SlideShare uma empresa Scribd logo
1 de 19
Wireless and Mobile Security Null-The open Security Community Pushkar
News… Varanasi Bomb Blast Mail sent through hacked WiFiof a DJ in NaviMumbai. Out of 2300 connections only 16% are secured in Pune City – Cyber Crime Cell, Pune. Police making it compulsory to secure wifi. Geimini Trojan attacks Android users on New Year.
WIRELESS Technology
Wireless Network Standards….
Attacks… Identity Theft – Hacking a wireless network and using it. 	Use it for fun. 	Use it for free. 	Use it for crime. MITM – Sniff the users information. Corporate espionage. Sniff passwords DoS– Interrupt work.
Wireless Security Measures… No Security   WEP – Wireless Equivalent Protocol Simple Low level Security 40 bit shared key used. only ensured the data received is the same or not. can be easily cracked now.
Wireless Security measures contd… WPA – Wi-Fi Protected Access. 	128bit,  	TKIP – Dynamically offering keys for connection. 	Encrypted using Michael Algorithm. WPA2 – 128bit, AES encryption algorithm. More reliable and most widely used.
Mobiles – Smartphones… The next generation technology. Compact and efficient devices. A practical and cost-effective alternative to laptops. Need of the hour. Work on Move.
Who are the users … You, me and all, Corporate Directors, Managers, Executives, Salesman, Suppliers, Contractors, Government Officials College Students,
Affecting factors… Mobile Communication Capabilities : Cellular – MITM in voice transmission, with using less secured protocols or encrypting/decrypting techniques. WiFi-MITM Blutooth /Infrared - Personal Area Network SMS—Scripts to send spam sms from the device, inject malware on the phones. Corporate Firewall, Inside the firewall, 	Access to all the data on network, Outside the firewall 	Data is in the air,
Threats… Physical :  Device theft, loss of device  Misuse by trusted people (colleagues, friends, family) Malwares: 	Mobile Malwares-new and emerging threat 	Infection vectors are more. Eg., Mabir/Cabir virus: can infect Symbian OS via Bluetooth or SMS. Dampigtrojan: corrupts the system’s uninstallation settings.
Threats contd… Mobile App Downloads : Free nature of apps, 	“Jail-breaking” – process which allows users to installed pirated or unchecked applications. Application Isolation. Secure Data Storage: 	Password protection, mobile number fixed for each device, auto mounting disable. Strong Authentication with poor keyboards. Secure Operating Systems
Platforms… Android Operating System : OS by google, open source. Used by many mobile device producing companies. iOS : Apple OS. Used in iPhones, iPads Windows Mobile OS /Windows Phone 7 :  Mobile OS from Microsoft. Symbian OS /Symbian^3 : Used in Nokia devices.
Security Measures… Platform-Centric Security : Protecting the device/network instead of data. Data-Centric Security : Protecting Data instead of devices/networks.  Components in mobile security : 	Authentication and Authorization : 	Firewall Security : 	Over-the-air security : 	Offline security :
Security Measures  Authentication and Authorization : 		Authorize the device use as well as the application use by proper authentication. Firewall Security : Include and register mobile devices with company firewalls. Only give access to registered users. Over-the-air security : Encrypt the data when sent onto public mobile networks. Offline security : Prevent mobile device to reach in the wrong hands.
Security Measures … Security over PAN :  Security for Bluetooth /Infrared data transmission. Security over mobile Malwares : Install trusted anti-virus scanners in mobiles.
Wifi Cracking Demo
Conclusion … Work while on move with CAUTION …
Thank You 

Mais conteúdo relacionado

Mais procurados

Smartphone security
Smartphone  securitySmartphone  security
Smartphone securityManish Gupta
 
Introduction to Cybersecurity Fundamentals
Introduction to Cybersecurity FundamentalsIntroduction to Cybersecurity Fundamentals
Introduction to Cybersecurity FundamentalsToño Herrera
 
Network Security Presentation
Network Security PresentationNetwork Security Presentation
Network Security PresentationAllan Pratt MBA
 
MOBILE PHONE SECURITY./ MOBILE SECURITY
MOBILE PHONE SECURITY./ MOBILE SECURITYMOBILE PHONE SECURITY./ MOBILE SECURITY
MOBILE PHONE SECURITY./ MOBILE SECURITYJASHU JASWANTH
 
Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Fabiha Shahzad
 
Cyber Security A Challenges For Mankind
Cyber Security A Challenges For MankindCyber Security A Challenges For Mankind
Cyber Security A Challenges For MankindSaurabh Kheni
 
Cyber security threats for 2017
Cyber security threats for 2017Cyber security threats for 2017
Cyber security threats for 2017Ramiro Cid
 
Application Security | Application Security Tutorial | Cyber Security Certifi...
Application Security | Application Security Tutorial | Cyber Security Certifi...Application Security | Application Security Tutorial | Cyber Security Certifi...
Application Security | Application Security Tutorial | Cyber Security Certifi...Edureka!
 
Introduction to Cybersecurity
Introduction to CybersecurityIntroduction to Cybersecurity
Introduction to CybersecurityKrutarth Vasavada
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentationTayabaZahid
 
Cyber security awareness
Cyber security awarenessCyber security awareness
Cyber security awarenessJason Murray
 
1. introduction to cyber security
1. introduction to cyber security1. introduction to cyber security
1. introduction to cyber securityAnimesh Roy
 

Mais procurados (20)

CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
Mobile security
Mobile securityMobile security
Mobile security
 
Types of cyber attacks
Types of cyber attacksTypes of cyber attacks
Types of cyber attacks
 
Smartphone security
Smartphone  securitySmartphone  security
Smartphone security
 
Network security and viruses
Network security and virusesNetwork security and viruses
Network security and viruses
 
Introduction to Cybersecurity Fundamentals
Introduction to Cybersecurity FundamentalsIntroduction to Cybersecurity Fundamentals
Introduction to Cybersecurity Fundamentals
 
Network security
Network securityNetwork security
Network security
 
Network Security Presentation
Network Security PresentationNetwork Security Presentation
Network Security Presentation
 
MOBILE PHONE SECURITY./ MOBILE SECURITY
MOBILE PHONE SECURITY./ MOBILE SECURITYMOBILE PHONE SECURITY./ MOBILE SECURITY
MOBILE PHONE SECURITY./ MOBILE SECURITY
 
Mobile security
Mobile securityMobile security
Mobile security
 
Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)
 
Cyber Security A Challenges For Mankind
Cyber Security A Challenges For MankindCyber Security A Challenges For Mankind
Cyber Security A Challenges For Mankind
 
Cyber security threats for 2017
Cyber security threats for 2017Cyber security threats for 2017
Cyber security threats for 2017
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
Application Security | Application Security Tutorial | Cyber Security Certifi...
Application Security | Application Security Tutorial | Cyber Security Certifi...Application Security | Application Security Tutorial | Cyber Security Certifi...
Application Security | Application Security Tutorial | Cyber Security Certifi...
 
Introduction to Cybersecurity
Introduction to CybersecurityIntroduction to Cybersecurity
Introduction to Cybersecurity
 
Cyber security
Cyber securityCyber security
Cyber security
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
 
Cyber security awareness
Cyber security awarenessCyber security awareness
Cyber security awareness
 
1. introduction to cyber security
1. introduction to cyber security1. introduction to cyber security
1. introduction to cyber security
 

Destaque

Wireless power transmission
Wireless power transmissionWireless power transmission
Wireless power transmissionMohammad Azhar
 
Wireless mobile charger
Wireless mobile chargerWireless mobile charger
Wireless mobile chargerMaruf Priyo
 
Wireless mobile charger or wireless power transfer
Wireless mobile charger or  wireless power transferWireless mobile charger or  wireless power transfer
Wireless mobile charger or wireless power transferGautam Singh
 
Wireless mobile charging by Inductive Coupling.
Wireless mobile charging by Inductive Coupling.Wireless mobile charging by Inductive Coupling.
Wireless mobile charging by Inductive Coupling.siddhant212
 
Wireless charging of mobilephones
Wireless charging of  mobilephonesWireless charging of  mobilephones
Wireless charging of mobilephonesPRADEEP Cheekatla
 
Wireless charging of mobile PPT.
Wireless charging of mobile PPT.Wireless charging of mobile PPT.
Wireless charging of mobile PPT.Krishna Teja
 

Destaque (8)

wireless power transfer
wireless power transfer wireless power transfer
wireless power transfer
 
Wireless power transmission
Wireless power transmissionWireless power transmission
Wireless power transmission
 
Wireless mobile charger
Wireless mobile chargerWireless mobile charger
Wireless mobile charger
 
Wireless mobile charger or wireless power transfer
Wireless mobile charger or  wireless power transferWireless mobile charger or  wireless power transfer
Wireless mobile charger or wireless power transfer
 
Wireless mobile charging by Inductive Coupling.
Wireless mobile charging by Inductive Coupling.Wireless mobile charging by Inductive Coupling.
Wireless mobile charging by Inductive Coupling.
 
Wireless charging of mobilephones
Wireless charging of  mobilephonesWireless charging of  mobilephones
Wireless charging of mobilephones
 
Witricity- Wireless Power Transmission
Witricity- Wireless Power TransmissionWitricity- Wireless Power Transmission
Witricity- Wireless Power Transmission
 
Wireless charging of mobile PPT.
Wireless charging of mobile PPT.Wireless charging of mobile PPT.
Wireless charging of mobile PPT.
 

Semelhante a Wireless and mobile security

Mobile security 8soft_final_summercamp2011
Mobile security 8soft_final_summercamp2011Mobile security 8soft_final_summercamp2011
Mobile security 8soft_final_summercamp2011Zarafa
 
Treads to mobile network
Treads to mobile networkTreads to mobile network
Treads to mobile networkRAVITEJA828
 
Cell Phone Viruses & Security
Cell Phone Viruses & SecurityCell Phone Viruses & Security
Cell Phone Viruses & Securityguestc03f28
 
Cell Phone Viruses & Security
Cell Phone Viruses & SecurityCell Phone Viruses & Security
Cell Phone Viruses & Securitymanish kumar
 
2010: Mobile Security - WHYMCA Developer Conference
2010: Mobile Security - WHYMCA Developer Conference2010: Mobile Security - WHYMCA Developer Conference
2010: Mobile Security - WHYMCA Developer ConferenceFabio Pietrosanti
 
cellphone virus and security
cellphone virus and securitycellphone virus and security
cellphone virus and securityAkhil Kumar
 
Cyber Security
Cyber SecurityCyber Security
Cyber SecurityBryCunal
 
Report on Mobile security
Report  on Mobile securityReport  on Mobile security
Report on Mobile securityKavita Rastogi
 
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?Do New Mobile Devices in Enterprises Pose A Serious Security Threat?
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?acijjournal
 
Network Security for Employees
Network Security for Employees Network Security for Employees
Network Security for Employees OPSWAT
 
The Consumerisation of Corporate IT
The Consumerisation of Corporate ITThe Consumerisation of Corporate IT
The Consumerisation of Corporate ITPeter Wood
 
ISACA CACS 2012 - Mobile Device Security and Privacy
ISACA CACS 2012 - Mobile Device Security and PrivacyISACA CACS 2012 - Mobile Device Security and Privacy
ISACA CACS 2012 - Mobile Device Security and PrivacyMichael Davis
 

Semelhante a Wireless and mobile security (20)

CS_UNIT 2(P3).pptx
CS_UNIT 2(P3).pptxCS_UNIT 2(P3).pptx
CS_UNIT 2(P3).pptx
 
Cn35499502
Cn35499502Cn35499502
Cn35499502
 
Unit-3.pptx
Unit-3.pptxUnit-3.pptx
Unit-3.pptx
 
Cp3201 mobile security final
Cp3201 mobile security finalCp3201 mobile security final
Cp3201 mobile security final
 
Mobile security 8soft_final_summercamp2011
Mobile security 8soft_final_summercamp2011Mobile security 8soft_final_summercamp2011
Mobile security 8soft_final_summercamp2011
 
Treads to mobile network
Treads to mobile networkTreads to mobile network
Treads to mobile network
 
Communication security 2021
Communication security 2021Communication security 2021
Communication security 2021
 
Smartphone
SmartphoneSmartphone
Smartphone
 
Cell Phone Viruses & Security
Cell Phone Viruses & SecurityCell Phone Viruses & Security
Cell Phone Viruses & Security
 
Cell Phone Viruses & Security
Cell Phone Viruses & SecurityCell Phone Viruses & Security
Cell Phone Viruses & Security
 
2010: Mobile Security - WHYMCA Developer Conference
2010: Mobile Security - WHYMCA Developer Conference2010: Mobile Security - WHYMCA Developer Conference
2010: Mobile Security - WHYMCA Developer Conference
 
cellphone virus and security
cellphone virus and securitycellphone virus and security
cellphone virus and security
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Report on Mobile security
Report  on Mobile securityReport  on Mobile security
Report on Mobile security
 
Information security
Information securityInformation security
Information security
 
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?Do New Mobile Devices in Enterprises Pose A Serious Security Threat?
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?
 
MIS (1).pptx
MIS (1).pptxMIS (1).pptx
MIS (1).pptx
 
Network Security for Employees
Network Security for Employees Network Security for Employees
Network Security for Employees
 
The Consumerisation of Corporate IT
The Consumerisation of Corporate ITThe Consumerisation of Corporate IT
The Consumerisation of Corporate IT
 
ISACA CACS 2012 - Mobile Device Security and Privacy
ISACA CACS 2012 - Mobile Device Security and PrivacyISACA CACS 2012 - Mobile Device Security and Privacy
ISACA CACS 2012 - Mobile Device Security and Privacy
 

Último

How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991RKavithamani
 
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...RKavithamani
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 

Último (20)

How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
 
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 

Wireless and mobile security

  • 1. Wireless and Mobile Security Null-The open Security Community Pushkar
  • 2. News… Varanasi Bomb Blast Mail sent through hacked WiFiof a DJ in NaviMumbai. Out of 2300 connections only 16% are secured in Pune City – Cyber Crime Cell, Pune. Police making it compulsory to secure wifi. Geimini Trojan attacks Android users on New Year.
  • 5. Attacks… Identity Theft – Hacking a wireless network and using it. Use it for fun. Use it for free. Use it for crime. MITM – Sniff the users information. Corporate espionage. Sniff passwords DoS– Interrupt work.
  • 6. Wireless Security Measures… No Security   WEP – Wireless Equivalent Protocol Simple Low level Security 40 bit shared key used. only ensured the data received is the same or not. can be easily cracked now.
  • 7. Wireless Security measures contd… WPA – Wi-Fi Protected Access. 128bit, TKIP – Dynamically offering keys for connection. Encrypted using Michael Algorithm. WPA2 – 128bit, AES encryption algorithm. More reliable and most widely used.
  • 8. Mobiles – Smartphones… The next generation technology. Compact and efficient devices. A practical and cost-effective alternative to laptops. Need of the hour. Work on Move.
  • 9. Who are the users … You, me and all, Corporate Directors, Managers, Executives, Salesman, Suppliers, Contractors, Government Officials College Students,
  • 10. Affecting factors… Mobile Communication Capabilities : Cellular – MITM in voice transmission, with using less secured protocols or encrypting/decrypting techniques. WiFi-MITM Blutooth /Infrared - Personal Area Network SMS—Scripts to send spam sms from the device, inject malware on the phones. Corporate Firewall, Inside the firewall, Access to all the data on network, Outside the firewall Data is in the air,
  • 11. Threats… Physical : Device theft, loss of device Misuse by trusted people (colleagues, friends, family) Malwares: Mobile Malwares-new and emerging threat Infection vectors are more. Eg., Mabir/Cabir virus: can infect Symbian OS via Bluetooth or SMS. Dampigtrojan: corrupts the system’s uninstallation settings.
  • 12. Threats contd… Mobile App Downloads : Free nature of apps, “Jail-breaking” – process which allows users to installed pirated or unchecked applications. Application Isolation. Secure Data Storage: Password protection, mobile number fixed for each device, auto mounting disable. Strong Authentication with poor keyboards. Secure Operating Systems
  • 13. Platforms… Android Operating System : OS by google, open source. Used by many mobile device producing companies. iOS : Apple OS. Used in iPhones, iPads Windows Mobile OS /Windows Phone 7 : Mobile OS from Microsoft. Symbian OS /Symbian^3 : Used in Nokia devices.
  • 14. Security Measures… Platform-Centric Security : Protecting the device/network instead of data. Data-Centric Security : Protecting Data instead of devices/networks. Components in mobile security : Authentication and Authorization : Firewall Security : Over-the-air security : Offline security :
  • 15. Security Measures Authentication and Authorization : Authorize the device use as well as the application use by proper authentication. Firewall Security : Include and register mobile devices with company firewalls. Only give access to registered users. Over-the-air security : Encrypt the data when sent onto public mobile networks. Offline security : Prevent mobile device to reach in the wrong hands.
  • 16. Security Measures … Security over PAN : Security for Bluetooth /Infrared data transmission. Security over mobile Malwares : Install trusted anti-virus scanners in mobiles.
  • 18. Conclusion … Work while on move with CAUTION …

Notas do Editor

  1. Wired Equivalent Protocol