SlideShare a Scribd company logo
1 of 17
Mobile Security
-:Presented By:-
Himalay Ladha
1st sem.
(Bachelor of Computer Application)
Shree H.N.Shukla Group Of Collage
Welcome
Mobile security
Tips and tricks for securing your
iPhone & Android
 What data needs to be protected, what should.??
 we avoid storing on mobile devices.
 What habits, settings and applications can help
make your mobile devices more secure.
 Settings for iPhones & Android will be discussed.
Why worry ?
• Sophos survey:
–22% had lost a phone or mobile device
–70% do not password protect phone
• Google intelligence survey:
–40% of organizations are planning to deploy
mobile phone data encryption
–33% are already protecting their mobile phones
with encryption products and services
 Increase mobility → Increased exposure
 Easily lost or stolen
device, content, identity
 Susceptible to threats and attacks
App-based, Web-based, SMS/Text message-
based
Smartphone Risk
How To Secure your Device
iPhone
Android
iPhone
• Enable auto lock
• Enable passcode lock
• Wireless
– Use WPA and WPA2
– Only use WEP as last resort
– WEP better than nothing
– Disable when not needed
– Choose wisely what wireless you attach to
– Don’t act as access point for others
• Use VPN whenever possible
• Take care loaning to others (kids, others)
• Use native device usage restrictions
• Find My iPhone / Remote data wipe
Android
• Set a screen lock password or pattern.
• Turn on SIM card lock if available.
• Take care docking or tethering devices.
• Do not act as an access point (hotspot).
• Disable Bluetooth when not in use.
• Take care downloading from Market
• Review application access for new apps.
• Take care were you store backups of your phone.
• Often androids tied to Gmail & Google accounts.
with stored password
Best Security Practices
1. Password protect
Passcode protect
Pass swipe protect?
Best Security Practices Cont.
2. Install Security Software.
Anti-virus and anti-malware available for mobile
devices.
4. Keep your apps up-to-date.
6. Install a phone finder app.
8. Enroll in a backup program.
10. Set device to wipe contents after specified
number of failed login attempts.
Best Security Practices Cont.
7. When installing apps
Take time to read the small print
What information does the app require to access?
Where are you downloading the app from?
Is it the app store location set by default on the
phone?
Best Security Practices Cont.
8. Know where your device is at all times
10. Be mindful of how you use your device
Follow same guidelines as you do for your
computer
Double check URLs for accuracy
Don’t open suspicious links
Make sure the Website is secure before giving
any personal data
10. Limit your activities when using public WiFi
12. Your cellular network connection is more
secure than WiFi
14. Check URL’s before making a purchase
https:// is secure; http:// is not
Best Security Practices Cont.
 Treat as if your purse or wallet
File a report with law enforcement
Contact your service vendor to cancel your
service and report your device missing
If you have a backup/wipe program, contact your
vendor to have them wipe the device
NDSU email? Notify the IT Help Desk
Lost Or Stolen..?
Common Helper apps
• Antivirus
• Antitheft
• Firewall
• Lost device locator
• Data scrub when lost
1. Password/Passcode protect your device
2. Lock your device
3. Use anti-virus software
4. Sync/back up your data
5. Install a phone finder app
Key Point
Any Question…??
All Of You…

More Related Content

What's hot

Wireless and mobile security
Wireless and mobile securityWireless and mobile security
Wireless and mobile securityPushkar Pashupat
 
Cybersecurity Awareness Infographics
Cybersecurity Awareness InfographicsCybersecurity Awareness Infographics
Cybersecurity Awareness InfographicsNetLockSmith
 
Cybersafety basics.ppt cs
Cybersafety basics.ppt csCybersafety basics.ppt cs
Cybersafety basics.ppt csVinay Soni
 
Computer & internet Security
Computer & internet SecurityComputer & internet Security
Computer & internet SecurityGerard Lamusse
 
Cyber security & awareness
Cyber security & awarenessCyber security & awareness
Cyber security & awarenessRishab garg
 
Your smartphone can help protect itself – and
Your smartphone can help protect itself – andYour smartphone can help protect itself – and
Your smartphone can help protect itself – andRandyBett
 
14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awareness14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awarenessMichel Bitter
 
Online safety, Security, Ethics and Etiquette
Online safety, Security, Ethics and EtiquetteOnline safety, Security, Ethics and Etiquette
Online safety, Security, Ethics and EtiquetteDOFJLCCDD
 
Computer Security and safety
Computer Security and safety Computer Security and safety
Computer Security and safety Sadaf Walliyani
 
Securing Mobile & Online Identity in the Cyber World
Securing Mobile & Online Identity in the Cyber WorldSecuring Mobile & Online Identity in the Cyber World
Securing Mobile & Online Identity in the Cyber WorldEmil Tan
 

What's hot (20)

Wireless and mobile security
Wireless and mobile securityWireless and mobile security
Wireless and mobile security
 
Smartphone safety
Smartphone safetySmartphone safety
Smartphone safety
 
Dos and Don'ts of Internet Security
Dos and Don'ts of Internet SecurityDos and Don'ts of Internet Security
Dos and Don'ts of Internet Security
 
Internet security
Internet securityInternet security
Internet security
 
Cybersecurity Awareness Infographics
Cybersecurity Awareness InfographicsCybersecurity Awareness Infographics
Cybersecurity Awareness Infographics
 
Cybersafety basics.ppt cs
Cybersafety basics.ppt csCybersafety basics.ppt cs
Cybersafety basics.ppt cs
 
Computer & internet Security
Computer & internet SecurityComputer & internet Security
Computer & internet Security
 
Mobile security
Mobile security Mobile security
Mobile security
 
Securitytips
SecuritytipsSecuritytips
Securitytips
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber security & awareness
Cyber security & awarenessCyber security & awareness
Cyber security & awareness
 
Your smartphone can help protect itself – and
Your smartphone can help protect itself – andYour smartphone can help protect itself – and
Your smartphone can help protect itself – and
 
14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awareness14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awareness
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Online safety, Security, Ethics and Etiquette
Online safety, Security, Ethics and EtiquetteOnline safety, Security, Ethics and Etiquette
Online safety, Security, Ethics and Etiquette
 
Online safety and malwares
Online safety and malwaresOnline safety and malwares
Online safety and malwares
 
Security awareness
Security awarenessSecurity awareness
Security awareness
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Computer Security and safety
Computer Security and safety Computer Security and safety
Computer Security and safety
 
Securing Mobile & Online Identity in the Cyber World
Securing Mobile & Online Identity in the Cyber WorldSecuring Mobile & Online Identity in the Cyber World
Securing Mobile & Online Identity in the Cyber World
 

Similar to Mobile security first round (1st rank)

Smartphone 7 aug14
Smartphone 7 aug14Smartphone 7 aug14
Smartphone 7 aug14Naval OPSEC
 
Smartphone Security Guide: The Easiest Way to Keep Your Phone & Data Secure
Smartphone Security Guide: The Easiest Way to Keep Your Phone & Data SecureSmartphone Security Guide: The Easiest Way to Keep Your Phone & Data Secure
Smartphone Security Guide: The Easiest Way to Keep Your Phone & Data SecureHeimdal Security
 
8 steps to smartphone security for android
8 steps to smartphone security for android8 steps to smartphone security for android
8 steps to smartphone security for androidiYogi
 
Smartphone_Security.pptx
Smartphone_Security.pptxSmartphone_Security.pptx
Smartphone_Security.pptxHarish443270
 
Mobile Security 101
Mobile Security 101Mobile Security 101
Mobile Security 101Lookout
 
How to Keep Your Phone Safe from Hackers (1).pptx
How to Keep Your Phone Safe from Hackers (1).pptxHow to Keep Your Phone Safe from Hackers (1).pptx
How to Keep Your Phone Safe from Hackers (1).pptx4Freedom Mobile
 
Traveling safely with smartphones 16 jun14
Traveling safely with smartphones 16 jun14Traveling safely with smartphones 16 jun14
Traveling safely with smartphones 16 jun14Naval OPSEC
 
Online Netiquette
Online NetiquetteOnline Netiquette
Online NetiquetteZoro18
 
Mobile device privacy and security
Mobile device privacy and securityMobile device privacy and security
Mobile device privacy and securityImran Khan
 
Mobile Device Security
Mobile Device SecurityMobile Device Security
Mobile Device SecurityTorian Group
 
Tips of Mobile Application Security
Tips of Mobile Application SecurityTips of Mobile Application Security
Tips of Mobile Application SecurityMarie Weaver
 
How to view search history on iPhone?
How to view search history on iPhone?How to view search history on iPhone?
How to view search history on iPhone?SpymasterPro1
 
10 most important cyber security tips for your users
10 most important cyber security tips for your users10 most important cyber security tips for your users
10 most important cyber security tips for your usersSimpliv LLC
 
Digital safety[1]
Digital safety[1]Digital safety[1]
Digital safety[1]sheenau
 
What Is Spyware?
What Is Spyware?What Is Spyware?
What Is Spyware?Lookout
 
Document safer online for nonprofits guide
Document safer online for nonprofits guideDocument safer online for nonprofits guide
Document safer online for nonprofits guideNguyen Xuan Quang
 

Similar to Mobile security first round (1st rank) (20)

Smartphone 7 aug14
Smartphone 7 aug14Smartphone 7 aug14
Smartphone 7 aug14
 
Smartphone Security Guide: The Easiest Way to Keep Your Phone & Data Secure
Smartphone Security Guide: The Easiest Way to Keep Your Phone & Data SecureSmartphone Security Guide: The Easiest Way to Keep Your Phone & Data Secure
Smartphone Security Guide: The Easiest Way to Keep Your Phone & Data Secure
 
Smartphone Smart Card 061013
Smartphone Smart Card 061013Smartphone Smart Card 061013
Smartphone Smart Card 061013
 
Traveling Safely with Smartphones 061614
Traveling Safely with Smartphones 061614Traveling Safely with Smartphones 061614
Traveling Safely with Smartphones 061614
 
8 steps to smartphone security for android
8 steps to smartphone security for android8 steps to smartphone security for android
8 steps to smartphone security for android
 
Smartphone_Security.pptx
Smartphone_Security.pptxSmartphone_Security.pptx
Smartphone_Security.pptx
 
Mobile Security 101
Mobile Security 101Mobile Security 101
Mobile Security 101
 
How to Keep Your Phone Safe from Hackers (1).pptx
How to Keep Your Phone Safe from Hackers (1).pptxHow to Keep Your Phone Safe from Hackers (1).pptx
How to Keep Your Phone Safe from Hackers (1).pptx
 
Traveling safely with smartphones 16 jun14
Traveling safely with smartphones 16 jun14Traveling safely with smartphones 16 jun14
Traveling safely with smartphones 16 jun14
 
Online Netiquette
Online NetiquetteOnline Netiquette
Online Netiquette
 
Mobile device privacy and security
Mobile device privacy and securityMobile device privacy and security
Mobile device privacy and security
 
Mobile Device Security
Mobile Device SecurityMobile Device Security
Mobile Device Security
 
Tips of Mobile Application Security
Tips of Mobile Application SecurityTips of Mobile Application Security
Tips of Mobile Application Security
 
How to view search history on iPhone?
How to view search history on iPhone?How to view search history on iPhone?
How to view search history on iPhone?
 
Smartphone apps
Smartphone appsSmartphone apps
Smartphone apps
 
10 most important cyber security tips for your users
10 most important cyber security tips for your users10 most important cyber security tips for your users
10 most important cyber security tips for your users
 
Digital safety[1]
Digital safety[1]Digital safety[1]
Digital safety[1]
 
What Is Spyware?
What Is Spyware?What Is Spyware?
What Is Spyware?
 
Smartphone Security Article
Smartphone Security ArticleSmartphone Security Article
Smartphone Security Article
 
Document safer online for nonprofits guide
Document safer online for nonprofits guideDocument safer online for nonprofits guide
Document safer online for nonprofits guide
 

Mobile security first round (1st rank)

  • 1. Mobile Security -:Presented By:- Himalay Ladha 1st sem. (Bachelor of Computer Application) Shree H.N.Shukla Group Of Collage Welcome
  • 2. Mobile security Tips and tricks for securing your iPhone & Android
  • 3.  What data needs to be protected, what should.??  we avoid storing on mobile devices.  What habits, settings and applications can help make your mobile devices more secure.  Settings for iPhones & Android will be discussed.
  • 4. Why worry ? • Sophos survey: –22% had lost a phone or mobile device –70% do not password protect phone • Google intelligence survey: –40% of organizations are planning to deploy mobile phone data encryption –33% are already protecting their mobile phones with encryption products and services
  • 5.  Increase mobility → Increased exposure  Easily lost or stolen device, content, identity  Susceptible to threats and attacks App-based, Web-based, SMS/Text message- based Smartphone Risk
  • 6. How To Secure your Device iPhone Android
  • 7. iPhone • Enable auto lock • Enable passcode lock • Wireless – Use WPA and WPA2 – Only use WEP as last resort – WEP better than nothing – Disable when not needed – Choose wisely what wireless you attach to – Don’t act as access point for others • Use VPN whenever possible • Take care loaning to others (kids, others) • Use native device usage restrictions • Find My iPhone / Remote data wipe
  • 8. Android • Set a screen lock password or pattern. • Turn on SIM card lock if available. • Take care docking or tethering devices. • Do not act as an access point (hotspot). • Disable Bluetooth when not in use. • Take care downloading from Market • Review application access for new apps. • Take care were you store backups of your phone. • Often androids tied to Gmail & Google accounts. with stored password
  • 9. Best Security Practices 1. Password protect Passcode protect Pass swipe protect?
  • 10. Best Security Practices Cont. 2. Install Security Software. Anti-virus and anti-malware available for mobile devices. 4. Keep your apps up-to-date. 6. Install a phone finder app. 8. Enroll in a backup program. 10. Set device to wipe contents after specified number of failed login attempts.
  • 11. Best Security Practices Cont. 7. When installing apps Take time to read the small print What information does the app require to access? Where are you downloading the app from? Is it the app store location set by default on the phone?
  • 12. Best Security Practices Cont. 8. Know where your device is at all times 10. Be mindful of how you use your device Follow same guidelines as you do for your computer Double check URLs for accuracy Don’t open suspicious links Make sure the Website is secure before giving any personal data
  • 13. 10. Limit your activities when using public WiFi 12. Your cellular network connection is more secure than WiFi 14. Check URL’s before making a purchase https:// is secure; http:// is not Best Security Practices Cont.
  • 14.  Treat as if your purse or wallet File a report with law enforcement Contact your service vendor to cancel your service and report your device missing If you have a backup/wipe program, contact your vendor to have them wipe the device NDSU email? Notify the IT Help Desk Lost Or Stolen..?
  • 15. Common Helper apps • Antivirus • Antitheft • Firewall • Lost device locator • Data scrub when lost
  • 16. 1. Password/Passcode protect your device 2. Lock your device 3. Use anti-virus software 4. Sync/back up your data 5. Install a phone finder app Key Point

Editor's Notes

  1. <number>
  2. <number>
  3. <number>
  4. <number>
  5. <number>
  6. <number>
  7. <number>
  8. <number>
  9. <number>
  10. <number>
  11. <number>
  12. <number>
  13. <number>