SlideShare uma empresa Scribd logo
1 de 26
Baixar para ler offline
Smartphones Security
IT-Sicherheit
Hochschule für Technik, Wirtschaft und
Kultur Leipzig
Why is Smartphones Security
Important?
Our smartphones are more than our wallets,
because they can store:
● credit cards number
● contacts
● email accounts
● websites passwords
● et cetera
Too Many Features
Which features can be dangerous?
and
Which features can help users to increase their
security and privacy?
Bluetooth
Vulnerable to:
● BlueBug, bug with which is possible: make a copy of
contacts; listen calls; send and read SMS
messages and force connection to Internet
● BlueSmack, denial of service attack
● Eavesdropping
● Man in the middle
● ...
How Use Bluetooth Safely
For improve our security using Bluetooth we can:
● choose PIN codes that are long and not trivial,
● avoid pairing between Bluetooth devices in
crowded places,
● disable it or use in hidden mode to increase
the time of a possible attack.
Near Field Communication
● Set of standards for radio communication
between close devices
● No protection against eavesdropping
● Vulnerable to data modifications
Applications that use NFC should encrypt the
comunications!
Services for Remote Control
Some services for remote control that we can
find in our devices are:
– Secure Shell
– File Transert Protocol
– Package Manager
All these services are possible points of access
to our devices.
How can the average user disable them?
Summarizing we can say that we
should use an approach of
"Principle of Least Privilege"
enabling a feature only when needed
Which Features Users Should Use
● Screen Lock
● Data Encryption
● Remote Wipe Service
● Antivirus
● Two-factor
Authentication
Install an Antivirus
Mobile malware attacks are on the rise, this because smartphones
offer easy and fast ways for make profits:
● mobile payments
● directly charging on the phone bill of the device's owner
A 40% of modern smartphones don't have antivirus because users
think that they don't need one.
Some antivirus also offer tracking and remote wipe services, thus
providing three important functions with a single application.
Use the Two-factor Authentication
Two-factor authentication (TFA) is an authentication
which requires the presentation of two of the three
authentication factors: “something the user knows”,
“something the user has” and “something the user is”.
Something the user has: its smartphone
The user receives an SMS with an extra code or the
code is generated by a dedicated application.
How keep smartphones and privacy
more safe?
● Remember that it's not “Just a Phone”
● Say yes to updates
● Understand allowed permissions
● Don't download Apps from untrusted sources
● Keep strong password and don't be lazy
● Be careful free Wi-Fi
Be careful with free Wi-Fi
In free Wi-Fi networks lots of plain text is
exchanged and a big part of most popular
websites do not offer an encrypted connection
Published Date: January 14, 2013 on www.trustworthyinternet.org
Be careful with free Wi-Fi
Some websites use an encrypted connection
only for login
They are vulnerable to "Session
Hijacking"
Solutions for free Wi-Fi
● Use secure channels:
– HTTPS for surfing web sites;
– SSL when using applications that access the
Internet such as a mail client.
● Use a Virtual Private Network or a tunnel SSH
● Do not use free Wi-Fi
Which Measures Smartphones
Manufacturers and Software
Developers Should Take?
We will see solutions from the project phase of
hardware and software to the phase after the
sale of the device.
Opportunity to Create Different User
Profiles
Create a profile
just for children
Separate and secure work and
personal informations
Provide Long Term Support
● Provide long term support with updates is
extremely important for keep devices safe.
● Is possible find devices for sale with a version
of the OS no more supported.
● Most users don't know how to upgrade the OS
● Manufacturers want that users buy another
phone as soon as possible.
Android' situation
More than 60% have a version
released before the October 2011
Improve security on App Stores
● Check authors' identity
● Run a new application, checking for malicious and
hidden behaviors
● Use restricted policies against spam and fake apps
● Deny applications that download others applications
● Offer a payment system for purchases that
guarantees users and sellers
Separate Running Programs
Separate Running Programs
This prevents that any compromised app will
have access to not allowed lower system levels,
including:
● reading or writing the user's private data (like
contacts or emails)
● reading or writing another application's files
● performing network access
● et cetera
Implement Protocols Correctly.
Developers should make attention when use
third party libraries such as OpenSSL or JSSE.
Some implementations perform the SSL
certificate validation incorrectly or not at all.
Insecure against man in the middle
Chain of trust
A chain of trust is made by validating each
component of hardware and software from the
bottom up.
Only signed
software can be
booted.
Conclusion
Like for computers, smartphones security is a
process that involves manufactures, developers
and users.
This is why, is not enought that devices and
softwares are safe and poka-yoke (“idiot
proofing”) but we also have to hope that in a
future users will be aware.

Mais conteúdo relacionado

Mais procurados

Mobile security in Cyber Security
Mobile security in Cyber SecurityMobile security in Cyber Security
Mobile security in Cyber SecurityGeo Marian
 
OWASP Mobile Security: Top 10 Risks for 2017
OWASP Mobile Security: Top 10 Risks for 2017OWASP Mobile Security: Top 10 Risks for 2017
OWASP Mobile Security: Top 10 Risks for 2017TecsyntSolutions
 
Two factor authentication 2018
Two factor authentication 2018Two factor authentication 2018
Two factor authentication 2018Will Adams
 
this is test for today
this is test for todaythis is test for today
this is test for todayDreamMalar
 
3 reasons your business can't ignore Two-Factor Authentication
3 reasons your business can't ignore Two-Factor Authentication3 reasons your business can't ignore Two-Factor Authentication
3 reasons your business can't ignore Two-Factor AuthenticationFortytwo
 
Avoiding Two-factor Authentication? You're Not Alone
Avoiding Two-factor Authentication? You're Not AloneAvoiding Two-factor Authentication? You're Not Alone
Avoiding Two-factor Authentication? You're Not AlonePortalGuard
 
Two Factor Authentication: Easy Setup, Major Impact
Two Factor Authentication: Easy Setup, Major ImpactTwo Factor Authentication: Easy Setup, Major Impact
Two Factor Authentication: Easy Setup, Major ImpactSalesforce Admins
 
Two factor authentication
Two factor authenticationTwo factor authentication
Two factor authenticationHai Nguyen
 
Securing sensitive accounts with MFA and Behavioral Biometrics
Securing sensitive accounts with MFA and Behavioral BiometricsSecuring sensitive accounts with MFA and Behavioral Biometrics
Securing sensitive accounts with MFA and Behavioral BiometricsDefCamp
 
Combat the Latest Two-Factor Authentication Evasion Techniques
Combat the Latest Two-Factor Authentication Evasion TechniquesCombat the Latest Two-Factor Authentication Evasion Techniques
Combat the Latest Two-Factor Authentication Evasion TechniquesIBM Security
 
101 Internet Security Tips Slideshow - Know How To Protect Your Computer Online!
101 Internet Security Tips Slideshow - Know How To Protect Your Computer Online!101 Internet Security Tips Slideshow - Know How To Protect Your Computer Online!
101 Internet Security Tips Slideshow - Know How To Protect Your Computer Online!EMBplc.com
 
Two factor authentication presentation mcit
Two factor authentication presentation mcitTwo factor authentication presentation mcit
Two factor authentication presentation mcitmmubashirkhan
 
Adding Two Factor Authentication to your App with Authy
Adding Two Factor Authentication to your App with AuthyAdding Two Factor Authentication to your App with Authy
Adding Two Factor Authentication to your App with AuthyNick Malcolm
 

Mais procurados (20)

Mobile security in Cyber Security
Mobile security in Cyber SecurityMobile security in Cyber Security
Mobile security in Cyber Security
 
OWASP Mobile Security: Top 10 Risks for 2017
OWASP Mobile Security: Top 10 Risks for 2017OWASP Mobile Security: Top 10 Risks for 2017
OWASP Mobile Security: Top 10 Risks for 2017
 
Two factor authentication 2018
Two factor authentication 2018Two factor authentication 2018
Two factor authentication 2018
 
this is test for today
this is test for todaythis is test for today
this is test for today
 
3 reasons your business can't ignore Two-Factor Authentication
3 reasons your business can't ignore Two-Factor Authentication3 reasons your business can't ignore Two-Factor Authentication
3 reasons your business can't ignore Two-Factor Authentication
 
Dos and Don'ts of Internet Security
Dos and Don'ts of Internet SecurityDos and Don'ts of Internet Security
Dos and Don'ts of Internet Security
 
Avoiding Two-factor Authentication? You're Not Alone
Avoiding Two-factor Authentication? You're Not AloneAvoiding Two-factor Authentication? You're Not Alone
Avoiding Two-factor Authentication? You're Not Alone
 
Smartphone security issues
Smartphone security issuesSmartphone security issues
Smartphone security issues
 
Two Factor Authentication: Easy Setup, Major Impact
Two Factor Authentication: Easy Setup, Major ImpactTwo Factor Authentication: Easy Setup, Major Impact
Two Factor Authentication: Easy Setup, Major Impact
 
Two factor authentication
Two factor authenticationTwo factor authentication
Two factor authentication
 
Securing sensitive accounts with MFA and Behavioral Biometrics
Securing sensitive accounts with MFA and Behavioral BiometricsSecuring sensitive accounts with MFA and Behavioral Biometrics
Securing sensitive accounts with MFA and Behavioral Biometrics
 
Combat the Latest Two-Factor Authentication Evasion Techniques
Combat the Latest Two-Factor Authentication Evasion TechniquesCombat the Latest Two-Factor Authentication Evasion Techniques
Combat the Latest Two-Factor Authentication Evasion Techniques
 
101 Internet Security Tips Slideshow - Know How To Protect Your Computer Online!
101 Internet Security Tips Slideshow - Know How To Protect Your Computer Online!101 Internet Security Tips Slideshow - Know How To Protect Your Computer Online!
101 Internet Security Tips Slideshow - Know How To Protect Your Computer Online!
 
Owasp Mobile Top 10 – 2014
Owasp Mobile Top 10 – 2014Owasp Mobile Top 10 – 2014
Owasp Mobile Top 10 – 2014
 
Smartphone
SmartphoneSmartphone
Smartphone
 
OWASP Top 10 for Mobile
OWASP Top 10 for MobileOWASP Top 10 for Mobile
OWASP Top 10 for Mobile
 
Two factor authentication presentation mcit
Two factor authentication presentation mcitTwo factor authentication presentation mcit
Two factor authentication presentation mcit
 
Mobile security
Mobile securityMobile security
Mobile security
 
Adding Two Factor Authentication to your App with Authy
Adding Two Factor Authentication to your App with AuthyAdding Two Factor Authentication to your App with Authy
Adding Two Factor Authentication to your App with Authy
 
Mobile security
Mobile securityMobile security
Mobile security
 

Destaque

Prevent browser hijack infection
Prevent browser hijack infectionPrevent browser hijack infection
Prevent browser hijack infectionscottgelbard123
 
ооо колибри строительная компания
ооо колибри строительная компанияооо колибри строительная компания
ооо колибри строительная компанияAqil Aliyev
 
Electronic surveying
Electronic surveyingElectronic surveying
Electronic surveyingifmrcmf
 
Engineering project management
Engineering project managementEngineering project management
Engineering project managementGautam Shah
 
Project annapoorna day
Project annapoorna dayProject annapoorna day
Project annapoorna daysunilmehra56
 
факторы
факторыфакторы
факторыVikarg
 
AMA SUNDAY NIGHT AUCTION 12/29/2013 JEWELRY MAKING SUPPLIES
AMA SUNDAY NIGHT AUCTION 12/29/2013 JEWELRY MAKING SUPPLIESAMA SUNDAY NIGHT AUCTION 12/29/2013 JEWELRY MAKING SUPPLIES
AMA SUNDAY NIGHT AUCTION 12/29/2013 JEWELRY MAKING SUPPLIESmrsbubba33
 
Christmas in norway
Christmas in norwayChristmas in norway
Christmas in norwayschreiber12
 
Maker Workshop 7 May 2014 - StudioX
Maker Workshop 7 May 2014 - StudioXMaker Workshop 7 May 2014 - StudioX
Maker Workshop 7 May 2014 - StudioXGelecek Hane
 
Deploiement hybride - SharePoint 2013
Deploiement hybride - SharePoint 2013Deploiement hybride - SharePoint 2013
Deploiement hybride - SharePoint 2013Luc Labelle
 
Tuesday night owl! 1.21
Tuesday night owl! 1.21Tuesday night owl! 1.21
Tuesday night owl! 1.21mrsbubba33
 
Satélites artificiais
Satélites artificiaisSatélites artificiais
Satélites artificiaisnondoufeito
 

Destaque (19)

MapReduce and Hadoop
MapReduce and HadoopMapReduce and Hadoop
MapReduce and Hadoop
 
Tari̇hfelsefeslaytı
Tari̇hfelsefeslaytıTari̇hfelsefeslaytı
Tari̇hfelsefeslaytı
 
Prevent browser hijack infection
Prevent browser hijack infectionPrevent browser hijack infection
Prevent browser hijack infection
 
Cellppt1
Cellppt1Cellppt1
Cellppt1
 
ооо колибри строительная компания
ооо колибри строительная компанияооо колибри строительная компания
ооо колибри строительная компания
 
PUSAT GROSIR SOLO
PUSAT GROSIR SOLOPUSAT GROSIR SOLO
PUSAT GROSIR SOLO
 
Electronic surveying
Electronic surveyingElectronic surveying
Electronic surveying
 
สื่อการเรียนรู้
สื่อการเรียนรู้สื่อการเรียนรู้
สื่อการเรียนรู้
 
4/3
4/34/3
4/3
 
Engineering project management
Engineering project managementEngineering project management
Engineering project management
 
Project annapoorna day
Project annapoorna dayProject annapoorna day
Project annapoorna day
 
Evaluation one final
Evaluation one finalEvaluation one final
Evaluation one final
 
факторы
факторыфакторы
факторы
 
AMA SUNDAY NIGHT AUCTION 12/29/2013 JEWELRY MAKING SUPPLIES
AMA SUNDAY NIGHT AUCTION 12/29/2013 JEWELRY MAKING SUPPLIESAMA SUNDAY NIGHT AUCTION 12/29/2013 JEWELRY MAKING SUPPLIES
AMA SUNDAY NIGHT AUCTION 12/29/2013 JEWELRY MAKING SUPPLIES
 
Christmas in norway
Christmas in norwayChristmas in norway
Christmas in norway
 
Maker Workshop 7 May 2014 - StudioX
Maker Workshop 7 May 2014 - StudioXMaker Workshop 7 May 2014 - StudioX
Maker Workshop 7 May 2014 - StudioX
 
Deploiement hybride - SharePoint 2013
Deploiement hybride - SharePoint 2013Deploiement hybride - SharePoint 2013
Deploiement hybride - SharePoint 2013
 
Tuesday night owl! 1.21
Tuesday night owl! 1.21Tuesday night owl! 1.21
Tuesday night owl! 1.21
 
Satélites artificiais
Satélites artificiaisSatélites artificiais
Satélites artificiais
 

Semelhante a Smartphones' Security

How to Secure Your Mobile Commerce App.pdf
How to Secure Your Mobile Commerce App.pdfHow to Secure Your Mobile Commerce App.pdf
How to Secure Your Mobile Commerce App.pdfOZONESOFT Solutions
 
Top Practices You Need To Develop Secure Mobile Apps.
Top Practices You Need To Develop Secure Mobile Apps.Top Practices You Need To Develop Secure Mobile Apps.
Top Practices You Need To Develop Secure Mobile Apps.Techugo
 
Mobile App Security Protecting Your App from Cyber Threats.edited.docx
Mobile App Security Protecting Your App from Cyber Threats.edited.docxMobile App Security Protecting Your App from Cyber Threats.edited.docx
Mobile App Security Protecting Your App from Cyber Threats.edited.docxmadhuri871014
 
Bolstering the security of iiot applications – how to go about it
Bolstering the security of iiot applications – how to go about it Bolstering the security of iiot applications – how to go about it
Bolstering the security of iiot applications – how to go about it Moon Technolabs Pvt. Ltd.
 
Mobile Banking Security: Challenges, Solutions
Mobile Banking Security: Challenges, SolutionsMobile Banking Security: Challenges, Solutions
Mobile Banking Security: Challenges, SolutionsCognizant
 
W01 Levent Gurses X
W01 Levent Gurses XW01 Levent Gurses X
W01 Levent Gurses XMovel
 
Usability vs. Security: Find the Right Balance in Mobile Apps
Usability vs. Security: Find the Right Balance in Mobile AppsUsability vs. Security: Find the Right Balance in Mobile Apps
Usability vs. Security: Find the Right Balance in Mobile AppsJosiah Renaudin
 
Mobile Security for the Enterprise
Mobile Security for the EnterpriseMobile Security for the Enterprise
Mobile Security for the EnterpriseWill Adams
 
Delivering secure mobile financial services (MFS) - "Frictionless" vs diligence
Delivering secure mobile financial services (MFS) - "Frictionless" vs diligenceDelivering secure mobile financial services (MFS) - "Frictionless" vs diligence
Delivering secure mobile financial services (MFS) - "Frictionless" vs diligenceNowSecure
 
Information security awareness - 101
Information security awareness - 101Information security awareness - 101
Information security awareness - 101mateenzero
 
Wfh security risks - Ed Adams, President, Security Innovation
Wfh security risks  - Ed Adams, President, Security InnovationWfh security risks  - Ed Adams, President, Security Innovation
Wfh security risks - Ed Adams, President, Security InnovationPriyanka Aash
 
6 Biggest Cyber Security Risks and How You Can Fight Back
6 Biggest Cyber Security Risks and How You Can Fight Back6 Biggest Cyber Security Risks and How You Can Fight Back
6 Biggest Cyber Security Risks and How You Can Fight BackMTG IT Professionals
 
Tips To Protect Your Mobile App from Hackers.pdf
Tips To Protect Your Mobile App from Hackers.pdfTips To Protect Your Mobile App from Hackers.pdf
Tips To Protect Your Mobile App from Hackers.pdfFuGenx Technologies
 
Document safer online for nonprofits guide
Document safer online for nonprofits guideDocument safer online for nonprofits guide
Document safer online for nonprofits guideNguyen Xuan Quang
 
Mobile App Security: Enterprise Checklist
Mobile App Security: Enterprise ChecklistMobile App Security: Enterprise Checklist
Mobile App Security: Enterprise ChecklistJignesh Solanki
 

Semelhante a Smartphones' Security (20)

How to Secure Your Mobile Commerce App.pdf
How to Secure Your Mobile Commerce App.pdfHow to Secure Your Mobile Commerce App.pdf
How to Secure Your Mobile Commerce App.pdf
 
Module 6.pdf
Module 6.pdfModule 6.pdf
Module 6.pdf
 
Module 6.Security in Evolving Technology
Module 6.Security in Evolving TechnologyModule 6.Security in Evolving Technology
Module 6.Security in Evolving Technology
 
3 steps security
3 steps security3 steps security
3 steps security
 
Secure End User
Secure End UserSecure End User
Secure End User
 
Top Practices You Need To Develop Secure Mobile Apps.
Top Practices You Need To Develop Secure Mobile Apps.Top Practices You Need To Develop Secure Mobile Apps.
Top Practices You Need To Develop Secure Mobile Apps.
 
Mobile App Security Protecting Your App from Cyber Threats.edited.docx
Mobile App Security Protecting Your App from Cyber Threats.edited.docxMobile App Security Protecting Your App from Cyber Threats.edited.docx
Mobile App Security Protecting Your App from Cyber Threats.edited.docx
 
Bolstering the security of iiot applications – how to go about it
Bolstering the security of iiot applications – how to go about it Bolstering the security of iiot applications – how to go about it
Bolstering the security of iiot applications – how to go about it
 
Mobile Banking Security: Challenges, Solutions
Mobile Banking Security: Challenges, SolutionsMobile Banking Security: Challenges, Solutions
Mobile Banking Security: Challenges, Solutions
 
W01 Levent Gurses X
W01 Levent Gurses XW01 Levent Gurses X
W01 Levent Gurses X
 
Usability vs. Security: Find the Right Balance in Mobile Apps
Usability vs. Security: Find the Right Balance in Mobile AppsUsability vs. Security: Find the Right Balance in Mobile Apps
Usability vs. Security: Find the Right Balance in Mobile Apps
 
Mobile Security for the Enterprise
Mobile Security for the EnterpriseMobile Security for the Enterprise
Mobile Security for the Enterprise
 
Delivering secure mobile financial services (MFS) - "Frictionless" vs diligence
Delivering secure mobile financial services (MFS) - "Frictionless" vs diligenceDelivering secure mobile financial services (MFS) - "Frictionless" vs diligence
Delivering secure mobile financial services (MFS) - "Frictionless" vs diligence
 
Information security awareness - 101
Information security awareness - 101Information security awareness - 101
Information security awareness - 101
 
Wfh security risks - Ed Adams, President, Security Innovation
Wfh security risks  - Ed Adams, President, Security InnovationWfh security risks  - Ed Adams, President, Security Innovation
Wfh security risks - Ed Adams, President, Security Innovation
 
6 Biggest Cyber Security Risks and How You Can Fight Back
6 Biggest Cyber Security Risks and How You Can Fight Back6 Biggest Cyber Security Risks and How You Can Fight Back
6 Biggest Cyber Security Risks and How You Can Fight Back
 
Tips To Protect Your Mobile App from Hackers.pdf
Tips To Protect Your Mobile App from Hackers.pdfTips To Protect Your Mobile App from Hackers.pdf
Tips To Protect Your Mobile App from Hackers.pdf
 
Document safer online for nonprofits guide
Document safer online for nonprofits guideDocument safer online for nonprofits guide
Document safer online for nonprofits guide
 
Mobile App Security: Enterprise Checklist
Mobile App Security: Enterprise ChecklistMobile App Security: Enterprise Checklist
Mobile App Security: Enterprise Checklist
 
Smartphone Security Article
Smartphone Security ArticleSmartphone Security Article
Smartphone Security Article
 

Último

SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????blackmambaettijean
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 

Último (20)

SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 

Smartphones' Security

  • 1. Smartphones Security IT-Sicherheit Hochschule für Technik, Wirtschaft und Kultur Leipzig
  • 2. Why is Smartphones Security Important? Our smartphones are more than our wallets, because they can store: ● credit cards number ● contacts ● email accounts ● websites passwords ● et cetera
  • 3. Too Many Features Which features can be dangerous? and Which features can help users to increase their security and privacy?
  • 4. Bluetooth Vulnerable to: ● BlueBug, bug with which is possible: make a copy of contacts; listen calls; send and read SMS messages and force connection to Internet ● BlueSmack, denial of service attack ● Eavesdropping ● Man in the middle ● ...
  • 5. How Use Bluetooth Safely For improve our security using Bluetooth we can: ● choose PIN codes that are long and not trivial, ● avoid pairing between Bluetooth devices in crowded places, ● disable it or use in hidden mode to increase the time of a possible attack.
  • 6. Near Field Communication ● Set of standards for radio communication between close devices ● No protection against eavesdropping ● Vulnerable to data modifications Applications that use NFC should encrypt the comunications!
  • 7. Services for Remote Control Some services for remote control that we can find in our devices are: – Secure Shell – File Transert Protocol – Package Manager All these services are possible points of access to our devices. How can the average user disable them?
  • 8. Summarizing we can say that we should use an approach of "Principle of Least Privilege" enabling a feature only when needed
  • 9. Which Features Users Should Use ● Screen Lock ● Data Encryption ● Remote Wipe Service ● Antivirus ● Two-factor Authentication
  • 10. Install an Antivirus Mobile malware attacks are on the rise, this because smartphones offer easy and fast ways for make profits: ● mobile payments ● directly charging on the phone bill of the device's owner A 40% of modern smartphones don't have antivirus because users think that they don't need one. Some antivirus also offer tracking and remote wipe services, thus providing three important functions with a single application.
  • 11. Use the Two-factor Authentication Two-factor authentication (TFA) is an authentication which requires the presentation of two of the three authentication factors: “something the user knows”, “something the user has” and “something the user is”. Something the user has: its smartphone The user receives an SMS with an extra code or the code is generated by a dedicated application.
  • 12. How keep smartphones and privacy more safe? ● Remember that it's not “Just a Phone” ● Say yes to updates ● Understand allowed permissions ● Don't download Apps from untrusted sources ● Keep strong password and don't be lazy ● Be careful free Wi-Fi
  • 13. Be careful with free Wi-Fi In free Wi-Fi networks lots of plain text is exchanged and a big part of most popular websites do not offer an encrypted connection Published Date: January 14, 2013 on www.trustworthyinternet.org
  • 14. Be careful with free Wi-Fi Some websites use an encrypted connection only for login They are vulnerable to "Session Hijacking"
  • 15.
  • 16. Solutions for free Wi-Fi ● Use secure channels: – HTTPS for surfing web sites; – SSL when using applications that access the Internet such as a mail client. ● Use a Virtual Private Network or a tunnel SSH ● Do not use free Wi-Fi
  • 17. Which Measures Smartphones Manufacturers and Software Developers Should Take? We will see solutions from the project phase of hardware and software to the phase after the sale of the device.
  • 18. Opportunity to Create Different User Profiles Create a profile just for children Separate and secure work and personal informations
  • 19. Provide Long Term Support ● Provide long term support with updates is extremely important for keep devices safe. ● Is possible find devices for sale with a version of the OS no more supported. ● Most users don't know how to upgrade the OS ● Manufacturers want that users buy another phone as soon as possible.
  • 20. Android' situation More than 60% have a version released before the October 2011
  • 21. Improve security on App Stores ● Check authors' identity ● Run a new application, checking for malicious and hidden behaviors ● Use restricted policies against spam and fake apps ● Deny applications that download others applications ● Offer a payment system for purchases that guarantees users and sellers
  • 23. Separate Running Programs This prevents that any compromised app will have access to not allowed lower system levels, including: ● reading or writing the user's private data (like contacts or emails) ● reading or writing another application's files ● performing network access ● et cetera
  • 24. Implement Protocols Correctly. Developers should make attention when use third party libraries such as OpenSSL or JSSE. Some implementations perform the SSL certificate validation incorrectly or not at all. Insecure against man in the middle
  • 25. Chain of trust A chain of trust is made by validating each component of hardware and software from the bottom up. Only signed software can be booted.
  • 26. Conclusion Like for computers, smartphones security is a process that involves manufactures, developers and users. This is why, is not enought that devices and softwares are safe and poka-yoke (“idiot proofing”) but we also have to hope that in a future users will be aware.