SlideShare a Scribd company logo
A Way to Protect yours Personal Life
1. A smartphone is a mobile phone with
highly advanced feature and fully
customize.
Connectivity (Wi-Fi, Bluetooth )
Works as Personal Computer
Advance operating system
Three Major Operating System used in Smartphone –
A. Android Operating System
Developed by Android , Inc.
Google bought android in 2005
Use Linux Kernel , java and Freeware
B. iOS ( iPhone Operation System ) –
Created and Developed by Apple , Inc.
Based on OSX , A Variant of BSD Unix Kernel
Paid OS
C. Windows Operating System –
Created and Developed by Microsoft
First Launch in Oct 2010
Paid OS
2.1 Interesting Facts about smartphone –
Mobile Phone Users are increased day by day
Security Risk Associate with Mobile phone also increase
Now a day users moving toward feature phone to
smartphone.
1. No. of smartphone user world wide
2. Smartphone Users by Country
1. No. of smartphone user world wide
1. No. of smartphone user world wide
1. No. of smartphone user world wide
1. No. of smartphone user world wide
1. No. of smartphone user world wide
1. No. of smartphone user world wide
1. No. of smartphone user world wide
Mobile phone industry is the fastest
growing industry in the world.
70% of mobile phones are manufactured
in China.
Around 80% of the world’s population has
a mobile phone.
74 % of smartphone users use their mobile
phone to help with shopping
69% of Smartphone users use their mobile
phone to making a purchase.
49% Mobile phone users mostly spend their
time on games
99% of all mobile malware is targeted at
Android users.
Spy software found Preinstall on Lenovo ,
Huawei and Xiaomi smartphone (F-secure)
India Air Force suggests to it’s employes
not to use Xiaomi Smartphone.
Attacker can performed different task by
hacked a User Smartphone
Listening the telephone conversation
Access the internet
View and copy contacts
Installing unwanted apps
Asking for location data
Taking and Coping personal image
Recording conversation using microphone
Sending and Reading SMS/MMS
Disable Antivirus Software
Listening into the chat via messaging
services ( Whatsapp ,Facebook and
Google+)
Reading browser history
Stolen your personal information
In Today world there the uses for
smartphone are increase so risk associated
with smartphone also increase day by day
So there are major security risk or threats
and their prevention are also discuss in
this presentation.
Attack
This is physical attack.
Hacker can access or misuses your secrete
data physically
Can wipe your important information
Defense
Protect your smartphone by anti-theft
protection.
Use Disk Encryption to protect your data.
Always use lock screen feature by good
Password
Attack
Creating a Fake page that look like original
page and grab the information enter by
user.
Sending the link via text/email etc.
User think it’s a real website page.
Attack ( Facebook Phishing Page )
Defense
Check Web Address URL.
Check SSL key Pad lock.
Check SSL Certificate Details.
Defense ( Facebook Original Page )
Attack
1. Attacker call to users can ask his/her
card (Credit/Debit) details.
Perform Fraud by online Transaction .
User’s Financial loss
Attack (Way to ask card Details)
Attack
2. Attacker send spam Mail or SMS to users .
About Card block or Suspicious activity.
User call to number that is given in mail/sms
The number look like real phone banking
number.
Attack (Fake Mail)
Attack (Fake SMS)
Attack
Defense
Make a Call Only Authorize phone banking
number of that bank.
Never share your card detail like (CVV , Exp.
Date , OTP & Pin ) to anyone.
Bank Never call to it’s users for card details.
Attack
Attacker build Malicious app that look like
Real app.
This App can work as –
Trojan horse (Banking or Other )
Spyware
Defense
Always download app from trusted source .
Check Digital Signature for Third Party App.
Smartphone  security
Smartphone  security
Smartphone  security
Smartphone  security
Smartphone  security

More Related Content

What's hot

Mobile Security 101
Mobile Security 101Mobile Security 101
Mobile Security 101
Lookout
 
Mobile security
Mobile securityMobile security
Mobile security
Naveen Kumar
 
Mobile protection
Mobile protection Mobile protection
Mobile protection
preetpatel72
 
Mobile security
Mobile securityMobile security
Mobile security
dilipdubey5
 
Mobile device security
Mobile device securityMobile device security
Mobile device security
Lisa Herrera
 
Mobile Device Security
Mobile Device SecurityMobile Device Security
Mobile Device Security
Nemwos
 
Mobile security
Mobile securityMobile security
Mobile security
CyberoamAcademy
 
Mobile Security
Mobile SecurityMobile Security
Mobile Security
Xavier Mertens
 
Information security awareness - 101
Information security awareness - 101Information security awareness - 101
Information security awareness - 101
mateenzero
 
Mobile security
Mobile securityMobile security
Mobile security
Mphasis
 
Network Security Threats and Solutions
Network Security Threats and SolutionsNetwork Security Threats and Solutions
Network Security Threats and SolutionsColin058
 
Cyber security
Cyber securityCyber security
Cyber security
Nimesh Gajjar
 
6 Security Tips for Using Public WiFi
6 Security Tips for Using Public WiFi6 Security Tips for Using Public WiFi
6 Security Tips for Using Public WiFi
Quick Heal Technologies Ltd.
 
Smart phone and mobile device security
Smart phone and mobile device securitySmart phone and mobile device security
Smart phone and mobile device security
CAS
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
Foram Gosai
 
introduction to cyber security
introduction to cyber securityintroduction to cyber security
introduction to cyber security
Slamet Ar Rokhim
 
Cyber security
Cyber securityCyber security
Cyber security
Manjushree Mashal
 
system Security
system Security system Security
system Security
Gaurav Mishra
 
Mobile security issues & frauds in India
Mobile security issues & frauds in IndiaMobile security issues & frauds in India
Mobile security issues & frauds in India
Yogesh Lolge
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security Awareness
Innocent Korie
 

What's hot (20)

Mobile Security 101
Mobile Security 101Mobile Security 101
Mobile Security 101
 
Mobile security
Mobile securityMobile security
Mobile security
 
Mobile protection
Mobile protection Mobile protection
Mobile protection
 
Mobile security
Mobile securityMobile security
Mobile security
 
Mobile device security
Mobile device securityMobile device security
Mobile device security
 
Mobile Device Security
Mobile Device SecurityMobile Device Security
Mobile Device Security
 
Mobile security
Mobile securityMobile security
Mobile security
 
Mobile Security
Mobile SecurityMobile Security
Mobile Security
 
Information security awareness - 101
Information security awareness - 101Information security awareness - 101
Information security awareness - 101
 
Mobile security
Mobile securityMobile security
Mobile security
 
Network Security Threats and Solutions
Network Security Threats and SolutionsNetwork Security Threats and Solutions
Network Security Threats and Solutions
 
Cyber security
Cyber securityCyber security
Cyber security
 
6 Security Tips for Using Public WiFi
6 Security Tips for Using Public WiFi6 Security Tips for Using Public WiFi
6 Security Tips for Using Public WiFi
 
Smart phone and mobile device security
Smart phone and mobile device securitySmart phone and mobile device security
Smart phone and mobile device security
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
introduction to cyber security
introduction to cyber securityintroduction to cyber security
introduction to cyber security
 
Cyber security
Cyber securityCyber security
Cyber security
 
system Security
system Security system Security
system Security
 
Mobile security issues & frauds in India
Mobile security issues & frauds in IndiaMobile security issues & frauds in India
Mobile security issues & frauds in India
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security Awareness
 

Similar to Smartphone security

Running head mobile application security1mobile application se.docx
Running head mobile application security1mobile application se.docxRunning head mobile application security1mobile application se.docx
Running head mobile application security1mobile application se.docx
todd581
 
Running head mobile application security1mobile application se.docx
Running head mobile application security1mobile application se.docxRunning head mobile application security1mobile application se.docx
Running head mobile application security1mobile application se.docx
glendar3
 
Security models of modern mobile systems
Security models of modern mobile systemsSecurity models of modern mobile systems
Security models of modern mobile systems
Divya Raval
 
Smartphone Smart Card 061013
Smartphone Smart Card 061013Smartphone Smart Card 061013
Smartphone Smart Card 061013
McAlester Army Ammunition Plant
 
Smartphones 2015
Smartphones 2015Smartphones 2015
Smartphones 2015
Sheikh Ali Asghar
 
Cybersecurity and Mobile Device Protection - Nakov at CareerShow (Sept 2019)
Cybersecurity and Mobile Device Protection - Nakov at CareerShow (Sept 2019)Cybersecurity and Mobile Device Protection - Nakov at CareerShow (Sept 2019)
Cybersecurity and Mobile Device Protection - Nakov at CareerShow (Sept 2019)
Svetlin Nakov
 
Tips and Tricks on Securing your Android Devices
Tips and Tricks on Securing your Android DevicesTips and Tricks on Securing your Android Devices
Tips and Tricks on Securing your Android Devices
Quick Heal Technologies Ltd.
 
Mobile security 8soft_final_summercamp2011
Mobile security 8soft_final_summercamp2011Mobile security 8soft_final_summercamp2011
Mobile security 8soft_final_summercamp2011Zarafa
 
Cyber security for women using mobile devices
Cyber security for women using mobile devicesCyber security for women using mobile devices
Cyber security for women using mobile devices
J A Bhavsar
 
The Consumerisation of Corporate IT
The Consumerisation of Corporate ITThe Consumerisation of Corporate IT
The Consumerisation of Corporate IT
Peter Wood
 
Smartphone Security
Smartphone SecuritySmartphone Security
Smartphone SecurityMalasta Hill
 
Smartphone 7 aug14
Smartphone 7 aug14Smartphone 7 aug14
Smartphone 7 aug14
Naval OPSEC
 
Techvorm com-android-security-issues-solutions
Techvorm com-android-security-issues-solutionsTechvorm com-android-security-issues-solutions
Techvorm com-android-security-issues-solutions
Saad Ahmad
 
CS_UNIT 2(P3).pptx
CS_UNIT 2(P3).pptxCS_UNIT 2(P3).pptx
CS_UNIT 2(P3).pptx
GaytriDhingra1
 
Absolutely no plagiarism  Topic Mobile users and d.docx
Absolutely no plagiarism  Topic  Mobile users and d.docxAbsolutely no plagiarism  Topic  Mobile users and d.docx
Absolutely no plagiarism  Topic Mobile users and d.docx
adkinspaige22
 
NETC 2012_Mobile Security for Smartphones and Tablets (pptx)
NETC 2012_Mobile Security for Smartphones and Tablets (pptx)NETC 2012_Mobile Security for Smartphones and Tablets (pptx)
NETC 2012_Mobile Security for Smartphones and Tablets (pptx)
Vince Verbeke
 
Mobile Security for Smartphones and Tablets
Mobile Security for Smartphones and TabletsMobile Security for Smartphones and Tablets
Mobile Security for Smartphones and Tablets
Vince Verbeke
 
IRJET- Android Device Attacks and Threats
IRJET-  	  Android Device Attacks and ThreatsIRJET-  	  Android Device Attacks and Threats
IRJET- Android Device Attacks and Threats
IRJET Journal
 
cellphone virus and security
cellphone virus and securitycellphone virus and security
cellphone virus and securityAkhil Kumar
 

Similar to Smartphone security (20)

Running head mobile application security1mobile application se.docx
Running head mobile application security1mobile application se.docxRunning head mobile application security1mobile application se.docx
Running head mobile application security1mobile application se.docx
 
Running head mobile application security1mobile application se.docx
Running head mobile application security1mobile application se.docxRunning head mobile application security1mobile application se.docx
Running head mobile application security1mobile application se.docx
 
Security models of modern mobile systems
Security models of modern mobile systemsSecurity models of modern mobile systems
Security models of modern mobile systems
 
Smartphone Smart Card 061013
Smartphone Smart Card 061013Smartphone Smart Card 061013
Smartphone Smart Card 061013
 
Smartphones 2015
Smartphones 2015Smartphones 2015
Smartphones 2015
 
Cybersecurity and Mobile Device Protection - Nakov at CareerShow (Sept 2019)
Cybersecurity and Mobile Device Protection - Nakov at CareerShow (Sept 2019)Cybersecurity and Mobile Device Protection - Nakov at CareerShow (Sept 2019)
Cybersecurity and Mobile Device Protection - Nakov at CareerShow (Sept 2019)
 
Tips and Tricks on Securing your Android Devices
Tips and Tricks on Securing your Android DevicesTips and Tricks on Securing your Android Devices
Tips and Tricks on Securing your Android Devices
 
Mobile security 8soft_final_summercamp2011
Mobile security 8soft_final_summercamp2011Mobile security 8soft_final_summercamp2011
Mobile security 8soft_final_summercamp2011
 
Cyber security for women using mobile devices
Cyber security for women using mobile devicesCyber security for women using mobile devices
Cyber security for women using mobile devices
 
The Consumerisation of Corporate IT
The Consumerisation of Corporate ITThe Consumerisation of Corporate IT
The Consumerisation of Corporate IT
 
Smartphone Security
Smartphone SecuritySmartphone Security
Smartphone Security
 
Smartphone 7 aug14
Smartphone 7 aug14Smartphone 7 aug14
Smartphone 7 aug14
 
Techvorm com-android-security-issues-solutions
Techvorm com-android-security-issues-solutionsTechvorm com-android-security-issues-solutions
Techvorm com-android-security-issues-solutions
 
CS_UNIT 2(P3).pptx
CS_UNIT 2(P3).pptxCS_UNIT 2(P3).pptx
CS_UNIT 2(P3).pptx
 
Cp3201 mobile security final
Cp3201 mobile security finalCp3201 mobile security final
Cp3201 mobile security final
 
Absolutely no plagiarism  Topic Mobile users and d.docx
Absolutely no plagiarism  Topic  Mobile users and d.docxAbsolutely no plagiarism  Topic  Mobile users and d.docx
Absolutely no plagiarism  Topic Mobile users and d.docx
 
NETC 2012_Mobile Security for Smartphones and Tablets (pptx)
NETC 2012_Mobile Security for Smartphones and Tablets (pptx)NETC 2012_Mobile Security for Smartphones and Tablets (pptx)
NETC 2012_Mobile Security for Smartphones and Tablets (pptx)
 
Mobile Security for Smartphones and Tablets
Mobile Security for Smartphones and TabletsMobile Security for Smartphones and Tablets
Mobile Security for Smartphones and Tablets
 
IRJET- Android Device Attacks and Threats
IRJET-  	  Android Device Attacks and ThreatsIRJET-  	  Android Device Attacks and Threats
IRJET- Android Device Attacks and Threats
 
cellphone virus and security
cellphone virus and securitycellphone virus and security
cellphone virus and security
 

Smartphone security

  • 1. A Way to Protect yours Personal Life
  • 2. 1. A smartphone is a mobile phone with highly advanced feature and fully customize. Connectivity (Wi-Fi, Bluetooth ) Works as Personal Computer Advance operating system
  • 3. Three Major Operating System used in Smartphone – A. Android Operating System Developed by Android , Inc. Google bought android in 2005 Use Linux Kernel , java and Freeware
  • 4. B. iOS ( iPhone Operation System ) – Created and Developed by Apple , Inc. Based on OSX , A Variant of BSD Unix Kernel Paid OS
  • 5. C. Windows Operating System – Created and Developed by Microsoft First Launch in Oct 2010 Paid OS
  • 6. 2.1 Interesting Facts about smartphone – Mobile Phone Users are increased day by day Security Risk Associate with Mobile phone also increase Now a day users moving toward feature phone to smartphone.
  • 7. 1. No. of smartphone user world wide
  • 8. 2. Smartphone Users by Country
  • 9. 1. No. of smartphone user world wide
  • 10. 1. No. of smartphone user world wide
  • 11. 1. No. of smartphone user world wide
  • 12. 1. No. of smartphone user world wide
  • 13. 1. No. of smartphone user world wide
  • 14. 1. No. of smartphone user world wide
  • 15. 1. No. of smartphone user world wide
  • 16. Mobile phone industry is the fastest growing industry in the world. 70% of mobile phones are manufactured in China. Around 80% of the world’s population has a mobile phone.
  • 17. 74 % of smartphone users use their mobile phone to help with shopping 69% of Smartphone users use their mobile phone to making a purchase. 49% Mobile phone users mostly spend their time on games
  • 18. 99% of all mobile malware is targeted at Android users. Spy software found Preinstall on Lenovo , Huawei and Xiaomi smartphone (F-secure) India Air Force suggests to it’s employes not to use Xiaomi Smartphone.
  • 19. Attacker can performed different task by hacked a User Smartphone Listening the telephone conversation Access the internet View and copy contacts
  • 20. Installing unwanted apps Asking for location data Taking and Coping personal image
  • 21. Recording conversation using microphone Sending and Reading SMS/MMS Disable Antivirus Software
  • 22. Listening into the chat via messaging services ( Whatsapp ,Facebook and Google+) Reading browser history Stolen your personal information
  • 23. In Today world there the uses for smartphone are increase so risk associated with smartphone also increase day by day So there are major security risk or threats and their prevention are also discuss in this presentation.
  • 24. Attack This is physical attack. Hacker can access or misuses your secrete data physically Can wipe your important information
  • 25. Defense Protect your smartphone by anti-theft protection. Use Disk Encryption to protect your data. Always use lock screen feature by good Password
  • 26. Attack Creating a Fake page that look like original page and grab the information enter by user. Sending the link via text/email etc. User think it’s a real website page.
  • 27. Attack ( Facebook Phishing Page )
  • 28. Defense Check Web Address URL. Check SSL key Pad lock. Check SSL Certificate Details.
  • 29. Defense ( Facebook Original Page )
  • 30. Attack 1. Attacker call to users can ask his/her card (Credit/Debit) details. Perform Fraud by online Transaction . User’s Financial loss
  • 31. Attack (Way to ask card Details)
  • 32. Attack 2. Attacker send spam Mail or SMS to users . About Card block or Suspicious activity. User call to number that is given in mail/sms The number look like real phone banking number.
  • 36. Defense Make a Call Only Authorize phone banking number of that bank. Never share your card detail like (CVV , Exp. Date , OTP & Pin ) to anyone. Bank Never call to it’s users for card details.
  • 37. Attack Attacker build Malicious app that look like Real app. This App can work as – Trojan horse (Banking or Other ) Spyware
  • 38. Defense Always download app from trusted source . Check Digital Signature for Third Party App.