MOBILE
SECURITY
Prof. Hemani Shah
CONTENT
Introduction
MARS
1
Introduction
6
Conclusion
5
Tips to
Stay Safe
3
Types of
Mobile
Security
2
Security
Issue
4
Mobile
Threats
INTRODUCTION
❏ Mobile Device Security refers to the measures designed to protect sensitive
information stored on and transmitted by laptops, smartphones, tablets,
wearables, and other portable devices.
❏ The goal of mobile security device is keeping unauthorized user from accessing
enterprise network.
❏ Mobile security provides data backup, Application control, security policy
enforcement etc.
❏ Mobile security works based on multilayer approach like password protection,
leverage biometric, avoid public wi-fi, Beware of Apps, Mobile device
encryption.
SECURITY ISSUES
SMS
IMEI no
Physical
Security
Voice
Security
Issues With
Mobile Phone
MOBILE THREATS
❏ Application Based Threats
- Downloadable applications can present many types of security issues for mobile
devices. It fit into below categories:
1. Malware 3. Privacy thefts
2.Spyware 4.Vulnerable application
❏ Web based Threats
- Because mobile devices are constantly connected to the Internet and frequently
used to access web-based services, web-based threats pose persistent issues for
mobile devices:
1.Phishing Scams,
2.Drive by downloads
3. Browser exploits
MOBILE THREATS
❏ Network Threats
- Mobile devices typically support cellular networks as well as local wireless networks
(WiFi, Bluetooth). Both of these types of networks can host different classes of
threats:
1. Network exploits
2.Wifi sniffing
❏ Physical threat
- Lost or Stolen Devices are one of the most prevalent mobile threats. The mobile
device is valuable not only because the hardware itself can be resold on the black
market, but more importantly because of the sensitive personal and organization
information it may contain.
MOBILE SECURITY THREATS
Poor
Password
Security
Data Leaks
Out of Date
Devices
Phishing
Attacks
Identity
Theft
Malicious
Apps and
website
EXAMPLE
1. 4.
2.
3. 5.
Don’t click on
random
websites
-Don’t click on
website
without
checking
privacy policy
TIPS TO SAFE USE
Set a Password
-Never use
same password
twice
-Checking
password
strength
Don’t share UPI
pin
If someone
knows your
UPIN than
they can easily
access to
transfer money
Be Alert
-Unusual
behaviour on your
phone like -
decreased battery
life,
-automatic open of
apps etc..
CONCLUSION
❏ Mobiles are very important gadget for communication in the modern world
and mobile security related cyber crime increasing day by day so for
awareness for the proper security of mobile people needs to know about how
to safe device from malicious activities and application.
❏ Mobile devices do pose some threat to the world.There are steps that can be
taken to secure the devices. People can be trained and educated on mobile
security to help understand the risks involved.
❏ By sharing our knowledge of mobile security we can share tips for how to use
mobile device safely in this modern world.
Name Enrolment Number
Patel Kaksha 190130107091
Patel Pritesh 190130107100
Patel Riddhi 190130107103
Patel Shreya 190130107107
PRESENTED BY
THANK YOU !

MOBILE SECURITY.pptx

  • 1.
  • 2.
  • 3.
    INTRODUCTION ❏ Mobile DeviceSecurity refers to the measures designed to protect sensitive information stored on and transmitted by laptops, smartphones, tablets, wearables, and other portable devices. ❏ The goal of mobile security device is keeping unauthorized user from accessing enterprise network. ❏ Mobile security provides data backup, Application control, security policy enforcement etc. ❏ Mobile security works based on multilayer approach like password protection, leverage biometric, avoid public wi-fi, Beware of Apps, Mobile device encryption.
  • 4.
  • 5.
    MOBILE THREATS ❏ ApplicationBased Threats - Downloadable applications can present many types of security issues for mobile devices. It fit into below categories: 1. Malware 3. Privacy thefts 2.Spyware 4.Vulnerable application ❏ Web based Threats - Because mobile devices are constantly connected to the Internet and frequently used to access web-based services, web-based threats pose persistent issues for mobile devices: 1.Phishing Scams, 2.Drive by downloads 3. Browser exploits
  • 6.
    MOBILE THREATS ❏ NetworkThreats - Mobile devices typically support cellular networks as well as local wireless networks (WiFi, Bluetooth). Both of these types of networks can host different classes of threats: 1. Network exploits 2.Wifi sniffing ❏ Physical threat - Lost or Stolen Devices are one of the most prevalent mobile threats. The mobile device is valuable not only because the hardware itself can be resold on the black market, but more importantly because of the sensitive personal and organization information it may contain.
  • 7.
    MOBILE SECURITY THREATS Poor Password Security DataLeaks Out of Date Devices Phishing Attacks Identity Theft Malicious Apps and website
  • 8.
  • 9.
    Don’t click on random websites -Don’tclick on website without checking privacy policy TIPS TO SAFE USE Set a Password -Never use same password twice -Checking password strength Don’t share UPI pin If someone knows your UPIN than they can easily access to transfer money Be Alert -Unusual behaviour on your phone like - decreased battery life, -automatic open of apps etc..
  • 10.
    CONCLUSION ❏ Mobiles arevery important gadget for communication in the modern world and mobile security related cyber crime increasing day by day so for awareness for the proper security of mobile people needs to know about how to safe device from malicious activities and application. ❏ Mobile devices do pose some threat to the world.There are steps that can be taken to secure the devices. People can be trained and educated on mobile security to help understand the risks involved. ❏ By sharing our knowledge of mobile security we can share tips for how to use mobile device safely in this modern world.
  • 11.
    Name Enrolment Number PatelKaksha 190130107091 Patel Pritesh 190130107100 Patel Riddhi 190130107103 Patel Shreya 190130107107 PRESENTED BY
  • 12.