SlideShare a Scribd company logo
1 of 17
Securing hand-held computing devices :
The cyber-security challenge of the decade

                 Jagadeesan R,
               Senior Consultant
The hand-helds have arrived
   The growth rate for the hand-held market (including
    smartphones and tablets) is leapfrogging the
    desktop/laptop market growth rate by some length
    It is estimated that around 73.5 million iPhone OS
    devices( iPhones and iPod touches) had been sold
    globally till Jan 2010
    Global iPad sales are projected by Piper Jaffray to reach
    23.3 million units in 2011 - up from an estimated 13
    million in 2010
   A large number of consumer and business
    applications are being made available for hand-
    helds
The hand-helds have arrived
•    Deutsche Bank, Bank of America, Citi, JPMC,
     Standard Chartered and UBS are all running pilots with
     BlackBerry alternatives – iPhones/ Android phones
•    Starbucks already has a mobile payment app for
     the iPhone
•    Union Bank of India to introduce mobile payments
     network including person-to-person payments
•    ICICI bank-Vodafone, SBI-Airtel, Yes Bank – Nokia
     have launched mobile payments initiatives
•    Barclaycard, Orange and T-mobile are set to launch
     the UK's first commercial contactless mobile phone
     payments system this year
But hand-held security hasn’t!
   With the exception of the tightly controlled
    Blackberry platform, Powerful handhelds are a
    recent entrant into Corporate IT
   The handheld market resembles the PC market of
    the mid 1980’s to the early 90’s
          Poor awareness of most security threats
          Dynamic market with keen competition
           between several players and platforms
          Very rapid growth – “Get it out to the retailer”
           mind-set
          Highly driven by retail consumer adoption
Typical vulnerabilities seen so
              far
•   Malware
     –   Zeus mobile trojan intercepts One-time banking
         passwords sent by certain banks by SMS; affects
         Symbian and Blackberry devices
     –   Geinimi trojan for Android can allow infected phones
         to be controlled by a remote server, tracks geo-
         location and unique device ID's
•   Backdoors
     –   Android vulnerability allows malicious website to read
         files from SD card
Typical vulnerabilities
             encountered
•   User information trails in phone memory from poor
    design
     –    Mobile financial applications(Android, iPhone) from
          USAA , Wells Fargo were found to insecurely store
          account numbers and balances in phone memory
          (subsequently fixed)
•   Cross-site scripting
     –    A cross-site scripting bug in the Android market
          allowed anyone to silently install a malicious app on
          the user's Android phone (when the user clicks on a
          link while browsing the Market on a desktop)(later
          patched)
Typical vulnerabilities
             encountered
•   Signal interception
     –    Bluetooth hacks can help make calls on
          hacked phone, read/send SMS, access contact lists,
          tap phones, divert incoming calls, surf web
     –    Rogue base stations can be used to tap phones
•   Poor privacy controls
     –    There is a suit filed in court alleging that Apple and
          other app creators have been passing along user's
          personal information by tracking Unique device
          ID's/geo location without getting prior consent
Mobile device platforms - How
     do they compare?
•   For BlackBerry, Apple and Windows Phone platforms,
    apps have to pass review before being made available
    for download; This blunts some of the attack points
•   Android allows apps to be distributed through websites
    directly on the Market; This opens up more attack
    points for malware bundled into apps - to exploit
    vulnerabilities
     –   Google recently applied a master kill-switch( for the
         first time) to clean up more than 50 virus-infected
         apps from individual Android phones
Mobile device platforms - How
     do they compare?
• Google is taking the tack that more open-ness will lead to
  a more dynamic and secure Android platform in the long
  run
• However currently, there are broken links in the software
  update chain(unlike the desktop market)
• Here, there is a dependency on telecom carriers which
  typically do not push OS patches fast enough on to
  smartphones
  -   There will be a significant amount of pain in stabilizing
      Android as a secure platform
Prominent mobile security-
related products in the market
Authentication
•   RSA Secure ID 2.2 for Symbian OS and UIQ
Encryption and authentication
•   Checkpoint's Pointsec
Comprehensive cloud-scanned web-security
•   Zscaler mobile
Data-loss Prevention
•   WebSense Mobile DLP
Prominent mobile security-
related products in the market
Anti-virus
•   NetQin Mobile Anti-virus
•   CA's eTrust anti-virus software for Palm, Windows
    Mobile
Anti-virus and Anti-theft
•   McAfee WaveSecure + VirusScan
        remote lock
        GPS tracking
        remote wipe
        malware scanning
Prominent mobile security-
related products in the market
Anti-virus and Anti-theft
• Kaspersky Mobile Security 9
   –   Mobile filtering
   –   Anti-theft features(use of Phone's GPS to track
       location, Remote data-wipe/block/lock, SIM Watch) ;
       SMS find shows missing device's location on
       GoogleMaps using GPS data
   –   Encryption, Parental controls
   –   Anti-virus, Firewall Privacy protection
   –   Supports Symbian OX 9.1 and higher, Windows
       Mobile 5.0 to 6.5, BlackBerry 4.5 to 6.0 and Android
       1.6 to 2.2
In summary….
• Blackberry continues to be the most secure platform for
  Corporate IT, followed by the iPhone/iPad
• Android is likely to catch-up in the long term with it’s open
  philosophy; not at the top for security in the short term
  though - Timely pushing of patches to devices is a major
  concern.
• Windows Phone is a clear laggard even with an early
  start and a recent deal with Nokia
• Very sophisticated security applications are becoming
  available in the marketplace
• An extraordinary range of powerful functionality is
  available on these handhelds -> More power for mischief
  in the age of “Information anywhere”
Citations
•   http://gigaom.com/apple/ipod-touch-now-outselling-
    iphone/
•   http://www.mobile-tech-
    today.com/story.xhtml?story_title=Apple_May_Boost_i
    Pad_Production_To_6M_Per_Month&story_id=10100
    CJ4GFWG
•   http://www.finextra.com/News/fullstory.aspx?newsitemi
    d=22199
•   http://www.finextra.com/community/fullblog.aspx?ID=4
    933
•   http://www.finextra.com/News/Fullstory.aspx?newsitem
    id=22207
Citations
•   http://www.finextra.com/News/fullstory.aspx?newsitemi
    d=21982
•   http://spotlight.getnetwise.org/wireless/wirelessguide.p
    df
•   http://www.ameinfo.com/56628.html


•   http://www.eweek.com/c/a/Security/From-Android-to-
    the-iPhone-Security-Vendors-Target-Mobile-Devices-
    198446/
•   http://www.eweek.com/c/a/Security/Kaspersky-Adds-
    Android-BlackBerry-OS-Support-to-Mobile-Security-
    Suite-200955/
Citations
•   http://www.eweek.com/c/a/Security/Zeus-Trojan-
    Mobile-Variant-Intercepts-SMS-Passcodes-from-Bank-
    Sites-480154/
•   http://thomascannon.net/blog/2010/11/android-data-
    stealing-vulnerability/
•   http://www.netqin.com/en/security/newsinfo_3897_2.ht
    ml
•   http://www.gizmag.com/researcher-demonstrates-
    vulnerabilities-of-mobile-phones/17366/
•   http://www.veracode.com/images/pdf/the-challenges-
    of-developing-secure-mobile-applications1.pdf
Citations
•   http://viaforensics.com/appwatchdog/viaforensics-
    uncovers-vulnerabilities-smart-phone-financial-
    applications.html
•   http://jon.oberheide.org/blog/2011/03/07/how-i-
    almost-won-pwn2own-via-xss/

More Related Content

What's hot

Security in Cyber-Physical Systems
Security in Cyber-Physical SystemsSecurity in Cyber-Physical Systems
Security in Cyber-Physical SystemsBob Marcus
 
02 Types of Computer Forensics Technology - Notes
02 Types of Computer Forensics Technology - Notes02 Types of Computer Forensics Technology - Notes
02 Types of Computer Forensics Technology - NotesKranthi
 
Mobile Software Engineering (at University of Cambridge Wednesday Seminars)
Mobile Software Engineering (at University of Cambridge Wednesday Seminars)Mobile Software Engineering (at University of Cambridge Wednesday Seminars)
Mobile Software Engineering (at University of Cambridge Wednesday Seminars)3scale.net
 
Grid computing standards
Grid computing standardsGrid computing standards
Grid computing standardsPooja Dixit
 
Security models
Security models Security models
Security models LJ PROJECTS
 
Unit 1 architecture of distributed systems
Unit 1 architecture of distributed systemsUnit 1 architecture of distributed systems
Unit 1 architecture of distributed systemskaran2190
 
Introduction to Virtualization
Introduction to VirtualizationIntroduction to Virtualization
Introduction to VirtualizationRahul Hada
 
S/MIME & E-mail Security (Network Security)
S/MIME & E-mail Security (Network Security)S/MIME & E-mail Security (Network Security)
S/MIME & E-mail Security (Network Security)Prafull Johri
 
Cia security model
Cia security modelCia security model
Cia security modelImran Ahmed
 
Operating system security
Operating system securityOperating system security
Operating system securitySarmad Makhdoom
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentationAmandeep Kaur
 

What's hot (20)

Linux forensics
Linux forensicsLinux forensics
Linux forensics
 
Email security
Email securityEmail security
Email security
 
Firewall
Firewall Firewall
Firewall
 
Firewall Basing
Firewall BasingFirewall Basing
Firewall Basing
 
Security in Cyber-Physical Systems
Security in Cyber-Physical SystemsSecurity in Cyber-Physical Systems
Security in Cyber-Physical Systems
 
02 Types of Computer Forensics Technology - Notes
02 Types of Computer Forensics Technology - Notes02 Types of Computer Forensics Technology - Notes
02 Types of Computer Forensics Technology - Notes
 
Mobile Software Engineering (at University of Cambridge Wednesday Seminars)
Mobile Software Engineering (at University of Cambridge Wednesday Seminars)Mobile Software Engineering (at University of Cambridge Wednesday Seminars)
Mobile Software Engineering (at University of Cambridge Wednesday Seminars)
 
Pgp
PgpPgp
Pgp
 
IOT Security
IOT SecurityIOT Security
IOT Security
 
Grid computing standards
Grid computing standardsGrid computing standards
Grid computing standards
 
Security models
Security models Security models
Security models
 
Unit 1 architecture of distributed systems
Unit 1 architecture of distributed systemsUnit 1 architecture of distributed systems
Unit 1 architecture of distributed systems
 
Introduction to Virtualization
Introduction to VirtualizationIntroduction to Virtualization
Introduction to Virtualization
 
S/MIME & E-mail Security (Network Security)
S/MIME & E-mail Security (Network Security)S/MIME & E-mail Security (Network Security)
S/MIME & E-mail Security (Network Security)
 
Cia security model
Cia security modelCia security model
Cia security model
 
Operating system security
Operating system securityOperating system security
Operating system security
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Fault tolerance
Fault toleranceFault tolerance
Fault tolerance
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
 
Firewall
FirewallFirewall
Firewall
 

Similar to Securing hand held computing devices

ISACA CACS 2012 - Mobile Device Security and Privacy
ISACA CACS 2012 - Mobile Device Security and PrivacyISACA CACS 2012 - Mobile Device Security and Privacy
ISACA CACS 2012 - Mobile Device Security and PrivacyMichael Davis
 
NETC 2012_Mobile Security for Smartphones and Tablets (pptx)
NETC 2012_Mobile Security for Smartphones and Tablets (pptx)NETC 2012_Mobile Security for Smartphones and Tablets (pptx)
NETC 2012_Mobile Security for Smartphones and Tablets (pptx)Vince Verbeke
 
Mobile Security for Smartphones and Tablets
Mobile Security for Smartphones and TabletsMobile Security for Smartphones and Tablets
Mobile Security for Smartphones and TabletsVince Verbeke
 
Securing 3-Mode Mobile Banking
Securing 3-Mode Mobile BankingSecuring 3-Mode Mobile Banking
Securing 3-Mode Mobile BankingJay McLaughlin
 
Can You Steal From Me Now? Mobile and BYOD Security Risks
Can You Steal From Me Now? Mobile and BYOD Security RisksCan You Steal From Me Now? Mobile and BYOD Security Risks
Can You Steal From Me Now? Mobile and BYOD Security RisksMichael Davis
 
Lumension Security - Adjusting our defenses for 2012
Lumension Security - Adjusting our defenses for 2012Lumension Security - Adjusting our defenses for 2012
Lumension Security - Adjusting our defenses for 2012Andris Soroka
 
Mobility, Security and the Enterprise: The Equation to Solve
Mobility, Security and the Enterprise: The Equation to SolveMobility, Security and the Enterprise: The Equation to Solve
Mobility, Security and the Enterprise: The Equation to SolveIcomm Technologies
 
Shmoocon 2010 - The Monkey Steals the Berries
Shmoocon 2010 - The Monkey Steals the BerriesShmoocon 2010 - The Monkey Steals the Berries
Shmoocon 2010 - The Monkey Steals the BerriesTyler Shields
 
Mobile Commerce: A Security Perspective
Mobile Commerce: A Security PerspectiveMobile Commerce: A Security Perspective
Mobile Commerce: A Security PerspectivePragati Rai
 
551_MH_overview_handout.ppt
551_MH_overview_handout.ppt551_MH_overview_handout.ppt
551_MH_overview_handout.pptNiloyMondal10
 
C0c0n 2011 mobile security presentation v1.2
C0c0n 2011 mobile  security presentation v1.2C0c0n 2011 mobile  security presentation v1.2
C0c0n 2011 mobile security presentation v1.2Santosh Satam
 
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?Do New Mobile Devices in Enterprises Pose A Serious Security Threat?
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?acijjournal
 
CNIT 128 Ch 1: The mobile risk ecosystem
CNIT 128 Ch 1: The mobile risk ecosystemCNIT 128 Ch 1: The mobile risk ecosystem
CNIT 128 Ch 1: The mobile risk ecosystemSam Bowne
 
Third Annual Mobile Threats Report
Third Annual Mobile Threats ReportThird Annual Mobile Threats Report
Third Annual Mobile Threats ReportJuniper Networks
 
Cybercrime Mobile and Wireless Devices.pptx
Cybercrime Mobile and  Wireless Devices.pptxCybercrime Mobile and  Wireless Devices.pptx
Cybercrime Mobile and Wireless Devices.pptxVivekanandaGN1
 

Similar to Securing hand held computing devices (20)

ISACA CACS 2012 - Mobile Device Security and Privacy
ISACA CACS 2012 - Mobile Device Security and PrivacyISACA CACS 2012 - Mobile Device Security and Privacy
ISACA CACS 2012 - Mobile Device Security and Privacy
 
NETC 2012_Mobile Security for Smartphones and Tablets (pptx)
NETC 2012_Mobile Security for Smartphones and Tablets (pptx)NETC 2012_Mobile Security for Smartphones and Tablets (pptx)
NETC 2012_Mobile Security for Smartphones and Tablets (pptx)
 
Mobile Security for Smartphones and Tablets
Mobile Security for Smartphones and TabletsMobile Security for Smartphones and Tablets
Mobile Security for Smartphones and Tablets
 
Smartphones 2015
Smartphones 2015Smartphones 2015
Smartphones 2015
 
Unit-3.pptx
Unit-3.pptxUnit-3.pptx
Unit-3.pptx
 
Securing 3-Mode Mobile Banking
Securing 3-Mode Mobile BankingSecuring 3-Mode Mobile Banking
Securing 3-Mode Mobile Banking
 
SMART PHONE
SMART PHONE SMART PHONE
SMART PHONE
 
Can You Steal From Me Now? Mobile and BYOD Security Risks
Can You Steal From Me Now? Mobile and BYOD Security RisksCan You Steal From Me Now? Mobile and BYOD Security Risks
Can You Steal From Me Now? Mobile and BYOD Security Risks
 
Lumension Security - Adjusting our defenses for 2012
Lumension Security - Adjusting our defenses for 2012Lumension Security - Adjusting our defenses for 2012
Lumension Security - Adjusting our defenses for 2012
 
Mobility, Security and the Enterprise: The Equation to Solve
Mobility, Security and the Enterprise: The Equation to SolveMobility, Security and the Enterprise: The Equation to Solve
Mobility, Security and the Enterprise: The Equation to Solve
 
Shmoocon 2010 - The Monkey Steals the Berries
Shmoocon 2010 - The Monkey Steals the BerriesShmoocon 2010 - The Monkey Steals the Berries
Shmoocon 2010 - The Monkey Steals the Berries
 
ANDROID SECURITY
ANDROID SECURITYANDROID SECURITY
ANDROID SECURITY
 
Mobile Commerce: A Security Perspective
Mobile Commerce: A Security PerspectiveMobile Commerce: A Security Perspective
Mobile Commerce: A Security Perspective
 
551_MH_overview_handout.ppt
551_MH_overview_handout.ppt551_MH_overview_handout.ppt
551_MH_overview_handout.ppt
 
C0c0n 2011 mobile security presentation v1.2
C0c0n 2011 mobile  security presentation v1.2C0c0n 2011 mobile  security presentation v1.2
C0c0n 2011 mobile security presentation v1.2
 
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?Do New Mobile Devices in Enterprises Pose A Serious Security Threat?
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?
 
CS_UNIT 2(P3).pptx
CS_UNIT 2(P3).pptxCS_UNIT 2(P3).pptx
CS_UNIT 2(P3).pptx
 
CNIT 128 Ch 1: The mobile risk ecosystem
CNIT 128 Ch 1: The mobile risk ecosystemCNIT 128 Ch 1: The mobile risk ecosystem
CNIT 128 Ch 1: The mobile risk ecosystem
 
Third Annual Mobile Threats Report
Third Annual Mobile Threats ReportThird Annual Mobile Threats Report
Third Annual Mobile Threats Report
 
Cybercrime Mobile and Wireless Devices.pptx
Cybercrime Mobile and  Wireless Devices.pptxCybercrime Mobile and  Wireless Devices.pptx
Cybercrime Mobile and Wireless Devices.pptx
 

Recently uploaded

CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetEnjoy Anytime
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 

Recently uploaded (20)

CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 

Securing hand held computing devices

  • 1. Securing hand-held computing devices : The cyber-security challenge of the decade Jagadeesan R, Senior Consultant
  • 2. The hand-helds have arrived  The growth rate for the hand-held market (including smartphones and tablets) is leapfrogging the desktop/laptop market growth rate by some length It is estimated that around 73.5 million iPhone OS devices( iPhones and iPod touches) had been sold globally till Jan 2010 Global iPad sales are projected by Piper Jaffray to reach 23.3 million units in 2011 - up from an estimated 13 million in 2010  A large number of consumer and business applications are being made available for hand- helds
  • 3. The hand-helds have arrived • Deutsche Bank, Bank of America, Citi, JPMC, Standard Chartered and UBS are all running pilots with BlackBerry alternatives – iPhones/ Android phones • Starbucks already has a mobile payment app for the iPhone • Union Bank of India to introduce mobile payments network including person-to-person payments • ICICI bank-Vodafone, SBI-Airtel, Yes Bank – Nokia have launched mobile payments initiatives • Barclaycard, Orange and T-mobile are set to launch the UK's first commercial contactless mobile phone payments system this year
  • 4. But hand-held security hasn’t!  With the exception of the tightly controlled Blackberry platform, Powerful handhelds are a recent entrant into Corporate IT  The handheld market resembles the PC market of the mid 1980’s to the early 90’s  Poor awareness of most security threats  Dynamic market with keen competition between several players and platforms  Very rapid growth – “Get it out to the retailer” mind-set  Highly driven by retail consumer adoption
  • 5. Typical vulnerabilities seen so far • Malware – Zeus mobile trojan intercepts One-time banking passwords sent by certain banks by SMS; affects Symbian and Blackberry devices – Geinimi trojan for Android can allow infected phones to be controlled by a remote server, tracks geo- location and unique device ID's • Backdoors – Android vulnerability allows malicious website to read files from SD card
  • 6. Typical vulnerabilities encountered • User information trails in phone memory from poor design – Mobile financial applications(Android, iPhone) from USAA , Wells Fargo were found to insecurely store account numbers and balances in phone memory (subsequently fixed) • Cross-site scripting – A cross-site scripting bug in the Android market allowed anyone to silently install a malicious app on the user's Android phone (when the user clicks on a link while browsing the Market on a desktop)(later patched)
  • 7. Typical vulnerabilities encountered • Signal interception – Bluetooth hacks can help make calls on hacked phone, read/send SMS, access contact lists, tap phones, divert incoming calls, surf web – Rogue base stations can be used to tap phones • Poor privacy controls – There is a suit filed in court alleging that Apple and other app creators have been passing along user's personal information by tracking Unique device ID's/geo location without getting prior consent
  • 8. Mobile device platforms - How do they compare? • For BlackBerry, Apple and Windows Phone platforms, apps have to pass review before being made available for download; This blunts some of the attack points • Android allows apps to be distributed through websites directly on the Market; This opens up more attack points for malware bundled into apps - to exploit vulnerabilities – Google recently applied a master kill-switch( for the first time) to clean up more than 50 virus-infected apps from individual Android phones
  • 9. Mobile device platforms - How do they compare? • Google is taking the tack that more open-ness will lead to a more dynamic and secure Android platform in the long run • However currently, there are broken links in the software update chain(unlike the desktop market) • Here, there is a dependency on telecom carriers which typically do not push OS patches fast enough on to smartphones - There will be a significant amount of pain in stabilizing Android as a secure platform
  • 10. Prominent mobile security- related products in the market Authentication • RSA Secure ID 2.2 for Symbian OS and UIQ Encryption and authentication • Checkpoint's Pointsec Comprehensive cloud-scanned web-security • Zscaler mobile Data-loss Prevention • WebSense Mobile DLP
  • 11. Prominent mobile security- related products in the market Anti-virus • NetQin Mobile Anti-virus • CA's eTrust anti-virus software for Palm, Windows Mobile Anti-virus and Anti-theft • McAfee WaveSecure + VirusScan remote lock GPS tracking remote wipe malware scanning
  • 12. Prominent mobile security- related products in the market Anti-virus and Anti-theft • Kaspersky Mobile Security 9 – Mobile filtering – Anti-theft features(use of Phone's GPS to track location, Remote data-wipe/block/lock, SIM Watch) ; SMS find shows missing device's location on GoogleMaps using GPS data – Encryption, Parental controls – Anti-virus, Firewall Privacy protection – Supports Symbian OX 9.1 and higher, Windows Mobile 5.0 to 6.5, BlackBerry 4.5 to 6.0 and Android 1.6 to 2.2
  • 13. In summary…. • Blackberry continues to be the most secure platform for Corporate IT, followed by the iPhone/iPad • Android is likely to catch-up in the long term with it’s open philosophy; not at the top for security in the short term though - Timely pushing of patches to devices is a major concern. • Windows Phone is a clear laggard even with an early start and a recent deal with Nokia • Very sophisticated security applications are becoming available in the marketplace • An extraordinary range of powerful functionality is available on these handhelds -> More power for mischief in the age of “Information anywhere”
  • 14. Citations • http://gigaom.com/apple/ipod-touch-now-outselling- iphone/ • http://www.mobile-tech- today.com/story.xhtml?story_title=Apple_May_Boost_i Pad_Production_To_6M_Per_Month&story_id=10100 CJ4GFWG • http://www.finextra.com/News/fullstory.aspx?newsitemi d=22199 • http://www.finextra.com/community/fullblog.aspx?ID=4 933 • http://www.finextra.com/News/Fullstory.aspx?newsitem id=22207
  • 15. Citations • http://www.finextra.com/News/fullstory.aspx?newsitemi d=21982 • http://spotlight.getnetwise.org/wireless/wirelessguide.p df • http://www.ameinfo.com/56628.html • http://www.eweek.com/c/a/Security/From-Android-to- the-iPhone-Security-Vendors-Target-Mobile-Devices- 198446/ • http://www.eweek.com/c/a/Security/Kaspersky-Adds- Android-BlackBerry-OS-Support-to-Mobile-Security- Suite-200955/
  • 16. Citations • http://www.eweek.com/c/a/Security/Zeus-Trojan- Mobile-Variant-Intercepts-SMS-Passcodes-from-Bank- Sites-480154/ • http://thomascannon.net/blog/2010/11/android-data- stealing-vulnerability/ • http://www.netqin.com/en/security/newsinfo_3897_2.ht ml • http://www.gizmag.com/researcher-demonstrates- vulnerabilities-of-mobile-phones/17366/ • http://www.veracode.com/images/pdf/the-challenges- of-developing-secure-mobile-applications1.pdf
  • 17. Citations • http://viaforensics.com/appwatchdog/viaforensics- uncovers-vulnerabilities-smart-phone-financial- applications.html • http://jon.oberheide.org/blog/2011/03/07/how-i- almost-won-pwn2own-via-xss/