SlideShare a Scribd company logo
MOBILE DEVICE SECURITY
CREATED AND PRESENTED BY LISA HERRERA
WHAT ARE MOBILE DEVICES?
• A mobile device is a handheld tablet or
other device that is made for portability,
and is therefore both compact and
lightweight. New data storage, processing
and display technologies have allowed
these small devices to do nearly anything
that had previously been traditionally done
with larger personal computers.
("What Is A Mobile Device? - Definition From Techopedia")
ACTIVITY 1: TYPES OF MOBILE DEVICES (3
MINS)
• What Types of Mobile devices do you have?
• How Often Do you use them? (i.e. every day,
hourly, every min)
• List mobile device uses/activity? (i.e social
media, email, banking)
• Brand? Operating System?
ACTIVITY 2: DATA STORED ON MOBILE
DEVICES
(3 MINS)
• What is Data?
-Data is the information stored or used by a computer or device.
• What are some examples of Data that is on a mobile device?
SOME EXAMPLE ARE…….
• Photos
• Music
• Contacts (which may include phone numbers, names,
addresses)
• Email (which can contain information such as D.O.B., address,
numbers, etc)
• GPS/Location
• Banking Apps
BRAINTEASER 1: TEST YOU KNOWLEDGE
MOBILE OPERATING SYSTEMS
ANDRIOD
Cupcake – Android 1.5 (2008)
Eclair – Android 2.0/2.1
FroYo – Android 2.2
Donut – Android 1.6
Gingerbread – The update after
FroYoHoneycomb (For android tablets) -
3.0, 3.1, 3.2
Ice Cream Sandwich - 4.0
Lollipop - 5.0, 5.0.1, 5.0.2
Android 6.X: Marshmallow
Jelly Bean - 4.1, 4.2, 4.3
KitKat - 4.4 (2015)
Lollipop 5.0
Marshmallow 6.0 (2016)
APPLE
• IOS 1.0, 1.1, 1.1.3, (IPhone 2G(2007))
• IOS 2.0,2.1,2.2 (IPhone 2G & 3G, IPod Touch
(2008))
• IOS 3.0, 3.1, (IPhone 3Gs, 3G, 2G , IPod Touch
(2009))
• IOS 3.2 (Ipad 2010)
• IOS 4.0, 4.1,4.21,4.25,4.3 (IPhone 4,(2010-2011))
• All the way up to IOS 9
WINDOWS
• Windows Phone 7 (2010)
• Windows Phone 7.5 Mango
(2011)
• Windows Phone 7.5 Tango
(2012)
• Windows Phone 7.8
• Windows Phone 8
MOBILE NETWORK CONNECTION
TYPES, HISTORY, AND FACTS
• 1G: First Generation Cellular Phones (1970s to 1990s)
Advanced Mobile Phone System (AMPS), Total Access
Communication Systems (TACS) and Nordic Mobile Telephone
(NMT).
• 2G: GSM, CDMA, GPRS Networks (1990s)- IMEI a 15 or 17 digit
code used to identify a mobile station to a GSM network
• 3G Networks- Phone speeds deliver up to 2 Mpbs, but only
under the best conditions and in stationary mode.
• High-Speed 4G LTE- Phone speeds deliver up to 20 Mpbs
VULNERABILITIES & THREATS
• What is the definition of a vulnerability?
-A vulnerability is a weakness which allows an attacker to reduce
a system's information assurance. Vulnerability is the
intersection of three elements: a system susceptibility or flaw,
attacker access to the flaw, and attacker capability to exploit the
flaw.
• What is a threat?
-A threat is a possible danger that might exploit a
vulnerability to breach security and therefore cause
possible harm
ACTIVITY 3: MOBILE SYSTEM
VULNERABILITIES
(3 MINS)
How many system vulnerabilities
can you list?
MOBILE SYSTEM VULNERABILITIES
• Mobile Networks
• Internet
• SMS/MMS
• USB
• Wireless Network
• Bluetooth
• HotSpots
• Tethering
• NFC
• Location (GPS)
THREATS
• Software threats:
-Downloading 3rd party Apps or Apps not in the App or Play
Store
-Downloading and opening files in email but an unknown sender
-Jailbreaking or Rooting mobile device
-Accessing unsecure HotSpots
-These are just a few examples of things that can pose a threat
to your mobile device. How? The apps, software, files, or
accesspoints can contain Malware, such as: viruses, worms,
adware, and spyware to name a few.
MALWARE
• Malware- is Malicious software that infects computer or mobile
systems and then performs some type of evil action, such as
stealing information, damaging data, and/or disrupting normal
use of the computer or mobile system.
ACTIVITY 4: MOBILE DEVICE
SECURITY SOLUTIONS
(3 MINS)
Can you name some solutions to
help secure a mobile device?
EXAMPLE OF SOME MOBILE DEVICE
SECURITY SOLUTIONS
• Passwords
• Screen lock
• Privacy settings
• Encryption
• Remote Device
Wipe
• Back Up
• Anti-Malware
Android
Apple
ACTIVITY 5: ANDROID (LOCK SCREEN AND
SECURITY)
Android has many different screen lock
options. Do you know what they are?
ANDROID
CURRENTLY HAS 6 SCREEN LOCK OPTIONS
IN CONCLUSION
Protecting your mobile device is very
important and will safeguard your
personal information. There is so
much information regarding mobile
device security in which everything was
not fully covered. I have a few
handouts on Mobile Device Security,
QUESTIONS?
REFERENCES
• "Android - History". Android.com. N.p., 2016. Web. 14 June
2016.
• "History Of Cellular Technology: The Evolution Of 1G, 2G, 3G,
And 4G Phone Networks". Bright Hub. N.p., 2016. Web. 14 June
2016.
• "Mobile Devices For Today's Banking Environment".
Slideshare.net. N.p., 2012. Web. 14 June 2016.
• Staff, Verge. "Ios: A Visual History". The Verge. N.p., 2013. Web.
14 June 2016.
• "What Is A Mobile Device? - Definition From Techopedia".
The End!

More Related Content

What's hot

MOBILE PHONE SECURITY./ MOBILE SECURITY
MOBILE PHONE SECURITY./ MOBILE SECURITYMOBILE PHONE SECURITY./ MOBILE SECURITY
MOBILE PHONE SECURITY./ MOBILE SECURITY
JASHU JASWANTH
 
Endpoint Security
Endpoint SecurityEndpoint Security
Endpoint Security
Ahmed Hashem El Fiky
 
Mobile Device Security
Mobile Device SecurityMobile Device Security
Mobile Device Security
Nemwos
 
Mobile security in Cyber Security
Mobile security in Cyber SecurityMobile security in Cyber Security
Mobile security in Cyber Security
Geo Marian
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
AbhishekDas794104
 
Endpoint Protection
Endpoint ProtectionEndpoint Protection
Endpoint ProtectionSophos
 
Smartphone security
Smartphone  securitySmartphone  security
Smartphone security
Manish Gupta
 
1. introduction to cyber security
1. introduction to cyber security1. introduction to cyber security
1. introduction to cyber security
Animesh Roy
 
Wireless and mobile security
Wireless and mobile securityWireless and mobile security
Wireless and mobile security
Pushkar Pashupat
 
Mobile security
Mobile securityMobile security
Mobile security
Naveen Kumar
 
IT Security Presentation
IT Security PresentationIT Security Presentation
IT Security Presentationelihuwalker
 
Cyber security
Cyber security Cyber security
Cyber security
Sachith Lekamge
 
Security Operations Center (SOC) Essentials for the SME
Security Operations Center (SOC) Essentials for the SMESecurity Operations Center (SOC) Essentials for the SME
Security Operations Center (SOC) Essentials for the SME
AlienVault
 
Introduction to cyber security by cyber security infotech(csi)
Introduction to cyber security by cyber security infotech(csi)Introduction to cyber security by cyber security infotech(csi)
Introduction to cyber security by cyber security infotech(csi)
Cyber Security Infotech
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
Ramiro Cid
 
Threats of Public Wi-Fi
Threats of Public Wi-Fi Threats of Public Wi-Fi
Threats of Public Wi-Fi
The TNS Group
 
Mobile Application Security
Mobile Application SecurityMobile Application Security
Mobile Application Security
Ishan Girdhar
 
Network Security Fundamentals
Network Security FundamentalsNetwork Security Fundamentals
Network Security Fundamentals
Rahmat Suhatman
 
Information Security Awareness
Information Security Awareness Information Security Awareness
Information Security Awareness
SnapComms
 

What's hot (20)

MOBILE PHONE SECURITY./ MOBILE SECURITY
MOBILE PHONE SECURITY./ MOBILE SECURITYMOBILE PHONE SECURITY./ MOBILE SECURITY
MOBILE PHONE SECURITY./ MOBILE SECURITY
 
Endpoint Security
Endpoint SecurityEndpoint Security
Endpoint Security
 
Mobile Device Security
Mobile Device SecurityMobile Device Security
Mobile Device Security
 
Mobile security in Cyber Security
Mobile security in Cyber SecurityMobile security in Cyber Security
Mobile security in Cyber Security
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
 
Endpoint Protection
Endpoint ProtectionEndpoint Protection
Endpoint Protection
 
Smartphone security
Smartphone  securitySmartphone  security
Smartphone security
 
1. introduction to cyber security
1. introduction to cyber security1. introduction to cyber security
1. introduction to cyber security
 
Wireless and mobile security
Wireless and mobile securityWireless and mobile security
Wireless and mobile security
 
Mobile security
Mobile securityMobile security
Mobile security
 
IT Security Presentation
IT Security PresentationIT Security Presentation
IT Security Presentation
 
Cyber security
Cyber security Cyber security
Cyber security
 
Security Operations Center (SOC) Essentials for the SME
Security Operations Center (SOC) Essentials for the SMESecurity Operations Center (SOC) Essentials for the SME
Security Operations Center (SOC) Essentials for the SME
 
Introduction to cyber security by cyber security infotech(csi)
Introduction to cyber security by cyber security infotech(csi)Introduction to cyber security by cyber security infotech(csi)
Introduction to cyber security by cyber security infotech(csi)
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Threats of Public Wi-Fi
Threats of Public Wi-Fi Threats of Public Wi-Fi
Threats of Public Wi-Fi
 
Mobile Application Security
Mobile Application SecurityMobile Application Security
Mobile Application Security
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
 
Network Security Fundamentals
Network Security FundamentalsNetwork Security Fundamentals
Network Security Fundamentals
 
Information Security Awareness
Information Security Awareness Information Security Awareness
Information Security Awareness
 

Viewers also liked

Symantec Mobile Security Whitepaper June 2011
Symantec Mobile Security Whitepaper June 2011Symantec Mobile Security Whitepaper June 2011
Symantec Mobile Security Whitepaper June 2011
Symantec
 
Mobile Device Management & Data Protection
Mobile Device Management & Data ProtectionMobile Device Management & Data Protection
Mobile Device Management & Data Protection
GeekTek IT Services
 
Ps4 vs xbox one | àlex Gómez i Arnau Marín
Ps4 vs xbox one | àlex Gómez i Arnau MarínPs4 vs xbox one | àlex Gómez i Arnau Marín
Ps4 vs xbox one | àlex Gómez i Arnau Marín
TheFirecraker
 
Call of Duty
Call of DutyCall of Duty
Call of Duty
Eric Sevilla
 
iPhone Cost Components
iPhone Cost ComponentsiPhone Cost Components
iPhone Cost Components
Mekko Graphics
 
44Con 2014: GreedyBTS - Hacking Adventures in GSM
44Con 2014: GreedyBTS - Hacking Adventures in GSM44Con 2014: GreedyBTS - Hacking Adventures in GSM
44Con 2014: GreedyBTS - Hacking Adventures in GSM
iphonepentest
 
2010: Mobile Security - Intense overview
2010: Mobile Security - Intense overview2010: Mobile Security - Intense overview
2010: Mobile Security - Intense overview
Fabio Pietrosanti
 
Smartphone security
Smartphone securitySmartphone security
Smartphone security
Muthu Kumar
 
Information security[277]
Information security[277]Information security[277]
Information security[277]
Timothy Warren
 
Big data
Big dataBig data
Big data
neharun07
 
Big data - What is It?
Big data - What is It?Big data - What is It?
Big data - What is It?
Nicole Aidney
 
Computer Network
Computer NetworkComputer Network
Computer Network
EILLEN IVY PORTUGUEZ
 
Guide to big data analytics
Guide to big data analyticsGuide to big data analytics
Guide to big data analytics
Gahya Pandian
 
Security in Computer System
Security in Computer SystemSecurity in Computer System
Security in Computer System
Manesh T
 
Xbox v/s Ps4
Xbox v/s Ps4Xbox v/s Ps4
Xbox v/s Ps4
Ashish Sahu
 
The iPhone Evolution
The iPhone EvolutionThe iPhone Evolution
The iPhone Evolution
Thomas C. A. Tandberg Brevik
 
6G Technology
6G Technology6G Technology
6G Technology
Akhil john
 
Introduction To Information Security
Introduction To Information SecurityIntroduction To Information Security
Introduction To Information Security
belsis
 

Viewers also liked (20)

Symantec Mobile Security Whitepaper June 2011
Symantec Mobile Security Whitepaper June 2011Symantec Mobile Security Whitepaper June 2011
Symantec Mobile Security Whitepaper June 2011
 
Mobile Device Management & Data Protection
Mobile Device Management & Data ProtectionMobile Device Management & Data Protection
Mobile Device Management & Data Protection
 
Ps4 vs xbox one | àlex Gómez i Arnau Marín
Ps4 vs xbox one | àlex Gómez i Arnau MarínPs4 vs xbox one | àlex Gómez i Arnau Marín
Ps4 vs xbox one | àlex Gómez i Arnau Marín
 
Call of Duty
Call of DutyCall of Duty
Call of Duty
 
iPhone Cost Components
iPhone Cost ComponentsiPhone Cost Components
iPhone Cost Components
 
Stagefright (1)
Stagefright (1)Stagefright (1)
Stagefright (1)
 
44Con 2014: GreedyBTS - Hacking Adventures in GSM
44Con 2014: GreedyBTS - Hacking Adventures in GSM44Con 2014: GreedyBTS - Hacking Adventures in GSM
44Con 2014: GreedyBTS - Hacking Adventures in GSM
 
2010: Mobile Security - Intense overview
2010: Mobile Security - Intense overview2010: Mobile Security - Intense overview
2010: Mobile Security - Intense overview
 
Smartphone security
Smartphone securitySmartphone security
Smartphone security
 
Information security[277]
Information security[277]Information security[277]
Information security[277]
 
Big data
Big dataBig data
Big data
 
Big data - What is It?
Big data - What is It?Big data - What is It?
Big data - What is It?
 
Computer Network
Computer NetworkComputer Network
Computer Network
 
Guide to big data analytics
Guide to big data analyticsGuide to big data analytics
Guide to big data analytics
 
Security in Computer System
Security in Computer SystemSecurity in Computer System
Security in Computer System
 
Xbox v/s Ps4
Xbox v/s Ps4Xbox v/s Ps4
Xbox v/s Ps4
 
The iPhone Evolution
The iPhone EvolutionThe iPhone Evolution
The iPhone Evolution
 
6G Technology
6G Technology6G Technology
6G Technology
 
Introduction To Information Security
Introduction To Information SecurityIntroduction To Information Security
Introduction To Information Security
 
Mobile security - Intense overview
Mobile security - Intense overviewMobile security - Intense overview
Mobile security - Intense overview
 

Similar to Mobile device security

NETC 2012_Mobile Security for Smartphones and Tablets (pptx)
NETC 2012_Mobile Security for Smartphones and Tablets (pptx)NETC 2012_Mobile Security for Smartphones and Tablets (pptx)
NETC 2012_Mobile Security for Smartphones and Tablets (pptx)
Vince Verbeke
 
Mobile Security for Smartphones and Tablets
Mobile Security for Smartphones and TabletsMobile Security for Smartphones and Tablets
Mobile Security for Smartphones and Tablets
Vince Verbeke
 
551_MH_overview_handout.ppt
551_MH_overview_handout.ppt551_MH_overview_handout.ppt
551_MH_overview_handout.ppt
NiloyMondal10
 
Can You Steal From Me Now? Mobile and BYOD Security Risks
Can You Steal From Me Now? Mobile and BYOD Security RisksCan You Steal From Me Now? Mobile and BYOD Security Risks
Can You Steal From Me Now? Mobile and BYOD Security Risks
Michael Davis
 
SMART PHONE
SMART PHONE SMART PHONE
SMART PHONE
kaushalDesai22
 
Cyber Security: A Hands on review
Cyber Security: A Hands on reviewCyber Security: A Hands on review
Cyber Security: A Hands on review
MiltonBiswas8
 
CS_UNIT 2(P3).pptx
CS_UNIT 2(P3).pptxCS_UNIT 2(P3).pptx
CS_UNIT 2(P3).pptx
GaytriDhingra1
 
A tale of mobile threats
A tale of mobile threatsA tale of mobile threats
A tale of mobile threatsVincenzo Iozzo
 
Securing hand held computing devices
Securing hand held computing devicesSecuring hand held computing devices
Securing hand held computing devicesjraja01
 
Sniffer for detecting lost mobiles
Sniffer for detecting lost mobilesSniffer for detecting lost mobiles
Sniffer for detecting lost mobiles
home
 
Mobiquant Japan ITpro Expo Tokyo/ Mobile and IOT Security Conference - REDA Z...
Mobiquant Japan ITpro Expo Tokyo/ Mobile and IOT Security Conference - REDA Z...Mobiquant Japan ITpro Expo Tokyo/ Mobile and IOT Security Conference - REDA Z...
Mobiquant Japan ITpro Expo Tokyo/ Mobile and IOT Security Conference - REDA Z...
MOBIQUANT TECHNOLOGIES
 
2014CyberSecurityProject
2014CyberSecurityProject2014CyberSecurityProject
2014CyberSecurityProjectKaley Hair
 
Information security
 Information security Information security
Information security
Jin Castor
 
Confraria Security & IT - Mobile Security
Confraria Security & IT - Mobile SecurityConfraria Security & IT - Mobile Security
Confraria Security & IT - Mobile Security
Vitor Domingos
 
NMI15 Filip Chytrý – Internet věcí a jeho potenciální bezpečnostní rizika
NMI15 Filip Chytrý – Internet věcí a jeho potenciální bezpečnostní rizikaNMI15 Filip Chytrý – Internet věcí a jeho potenciální bezpečnostní rizika
NMI15 Filip Chytrý – Internet věcí a jeho potenciální bezpečnostní rizika
New Media Inspiration
 
Blackberry playbook – new challenges
Blackberry playbook – new challengesBlackberry playbook – new challenges
Blackberry playbook – new challengesSTO STRATEGY
 
IoT Devices Expanding Your Digital Footprint
IoT Devices Expanding Your Digital FootprintIoT Devices Expanding Your Digital Footprint
IoT Devices Expanding Your Digital Footprint
SurfWatch Labs
 
2014: Mid-Year Threat Review
2014: Mid-Year Threat Review2014: Mid-Year Threat Review
2014: Mid-Year Threat Review
ESET
 
Research on Comparative Study of Different Mobile Operating System_Part-1
Research on Comparative Study of Different Mobile Operating System_Part-1Research on Comparative Study of Different Mobile Operating System_Part-1
Research on Comparative Study of Different Mobile Operating System_Part-1
Zulkar Naim
 
Mobile Devices Securely Accessing SharePoint
Mobile Devices Securely Accessing SharePointMobile Devices Securely Accessing SharePoint
Mobile Devices Securely Accessing SharePoint
Mike Brannon
 

Similar to Mobile device security (20)

NETC 2012_Mobile Security for Smartphones and Tablets (pptx)
NETC 2012_Mobile Security for Smartphones and Tablets (pptx)NETC 2012_Mobile Security for Smartphones and Tablets (pptx)
NETC 2012_Mobile Security for Smartphones and Tablets (pptx)
 
Mobile Security for Smartphones and Tablets
Mobile Security for Smartphones and TabletsMobile Security for Smartphones and Tablets
Mobile Security for Smartphones and Tablets
 
551_MH_overview_handout.ppt
551_MH_overview_handout.ppt551_MH_overview_handout.ppt
551_MH_overview_handout.ppt
 
Can You Steal From Me Now? Mobile and BYOD Security Risks
Can You Steal From Me Now? Mobile and BYOD Security RisksCan You Steal From Me Now? Mobile and BYOD Security Risks
Can You Steal From Me Now? Mobile and BYOD Security Risks
 
SMART PHONE
SMART PHONE SMART PHONE
SMART PHONE
 
Cyber Security: A Hands on review
Cyber Security: A Hands on reviewCyber Security: A Hands on review
Cyber Security: A Hands on review
 
CS_UNIT 2(P3).pptx
CS_UNIT 2(P3).pptxCS_UNIT 2(P3).pptx
CS_UNIT 2(P3).pptx
 
A tale of mobile threats
A tale of mobile threatsA tale of mobile threats
A tale of mobile threats
 
Securing hand held computing devices
Securing hand held computing devicesSecuring hand held computing devices
Securing hand held computing devices
 
Sniffer for detecting lost mobiles
Sniffer for detecting lost mobilesSniffer for detecting lost mobiles
Sniffer for detecting lost mobiles
 
Mobiquant Japan ITpro Expo Tokyo/ Mobile and IOT Security Conference - REDA Z...
Mobiquant Japan ITpro Expo Tokyo/ Mobile and IOT Security Conference - REDA Z...Mobiquant Japan ITpro Expo Tokyo/ Mobile and IOT Security Conference - REDA Z...
Mobiquant Japan ITpro Expo Tokyo/ Mobile and IOT Security Conference - REDA Z...
 
2014CyberSecurityProject
2014CyberSecurityProject2014CyberSecurityProject
2014CyberSecurityProject
 
Information security
 Information security Information security
Information security
 
Confraria Security & IT - Mobile Security
Confraria Security & IT - Mobile SecurityConfraria Security & IT - Mobile Security
Confraria Security & IT - Mobile Security
 
NMI15 Filip Chytrý – Internet věcí a jeho potenciální bezpečnostní rizika
NMI15 Filip Chytrý – Internet věcí a jeho potenciální bezpečnostní rizikaNMI15 Filip Chytrý – Internet věcí a jeho potenciální bezpečnostní rizika
NMI15 Filip Chytrý – Internet věcí a jeho potenciální bezpečnostní rizika
 
Blackberry playbook – new challenges
Blackberry playbook – new challengesBlackberry playbook – new challenges
Blackberry playbook – new challenges
 
IoT Devices Expanding Your Digital Footprint
IoT Devices Expanding Your Digital FootprintIoT Devices Expanding Your Digital Footprint
IoT Devices Expanding Your Digital Footprint
 
2014: Mid-Year Threat Review
2014: Mid-Year Threat Review2014: Mid-Year Threat Review
2014: Mid-Year Threat Review
 
Research on Comparative Study of Different Mobile Operating System_Part-1
Research on Comparative Study of Different Mobile Operating System_Part-1Research on Comparative Study of Different Mobile Operating System_Part-1
Research on Comparative Study of Different Mobile Operating System_Part-1
 
Mobile Devices Securely Accessing SharePoint
Mobile Devices Securely Accessing SharePointMobile Devices Securely Accessing SharePoint
Mobile Devices Securely Accessing SharePoint
 

Recently uploaded

Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 

Recently uploaded (20)

Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 

Mobile device security

  • 1. MOBILE DEVICE SECURITY CREATED AND PRESENTED BY LISA HERRERA
  • 2. WHAT ARE MOBILE DEVICES? • A mobile device is a handheld tablet or other device that is made for portability, and is therefore both compact and lightweight. New data storage, processing and display technologies have allowed these small devices to do nearly anything that had previously been traditionally done with larger personal computers. ("What Is A Mobile Device? - Definition From Techopedia")
  • 3. ACTIVITY 1: TYPES OF MOBILE DEVICES (3 MINS) • What Types of Mobile devices do you have? • How Often Do you use them? (i.e. every day, hourly, every min) • List mobile device uses/activity? (i.e social media, email, banking) • Brand? Operating System?
  • 4.
  • 5. ACTIVITY 2: DATA STORED ON MOBILE DEVICES (3 MINS) • What is Data? -Data is the information stored or used by a computer or device. • What are some examples of Data that is on a mobile device?
  • 6. SOME EXAMPLE ARE……. • Photos • Music • Contacts (which may include phone numbers, names, addresses) • Email (which can contain information such as D.O.B., address, numbers, etc) • GPS/Location • Banking Apps
  • 7.
  • 8. BRAINTEASER 1: TEST YOU KNOWLEDGE MOBILE OPERATING SYSTEMS ANDRIOD Cupcake – Android 1.5 (2008) Eclair – Android 2.0/2.1 FroYo – Android 2.2 Donut – Android 1.6 Gingerbread – The update after FroYoHoneycomb (For android tablets) - 3.0, 3.1, 3.2 Ice Cream Sandwich - 4.0 Lollipop - 5.0, 5.0.1, 5.0.2 Android 6.X: Marshmallow Jelly Bean - 4.1, 4.2, 4.3 KitKat - 4.4 (2015) Lollipop 5.0 Marshmallow 6.0 (2016) APPLE • IOS 1.0, 1.1, 1.1.3, (IPhone 2G(2007)) • IOS 2.0,2.1,2.2 (IPhone 2G & 3G, IPod Touch (2008)) • IOS 3.0, 3.1, (IPhone 3Gs, 3G, 2G , IPod Touch (2009)) • IOS 3.2 (Ipad 2010) • IOS 4.0, 4.1,4.21,4.25,4.3 (IPhone 4,(2010-2011)) • All the way up to IOS 9 WINDOWS • Windows Phone 7 (2010) • Windows Phone 7.5 Mango (2011) • Windows Phone 7.5 Tango (2012) • Windows Phone 7.8 • Windows Phone 8
  • 9. MOBILE NETWORK CONNECTION TYPES, HISTORY, AND FACTS • 1G: First Generation Cellular Phones (1970s to 1990s) Advanced Mobile Phone System (AMPS), Total Access Communication Systems (TACS) and Nordic Mobile Telephone (NMT). • 2G: GSM, CDMA, GPRS Networks (1990s)- IMEI a 15 or 17 digit code used to identify a mobile station to a GSM network • 3G Networks- Phone speeds deliver up to 2 Mpbs, but only under the best conditions and in stationary mode. • High-Speed 4G LTE- Phone speeds deliver up to 20 Mpbs
  • 10. VULNERABILITIES & THREATS • What is the definition of a vulnerability? -A vulnerability is a weakness which allows an attacker to reduce a system's information assurance. Vulnerability is the intersection of three elements: a system susceptibility or flaw, attacker access to the flaw, and attacker capability to exploit the flaw. • What is a threat? -A threat is a possible danger that might exploit a vulnerability to breach security and therefore cause possible harm
  • 11. ACTIVITY 3: MOBILE SYSTEM VULNERABILITIES (3 MINS) How many system vulnerabilities can you list?
  • 12. MOBILE SYSTEM VULNERABILITIES • Mobile Networks • Internet • SMS/MMS • USB • Wireless Network • Bluetooth • HotSpots • Tethering • NFC • Location (GPS)
  • 13. THREATS • Software threats: -Downloading 3rd party Apps or Apps not in the App or Play Store -Downloading and opening files in email but an unknown sender -Jailbreaking or Rooting mobile device -Accessing unsecure HotSpots -These are just a few examples of things that can pose a threat to your mobile device. How? The apps, software, files, or accesspoints can contain Malware, such as: viruses, worms, adware, and spyware to name a few.
  • 14. MALWARE • Malware- is Malicious software that infects computer or mobile systems and then performs some type of evil action, such as stealing information, damaging data, and/or disrupting normal use of the computer or mobile system.
  • 15. ACTIVITY 4: MOBILE DEVICE SECURITY SOLUTIONS (3 MINS) Can you name some solutions to help secure a mobile device?
  • 16. EXAMPLE OF SOME MOBILE DEVICE SECURITY SOLUTIONS • Passwords • Screen lock • Privacy settings • Encryption • Remote Device Wipe • Back Up • Anti-Malware
  • 18. Apple
  • 19. ACTIVITY 5: ANDROID (LOCK SCREEN AND SECURITY) Android has many different screen lock options. Do you know what they are?
  • 20. ANDROID CURRENTLY HAS 6 SCREEN LOCK OPTIONS
  • 21. IN CONCLUSION Protecting your mobile device is very important and will safeguard your personal information. There is so much information regarding mobile device security in which everything was not fully covered. I have a few handouts on Mobile Device Security,
  • 23. REFERENCES • "Android - History". Android.com. N.p., 2016. Web. 14 June 2016. • "History Of Cellular Technology: The Evolution Of 1G, 2G, 3G, And 4G Phone Networks". Bright Hub. N.p., 2016. Web. 14 June 2016. • "Mobile Devices For Today's Banking Environment". Slideshare.net. N.p., 2012. Web. 14 June 2016. • Staff, Verge. "Ios: A Visual History". The Verge. N.p., 2013. Web. 14 June 2016. • "What Is A Mobile Device? - Definition From Techopedia".

Editor's Notes

  1. Why do you think there are so many different operating systems updates and they keep updating them? -Keep up with Technology (I.e., new features and capabilities, improve battery life, system usability improvements, connectivity, increase storage capabilities, increase runtime, and most importantly to improve privacy and security. When new updates come available there may have been a flaw or something that allow the integrity of security to be lowered. Once these flaws are found, new updates are made to fix these flaws or bugs.)
  2. Ask if they know what SMS/MMS is. Explain if they don’t. Ask them if they know what NFC is. Provide an example. Ask if they know what Tethering is. Provide Example.
  3. How many people uses passwords on their mobile devices? How many back up their phones? Why would you back up your phone? What system or software do you use to back up your phone? (I. E., Itunes, Samsung Account, Google Account, etc.) Does anyone use any anti-malware, or anti-virus apps on their phone or mobile device? If yes, what do you use? Why do you use it? What other privacy setting do you use and why? Who knows what remote device wipe is? Get an example or give an example.