SlideShare a Scribd company logo
1 of 21
Dr. David Turahi
Director for IT&IMS - MOICT
Uganda
Benefits Mobility
Size
A smart phone is a mobile phone
offering advanced capabilities
beyond a typical mobile phone,
often with computer like
functionality. There is no
industry standard definition of a
smart phone.
Inherent risk
to exposure of
personal
information
carried on and
transmitted
through the
device
Phones are easily lost
Devices are associated with and
linked to a particular user for billing
and account purposes.
Increased mobility means increased
exposure.
Applications used on smartphones
are unsafe.
Password Protection
• Lack of leads to great exposure
Jail breaking/Rooting
• Exposes phone to remote installation of
software (Might be malware)
Accounts linked to credit cards
• Can easily leak your financial information when
compromised
Applications
• Can access and reveal a lot of personal information
• Security leak if not updated
Email Accounts
• Amalgamation of communications
How much does your phone know about you?
•Almost everything
Mobile malware
•App based
•Web based
•SMS/Text message-based
Securing your smartphone
•Passcode
•Antivirus software
•Software updates
App permissions/access
•Pay attention to permissions app requests
for
Location services: GPs and WiFi
•Disclose location information
•Disclose of transmitted information (public
WiFi)
Definitions Spyware
Botnets
Trojan
Virus
Worms
Geolocation
Spyware –
software that self-installs on a computer,
enabling information to be covertly obtained
about a person’s internet use, passwords, etc.
Botnets –
A network of private computers infected with
malicious software and controlled as a group
without the owner’s knowledge, e.g. to send
spam
Trojan –
A Trojan horse, or Trojan is a malware that
appears to perform a desirable function for
the user prior to run or install but instead
facilitates unauthorized access to a user’s
computer system
Virus –
A Virus is a software program capable of
reproducing itself and usually of causing
great damage to files or other programs on
the same computer
Worm –
A computer worm is a self-replicating
malware computer program in order to
spread to other computers. It uses a
computer network to spread itself relying on
security failures on the target computer.
Unlike a virus it does not need to attach itself
to an existing program
Geolocation –
Geolocation is the identification of the real-
world geographic location of an object, such
as a cell phone or an internet-connected
computer terminal. For example, a picture
taken with a smart phone may record the
location within the file. When the file is
posted on a social network site, any viewer
may be able to determine the location from
the data saved on the picture file
•Malware
•Metadata
•Application scams
•Insecure applications
Risks
associated
with mobile
applications
•Decreased performance
•Random action
•Unknown phone calls or emails
•
•
Signs that
your phone is
compromised
Steps to take incase you are victim of
compromise
• If antivirus is installed, scan and remove
malware
• If unable to remove malware, use wiping
program
Password protect your phone
Install security software
Be aware of what you are doing with your
phone
Do not “jail-break” or “root” your phone
Application access
Review permission given to applications
when installing them
Install “phone-finder” app
Enroll in a backup/wiping program
Limit your activities while using public WiFi
Crosscheck URLs while making purchases
using your phone
Turn off Geolocation and GPS
If your phone is stolen
• If enrolled in backup/wiping program
• Contact administrator and wipe immediately
• Contact service provider to cancel your service
• if not enrolled in a backup/wiping program
• Treat loss as you would treat loss of wallet or
purse
y
In case of disposal
•Wipe phone clean
CTO Cybersecurity Forum 2013 David Turahi

More Related Content

What's hot

Mobile security
Mobile securityMobile security
Mobile security
home
 
Mobile Security
Mobile SecurityMobile Security
Mobile Security
Kevin Lee
 

What's hot (20)

Chapter 4
Chapter 4Chapter 4
Chapter 4
 
Mobile security
Mobile securityMobile security
Mobile security
 
Mobile Security 101
Mobile Security 101Mobile Security 101
Mobile Security 101
 
Cell Phone Viruses & Security
Cell Phone Viruses & SecurityCell Phone Viruses & Security
Cell Phone Viruses & Security
 
Mobile phone security
Mobile phone securityMobile phone security
Mobile phone security
 
Steps For Protecting Your Mobile Life for Enterprises and Consumers
Steps For Protecting Your Mobile Life for Enterprises and ConsumersSteps For Protecting Your Mobile Life for Enterprises and Consumers
Steps For Protecting Your Mobile Life for Enterprises and Consumers
 
Mobile security
Mobile securityMobile security
Mobile security
 
Mobile protection
Mobile protection Mobile protection
Mobile protection
 
Smartphone security
Smartphone  securitySmartphone  security
Smartphone security
 
Corporate security
Corporate securityCorporate security
Corporate security
 
Mobile Security
Mobile SecurityMobile Security
Mobile Security
 
Mobile security by Tajwar khan
Mobile security by Tajwar khanMobile security by Tajwar khan
Mobile security by Tajwar khan
 
Mobile device security
Mobile device securityMobile device security
Mobile device security
 
Why Your Mobile Device Isn’t As Secure As You Think
Why Your Mobile Device Isn’t As Secure As You ThinkWhy Your Mobile Device Isn’t As Secure As You Think
Why Your Mobile Device Isn’t As Secure As You Think
 
8 threats that even antivirus cannot catch
8 threats that even antivirus cannot catch8 threats that even antivirus cannot catch
8 threats that even antivirus cannot catch
 
Mobile phone Data Hacking
Mobile phone Data HackingMobile phone Data Hacking
Mobile phone Data Hacking
 
Mobile security
Mobile securityMobile security
Mobile security
 
Security Requirements in eBusiness
Security Requirements in eBusinessSecurity Requirements in eBusiness
Security Requirements in eBusiness
 
Treads to mobile network
Treads to mobile networkTreads to mobile network
Treads to mobile network
 
Mobile Security
Mobile SecurityMobile Security
Mobile Security
 

Viewers also liked

CTO Cybersecurity Forum 2013 Jean Jacques Massima-landji
CTO Cybersecurity Forum 2013 Jean Jacques Massima-landjiCTO Cybersecurity Forum 2013 Jean Jacques Massima-landji
CTO Cybersecurity Forum 2013 Jean Jacques Massima-landji
Commonwealth Telecommunications Organisation
 

Viewers also liked (6)

Mapping Tools Version 3
Mapping Tools Version 3Mapping Tools Version 3
Mapping Tools Version 3
 
CTO Cybersecurity Forum 2013 Jean Jacques Massima-landji
CTO Cybersecurity Forum 2013 Jean Jacques Massima-landjiCTO Cybersecurity Forum 2013 Jean Jacques Massima-landji
CTO Cybersecurity Forum 2013 Jean Jacques Massima-landji
 
Driving mobile broadband usage through innovative services
Driving mobile broadband usage through innovative servicesDriving mobile broadband usage through innovative services
Driving mobile broadband usage through innovative services
 
Increasing universal access through telecentres
Increasing universal access through telecentresIncreasing universal access through telecentres
Increasing universal access through telecentres
 
Fidelis Cybersecurity Overview
Fidelis Cybersecurity OverviewFidelis Cybersecurity Overview
Fidelis Cybersecurity Overview
 
Building internet safety wall understanding the imperatives of national domai...
Building internet safety wall understanding the imperatives of national domai...Building internet safety wall understanding the imperatives of national domai...
Building internet safety wall understanding the imperatives of national domai...
 

Similar to CTO Cybersecurity Forum 2013 David Turahi

Ms810 assignment viruses and malware affecting moblie devices
Ms810 assignment viruses and malware affecting moblie devicesMs810 assignment viruses and malware affecting moblie devices
Ms810 assignment viruses and malware affecting moblie devices
rebelreg
 
Article on Mobile Security
Article on Mobile SecurityArticle on Mobile Security
Article on Mobile Security
Tharaka Mahadewa
 
CASE STUDY There is a new phenomenon in the cybersecurity domain ca.pdf
CASE STUDY There is a new phenomenon in the cybersecurity domain ca.pdfCASE STUDY There is a new phenomenon in the cybersecurity domain ca.pdf
CASE STUDY There is a new phenomenon in the cybersecurity domain ca.pdf
kostikjaylonshaewe47
 

Similar to CTO Cybersecurity Forum 2013 David Turahi (20)

Ensuring Mobile Device Security
Ensuring Mobile Device SecurityEnsuring Mobile Device Security
Ensuring Mobile Device Security
 
Ms810 assignment viruses and malware affecting moblie devices
Ms810 assignment viruses and malware affecting moblie devicesMs810 assignment viruses and malware affecting moblie devices
Ms810 assignment viruses and malware affecting moblie devices
 
Mobile Device Security
Mobile Device SecurityMobile Device Security
Mobile Device Security
 
Mobile security in Cyber Security
Mobile security in Cyber SecurityMobile security in Cyber Security
Mobile security in Cyber Security
 
Smartphone Smart Card 061013
Smartphone Smart Card 061013Smartphone Smart Card 061013
Smartphone Smart Card 061013
 
Smartphone
SmartphoneSmartphone
Smartphone
 
ISACA CACS 2012 - Mobile Device Security and Privacy
ISACA CACS 2012 - Mobile Device Security and PrivacyISACA CACS 2012 - Mobile Device Security and Privacy
ISACA CACS 2012 - Mobile Device Security and Privacy
 
Evolutionand impactofhiddenmobilethreats wandera
Evolutionand impactofhiddenmobilethreats wanderaEvolutionand impactofhiddenmobilethreats wandera
Evolutionand impactofhiddenmobilethreats wandera
 
Cn35499502
Cn35499502Cn35499502
Cn35499502
 
Smartphone 7 aug14
Smartphone 7 aug14Smartphone 7 aug14
Smartphone 7 aug14
 
Mobile Apps and Security Attacks: An Introduction
Mobile Apps and Security Attacks: An IntroductionMobile Apps and Security Attacks: An Introduction
Mobile Apps and Security Attacks: An Introduction
 
Article on Mobile Security
Article on Mobile SecurityArticle on Mobile Security
Article on Mobile Security
 
Attacks on Mobiles\Cell Phones
Attacks on Mobiles\Cell PhonesAttacks on Mobiles\Cell Phones
Attacks on Mobiles\Cell Phones
 
Mobile app security
Mobile app securityMobile app security
Mobile app security
 
Unit-3.pptx
Unit-3.pptxUnit-3.pptx
Unit-3.pptx
 
Report on Mobile security
Report  on Mobile securityReport  on Mobile security
Report on Mobile security
 
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?Do New Mobile Devices in Enterprises Pose A Serious Security Threat?
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?
 
CASE STUDY There is a new phenomenon in the cybersecurity domain ca.pdf
CASE STUDY There is a new phenomenon in the cybersecurity domain ca.pdfCASE STUDY There is a new phenomenon in the cybersecurity domain ca.pdf
CASE STUDY There is a new phenomenon in the cybersecurity domain ca.pdf
 
Top 2016 Mobile Security Threats and your Employees
Top 2016 Mobile Security Threats and your EmployeesTop 2016 Mobile Security Threats and your Employees
Top 2016 Mobile Security Threats and your Employees
 
Malware Applications Development.pptx
Malware Applications Development.pptxMalware Applications Development.pptx
Malware Applications Development.pptx
 

More from Commonwealth Telecommunications Organisation

More from Commonwealth Telecommunications Organisation (20)

Commonwealth Digital Broadcasting Siwtchover FOrum 2015 Regis Le Roux
Commonwealth Digital Broadcasting Siwtchover FOrum 2015 Regis Le RouxCommonwealth Digital Broadcasting Siwtchover FOrum 2015 Regis Le Roux
Commonwealth Digital Broadcasting Siwtchover FOrum 2015 Regis Le Roux
 
Commonwealth Digital Broadcasting Switchover Forum 2015 Michael Ojo
Commonwealth Digital Broadcasting Switchover Forum 2015 Michael OjoCommonwealth Digital Broadcasting Switchover Forum 2015 Michael Ojo
Commonwealth Digital Broadcasting Switchover Forum 2015 Michael Ojo
 
Commonwealth Digital Broadcasting Switchover Forum 2015 Loren Braithwaite Kab...
Commonwealth Digital Broadcasting Switchover Forum 2015 Loren Braithwaite Kab...Commonwealth Digital Broadcasting Switchover Forum 2015 Loren Braithwaite Kab...
Commonwealth Digital Broadcasting Switchover Forum 2015 Loren Braithwaite Kab...
 
Commonwealth Digital Broadcasting Switchover Forum 2015 Régis Saint Girons
Commonwealth Digital Broadcasting Switchover Forum 2015 Régis Saint GironsCommonwealth Digital Broadcasting Switchover Forum 2015 Régis Saint Girons
Commonwealth Digital Broadcasting Switchover Forum 2015 Régis Saint Girons
 
Commonwealth Digital Broadcasting Switchover Forum 2015 Francois Hernandez
Commonwealth Digital Broadcasting Switchover Forum 2015 Francois HernandezCommonwealth Digital Broadcasting Switchover Forum 2015 Francois Hernandez
Commonwealth Digital Broadcasting Switchover Forum 2015 Francois Hernandez
 
Commonwealth digital broadcasting switchover forum 2015 dr mothobi mutloatse
Commonwealth digital broadcasting switchover forum 2015 dr mothobi mutloatseCommonwealth digital broadcasting switchover forum 2015 dr mothobi mutloatse
Commonwealth digital broadcasting switchover forum 2015 dr mothobi mutloatse
 
Commonwealth digital broadcasting switchover forum 2015 annemarie meijer
Commonwealth digital broadcasting switchover forum 2015 annemarie meijerCommonwealth digital broadcasting switchover forum 2015 annemarie meijer
Commonwealth digital broadcasting switchover forum 2015 annemarie meijer
 
Commonwealth Digital Broadcasting Switchover Forum 2015 Mortimer Hope
Commonwealth Digital Broadcasting Switchover Forum 2015 Mortimer HopeCommonwealth Digital Broadcasting Switchover Forum 2015 Mortimer Hope
Commonwealth Digital Broadcasting Switchover Forum 2015 Mortimer Hope
 
Commonwealth Digital Broadcasting Switchover Forum 2015 Michele Coat Degert
Commonwealth Digital Broadcasting Switchover Forum 2015 Michele Coat DegertCommonwealth Digital Broadcasting Switchover Forum 2015 Michele Coat Degert
Commonwealth Digital Broadcasting Switchover Forum 2015 Michele Coat Degert
 
we.learn.it - February 2015
we.learn.it - February 2015we.learn.it - February 2015
we.learn.it - February 2015
 
We learn it agenda
We learn it agendaWe learn it agenda
We learn it agenda
 
Reflections on scale up and transferability
Reflections on scale up and transferabilityReflections on scale up and transferability
Reflections on scale up and transferability
 
Planning your learning expedition final
Planning your learning expedition finalPlanning your learning expedition final
Planning your learning expedition final
 
Le template 2015 final
Le template 2015 finalLe template 2015 final
Le template 2015 final
 
5 expedition posters
5 expedition posters5 expedition posters
5 expedition posters
 
Session 6.2 Cécile Barayre El Shami
Session 6.2 Cécile Barayre El ShamiSession 6.2 Cécile Barayre El Shami
Session 6.2 Cécile Barayre El Shami
 
Session 6.1 Stewart Room
Session 6.1 Stewart RoomSession 6.1 Stewart Room
Session 6.1 Stewart Room
 
Session 5.3 Alexander Ntoko
Session 5.3 Alexander NtokoSession 5.3 Alexander Ntoko
Session 5.3 Alexander Ntoko
 
Session 5.2 Martin Koyabe
Session 5.2 Martin KoyabeSession 5.2 Martin Koyabe
Session 5.2 Martin Koyabe
 
Session 4.1 Roy Arends
Session 4.1 Roy ArendsSession 4.1 Roy Arends
Session 4.1 Roy Arends
 

Recently uploaded

TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Recently uploaded (20)

MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
ChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps ProductivityChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps Productivity
 
How to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfHow to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cf
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by Anitaraj
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 

CTO Cybersecurity Forum 2013 David Turahi

  • 1. Dr. David Turahi Director for IT&IMS - MOICT Uganda
  • 2. Benefits Mobility Size A smart phone is a mobile phone offering advanced capabilities beyond a typical mobile phone, often with computer like functionality. There is no industry standard definition of a smart phone.
  • 3.
  • 4. Inherent risk to exposure of personal information carried on and transmitted through the device Phones are easily lost Devices are associated with and linked to a particular user for billing and account purposes. Increased mobility means increased exposure. Applications used on smartphones are unsafe.
  • 5. Password Protection • Lack of leads to great exposure Jail breaking/Rooting • Exposes phone to remote installation of software (Might be malware) Accounts linked to credit cards • Can easily leak your financial information when compromised
  • 6. Applications • Can access and reveal a lot of personal information • Security leak if not updated Email Accounts • Amalgamation of communications
  • 7. How much does your phone know about you? •Almost everything Mobile malware •App based •Web based •SMS/Text message-based Securing your smartphone •Passcode •Antivirus software •Software updates
  • 8. App permissions/access •Pay attention to permissions app requests for Location services: GPs and WiFi •Disclose location information •Disclose of transmitted information (public WiFi)
  • 10. Spyware – software that self-installs on a computer, enabling information to be covertly obtained about a person’s internet use, passwords, etc.
  • 11. Botnets – A network of private computers infected with malicious software and controlled as a group without the owner’s knowledge, e.g. to send spam
  • 12. Trojan – A Trojan horse, or Trojan is a malware that appears to perform a desirable function for the user prior to run or install but instead facilitates unauthorized access to a user’s computer system
  • 13. Virus – A Virus is a software program capable of reproducing itself and usually of causing great damage to files or other programs on the same computer
  • 14. Worm – A computer worm is a self-replicating malware computer program in order to spread to other computers. It uses a computer network to spread itself relying on security failures on the target computer. Unlike a virus it does not need to attach itself to an existing program
  • 15. Geolocation – Geolocation is the identification of the real- world geographic location of an object, such as a cell phone or an internet-connected computer terminal. For example, a picture taken with a smart phone may record the location within the file. When the file is posted on a social network site, any viewer may be able to determine the location from the data saved on the picture file
  • 16. •Malware •Metadata •Application scams •Insecure applications Risks associated with mobile applications •Decreased performance •Random action •Unknown phone calls or emails • • Signs that your phone is compromised
  • 17. Steps to take incase you are victim of compromise • If antivirus is installed, scan and remove malware • If unable to remove malware, use wiping program
  • 18. Password protect your phone Install security software Be aware of what you are doing with your phone Do not “jail-break” or “root” your phone Application access Review permission given to applications when installing them
  • 19. Install “phone-finder” app Enroll in a backup/wiping program Limit your activities while using public WiFi Crosscheck URLs while making purchases using your phone Turn off Geolocation and GPS
  • 20. If your phone is stolen • If enrolled in backup/wiping program • Contact administrator and wipe immediately • Contact service provider to cancel your service • if not enrolled in a backup/wiping program • Treat loss as you would treat loss of wallet or purse y In case of disposal •Wipe phone clean