SlideShare a Scribd company logo
MOBILE SECURITY
By
DILIP DUBEY
( 13STUHHCS0057 )
CONTENTS
 INTRODUCTION
 SECURITY ISSUE WITH MOBILE PHONE
 TYPES OF MOBILE SECURITY
 MOBILE THREATS
 TIPS TO STAY SAFE
 CONCLUSION
INTRODUCTION
 Used to call and send text messages.
 Have Internet access, built-in video cameras and the ability to install
additional software
 Contain a lot of private data and, unfortunately, a phone can be lost
easily.
SECURITY ISSUE WITH MOBILE PHONE
 Physical Security
A phone can be Confiscated or stolen. We should always enable some kind
of password protection on our phone.
 Voice
Although the voice on a mobile phone channel is encrypted, this
encryption was hacked some time ago and is not considered safe anymore.
Normal voice communications are very insecure as they are not encrypted.
 SMS
Text messages are sent in plain text over the network, so they are also not
considered Secure.
 IMEI No.
Beware that your phone also has a unique identifier,
(known as the IMEI number i.e (International Mobile Equipment Identity))
so switching SIM cards will not guarantee to protect your privacy.
TYPES OF MOBILE SECURITY
Mobile device security.
Mobile application security.
Mobile Device Security
 Screen locks.
All mobile devices (e.g., phones, tablets, and laptops) should have the
screen lock set.
 Lockout settings.
After a specific no. of unsuccessful unlock attempts, the device
will get locked which can only be opened through user’s ID.
 GPS.
Many mobile devices have GPS capabilities, allowing the device
to be located if it is lost or stolen.
 Remote wiping.
Some mobile devices allow for the device to be wiped (all data
and applications are removed) remotely. This can be used if a
device is unrecoverable.
Application controls.
 Many mobile applications attempt to access unnecessary user
information (e.g., the location of the device). Controls should be
used to limit the data that applications can access and to restrict the
actions that applications may undertake.
Mobile Application Security
 Encryption.
Ensure that mobile applications are encrypting sensitive data that
is stored on the device. Encryption keys must also be created and
stored securely.
 Authentication.
A best practice is for the mobile application to authenticate the
user and to base access to data on the user’s authentication level.
 Geotagging.
Geotagging is most commonly used for photographs and can help people get a
lot of specific information about where the picture was taken or the exact
location of friend who logged on to service.
Application whitelisting.
 It is a device administration practice used to prevent unauthorized
application from running. The purpose is primarily to protect device and
networks from harmful application.
An application will trust an unknown security environment if it is trusted by a security
environment that the application trusts.
Mobile Threats
 Application Based Threats
 Web Based Threats.
 Network Threats.
 Application Based Threats.
Downloadable applications present many security issues on mobile
devices, including both software specifically designed to be malicious as
well as software that can be exploited for malicious purposes. It contains
(Malware, Spyware, Privacy Threats, Vulnerable application)
 Web –Based Threats.
Because mobile devices are often constantly connected to the Internet and
used to access web-based services, web-based threats that have historically
been a problem for PCs also pose issues for mobile devices
It contains (Phishing Scams, Drive-By Download, Browser Exploits).
 Network Threats
Mobile devices typically support cellular networks as well as local
wireless networks. It contains (Network Exploits, Wi-Fi Sniffing).
TIPS TO STAY SAFE
 Only download apps from trusted sources.
Set a password
.
Download a mobile security tool.
 Be alert for unusual behaviors on your phone(unusual text messages,
strange charges to the phone bill , decreased battery life)
CONCLUSION
Our mobile devices contains important and delicate data
which needs to be kept safe and secure .
With the simple tips given in presentation , we can keep
our data safe and secure

More Related Content

What's hot

What's hot (20)

Ensuring Mobile Device Security
Ensuring Mobile Device SecurityEnsuring Mobile Device Security
Ensuring Mobile Device Security
 
Smartphone security
Smartphone  securitySmartphone  security
Smartphone security
 
Mobile security
Mobile security Mobile security
Mobile security
 
Mobile Device Security
Mobile Device SecurityMobile Device Security
Mobile Device Security
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
 
Mobile security
Mobile securityMobile security
Mobile security
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Network security
Network securityNetwork security
Network security
 
Wireless and mobile security
Wireless and mobile securityWireless and mobile security
Wireless and mobile security
 
Mobile security
Mobile securityMobile security
Mobile security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Network Security
Network SecurityNetwork Security
Network Security
 
presentation on hacking
presentation on hackingpresentation on hacking
presentation on hacking
 
Network security
Network securityNetwork security
Network security
 
Cybersecurity PowerPoint Presentation
Cybersecurity PowerPoint PresentationCybersecurity PowerPoint Presentation
Cybersecurity PowerPoint Presentation
 
Cyber attack
Cyber attackCyber attack
Cyber attack
 
MOBILE PHONE SECURITY./ MOBILE SECURITY
MOBILE PHONE SECURITY./ MOBILE SECURITYMOBILE PHONE SECURITY./ MOBILE SECURITY
MOBILE PHONE SECURITY./ MOBILE SECURITY
 
Computer Worms
Computer WormsComputer Worms
Computer Worms
 
Email security
Email securityEmail security
Email security
 

Viewers also liked (6)

New trends in Payments Security: NFC & Mobile
New trends in Payments Security: NFC & MobileNew trends in Payments Security: NFC & Mobile
New trends in Payments Security: NFC & Mobile
 
Mobile database security threats
Mobile database security threatsMobile database security threats
Mobile database security threats
 
Mobile Security
Mobile SecurityMobile Security
Mobile Security
 
Mobile security
Mobile securityMobile security
Mobile security
 
Mobile security
Mobile securityMobile security
Mobile security
 
2015 Mobile Security Trends: Are You Ready?
2015 Mobile Security Trends: Are You Ready?2015 Mobile Security Trends: Are You Ready?
2015 Mobile Security Trends: Are You Ready?
 

Similar to Mobile security

CTO Cybersecurity Forum 2013 David Turahi
CTO Cybersecurity Forum 2013 David TurahiCTO Cybersecurity Forum 2013 David Turahi
CTO Cybersecurity Forum 2013 David Turahi
Commonwealth Telecommunications Organisation
 

Similar to Mobile security (20)

Smartphone Smart Card 061013
Smartphone Smart Card 061013Smartphone Smart Card 061013
Smartphone Smart Card 061013
 
CTO Cybersecurity Forum 2013 David Turahi
CTO Cybersecurity Forum 2013 David TurahiCTO Cybersecurity Forum 2013 David Turahi
CTO Cybersecurity Forum 2013 David Turahi
 
Cn35499502
Cn35499502Cn35499502
Cn35499502
 
880 st011
880 st011880 st011
880 st011
 
Mobile app security
Mobile app securityMobile app security
Mobile app security
 
Securing Mobile & Online Identity in the Cyber World
Securing Mobile & Online Identity in the Cyber WorldSecuring Mobile & Online Identity in the Cyber World
Securing Mobile & Online Identity in the Cyber World
 
MOBILE SECURITY.pptx
MOBILE SECURITY.pptxMOBILE SECURITY.pptx
MOBILE SECURITY.pptx
 
MUC -Summary - Lessons.docx
MUC -Summary - Lessons.docxMUC -Summary - Lessons.docx
MUC -Summary - Lessons.docx
 
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?Do New Mobile Devices in Enterprises Pose A Serious Security Threat?
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?
 
Tips of Mobile Application Security
Tips of Mobile Application SecurityTips of Mobile Application Security
Tips of Mobile Application Security
 
BYOD - Bring Your Own Device
BYOD - Bring Your Own DeviceBYOD - Bring Your Own Device
BYOD - Bring Your Own Device
 
Mobile Apps and Security Attacks: An Introduction
Mobile Apps and Security Attacks: An IntroductionMobile Apps and Security Attacks: An Introduction
Mobile Apps and Security Attacks: An Introduction
 
Smartphone 7 aug14
Smartphone 7 aug14Smartphone 7 aug14
Smartphone 7 aug14
 
Mobile device privacy and security
Mobile device privacy and securityMobile device privacy and security
Mobile device privacy and security
 
Report on Mobile security
Report  on Mobile securityReport  on Mobile security
Report on Mobile security
 
Smartphone Security Guide: The Easiest Way to Keep Your Phone & Data Secure
Smartphone Security Guide: The Easiest Way to Keep Your Phone & Data SecureSmartphone Security Guide: The Easiest Way to Keep Your Phone & Data Secure
Smartphone Security Guide: The Easiest Way to Keep Your Phone & Data Secure
 
How BYOD Will Shape Wireless Network Security in 2012
How BYOD Will Shape Wireless Network Security in 2012How BYOD Will Shape Wireless Network Security in 2012
How BYOD Will Shape Wireless Network Security in 2012
 
12 IoT Cyber Security Threats to Avoid - CyberHive.pdf
12 IoT Cyber Security Threats to Avoid - CyberHive.pdf12 IoT Cyber Security Threats to Avoid - CyberHive.pdf
12 IoT Cyber Security Threats to Avoid - CyberHive.pdf
 
Mobile App Security Best Practices Protecting User Data.pdf
Mobile App Security Best Practices Protecting User Data.pdfMobile App Security Best Practices Protecting User Data.pdf
Mobile App Security Best Practices Protecting User Data.pdf
 
Top Seven Risks of Enterprise Mobility - How to protect your business
Top Seven Risks of Enterprise Mobility - How to protect your businessTop Seven Risks of Enterprise Mobility - How to protect your business
Top Seven Risks of Enterprise Mobility - How to protect your business
 

Recently uploaded

Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlFuture Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Peter Udo Diehl
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
Bhaskar Mitra
 

Recently uploaded (20)

Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlFuture Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
AI revolution and Salesforce, Jiří Karpíšek
AI revolution and Salesforce, Jiří KarpíšekAI revolution and Salesforce, Jiří Karpíšek
AI revolution and Salesforce, Jiří Karpíšek
 
Powerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara LaskowskaPowerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara Laskowska
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
10 Differences between Sales Cloud and CPQ, Blanka Doktorová
10 Differences between Sales Cloud and CPQ, Blanka Doktorová10 Differences between Sales Cloud and CPQ, Blanka Doktorová
10 Differences between Sales Cloud and CPQ, Blanka Doktorová
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
WSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptxWSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptx
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
 
Speed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in MinutesSpeed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in Minutes
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀Exploring UiPath Orchestrator API: updates and limits in 2024 🚀
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
 
IoT Analytics Company Presentation May 2024
IoT Analytics Company Presentation May 2024IoT Analytics Company Presentation May 2024
IoT Analytics Company Presentation May 2024
 

Mobile security

  • 2. CONTENTS  INTRODUCTION  SECURITY ISSUE WITH MOBILE PHONE  TYPES OF MOBILE SECURITY  MOBILE THREATS  TIPS TO STAY SAFE  CONCLUSION
  • 3. INTRODUCTION  Used to call and send text messages.  Have Internet access, built-in video cameras and the ability to install additional software  Contain a lot of private data and, unfortunately, a phone can be lost easily.
  • 4. SECURITY ISSUE WITH MOBILE PHONE  Physical Security A phone can be Confiscated or stolen. We should always enable some kind of password protection on our phone.  Voice Although the voice on a mobile phone channel is encrypted, this encryption was hacked some time ago and is not considered safe anymore. Normal voice communications are very insecure as they are not encrypted.
  • 5.  SMS Text messages are sent in plain text over the network, so they are also not considered Secure.  IMEI No. Beware that your phone also has a unique identifier, (known as the IMEI number i.e (International Mobile Equipment Identity)) so switching SIM cards will not guarantee to protect your privacy.
  • 6. TYPES OF MOBILE SECURITY Mobile device security. Mobile application security.
  • 7. Mobile Device Security  Screen locks. All mobile devices (e.g., phones, tablets, and laptops) should have the screen lock set.
  • 8.  Lockout settings. After a specific no. of unsuccessful unlock attempts, the device will get locked which can only be opened through user’s ID.  GPS. Many mobile devices have GPS capabilities, allowing the device to be located if it is lost or stolen.  Remote wiping. Some mobile devices allow for the device to be wiped (all data and applications are removed) remotely. This can be used if a device is unrecoverable.
  • 9. Application controls.  Many mobile applications attempt to access unnecessary user information (e.g., the location of the device). Controls should be used to limit the data that applications can access and to restrict the actions that applications may undertake.
  • 10. Mobile Application Security  Encryption. Ensure that mobile applications are encrypting sensitive data that is stored on the device. Encryption keys must also be created and stored securely.  Authentication. A best practice is for the mobile application to authenticate the user and to base access to data on the user’s authentication level.
  • 11.  Geotagging. Geotagging is most commonly used for photographs and can help people get a lot of specific information about where the picture was taken or the exact location of friend who logged on to service. Application whitelisting.  It is a device administration practice used to prevent unauthorized application from running. The purpose is primarily to protect device and networks from harmful application.
  • 12. An application will trust an unknown security environment if it is trusted by a security environment that the application trusts.
  • 13. Mobile Threats  Application Based Threats  Web Based Threats.  Network Threats.
  • 14.  Application Based Threats. Downloadable applications present many security issues on mobile devices, including both software specifically designed to be malicious as well as software that can be exploited for malicious purposes. It contains (Malware, Spyware, Privacy Threats, Vulnerable application)  Web –Based Threats. Because mobile devices are often constantly connected to the Internet and used to access web-based services, web-based threats that have historically been a problem for PCs also pose issues for mobile devices It contains (Phishing Scams, Drive-By Download, Browser Exploits).
  • 15.  Network Threats Mobile devices typically support cellular networks as well as local wireless networks. It contains (Network Exploits, Wi-Fi Sniffing).
  • 16. TIPS TO STAY SAFE  Only download apps from trusted sources.
  • 18. Download a mobile security tool.
  • 19.  Be alert for unusual behaviors on your phone(unusual text messages, strange charges to the phone bill , decreased battery life)
  • 20. CONCLUSION Our mobile devices contains important and delicate data which needs to be kept safe and secure . With the simple tips given in presentation , we can keep our data safe and secure