br />Prevent mobile device to reach in the wrong hands.<br />
  16. 16. Security Measures …<br />Security over PAN :<br /> Security for Bluetooth /Infrared data transmission.<br />Security over mobile Malwares :<br />Install trusted anti-virus scanners in mobiles.<br />
  17. 17. Wifi Cracking Demo<br />
  18. 18. Conclusion …<br />Work while on move with CAUTION …<br />
  19. 19. Thank You <br />
  • MazinAhmous

    Mar. 10, 2020
  • RamiDhrooj1

    Dec. 8, 2019
  • sathishkumar2371

    Mar. 1, 2018
  • pradeepdeep73113

    Aug. 20, 2017
  • anilgul

    Feb. 5, 2011

My Presentation at National Seminar on Recent Wireless and Mobile Trends http://www.rmacs.co.in/ncrtnHome.html

Views

Total views

3,314

On Slideshare

0

From embeds

0

Number of embeds

1,293

Actions

Downloads

0

Shares

0

Comments

0

Likes

5

×