SlideShare uma empresa Scribd logo
1 de 26
Baixar para ler offline
Smartphones Security
IT-Sicherheit
Hochschule für Technik, Wirtschaft und
Kultur Leipzig
Why is Smartphones Security
Important?
Our smartphones are more than our wallets,
because they can store:
● credit cards number
● contacts
● email accounts
● websites passwords
● et cetera
Too Many Features
Which features can be dangerous?
and
Which features can help users to increase their
security and privacy?
Bluetooth
Vulnerable to:
● BlueBug, bug with which is possible: make a copy of
contacts; listen calls; send and read SMS
messages and force connection to Internet
● BlueSmack, denial of service attack
● Eavesdropping
● Man in the middle
● ...
How Use Bluetooth Safely
For improve our security using Bluetooth we can:
● choose PIN codes that are long and not trivial,
● avoid pairing between Bluetooth devices in
crowded places,
● disable it or use in hidden mode to increase
the time of a possible attack.
Near Field Communication
● Set of standards for radio communication
between close devices
● No protection against eavesdropping
● Vulnerable to data modifications
Applications that use NFC should encrypt the
comunications!
Services for Remote Control
Some services for remote control that we can
find in our devices are:
– Secure Shell
– File Transert Protocol
– Package Manager
All these services are possible points of access
to our devices.
How can the average user disable them?
Summarizing we can say that we
should use an approach of
"Principle of Least Privilege"
enabling a feature only when needed
Which Features Users Should Use
● Screen Lock
● Data Encryption
● Remote Wipe Service
● Antivirus
● Two-factor
Authentication
Install an Antivirus
Mobile malware attacks are on the rise, this because smartphones
offer easy and fast ways for make profits:
● mobile payments
● directly charging on the phone bill of the device's owner
A 40% of modern smartphones don't have antivirus because users
think that they don't need one.
Some antivirus also offer tracking and remote wipe services, thus
providing three important functions with a single application.
Use the Two-factor Authentication
Two-factor authentication (TFA) is an authentication
which requires the presentation of two of the three
authentication factors: “something the user knows”,
“something the user has” and “something the user is”.
Something the user has: its smartphone
The user receives an SMS with an extra code or the
code is generated by a dedicated application.
How keep smartphones and privacy
more safe?
● Remember that it's not “Just a Phone”
● Say yes to updates
● Understand allowed permissions
● Don't download Apps from untrusted sources
● Keep strong password and don't be lazy
● Be careful free Wi-Fi
Be careful with free Wi-Fi
In free Wi-Fi networks lots of plain text is
exchanged and a big part of most popular
websites do not offer an encrypted connection
Published Date: January 14, 2013 on www.trustworthyinternet.org
Be careful with free Wi-Fi
Some websites use an encrypted connection
only for login
They are vulnerable to "Session
Hijacking"
Solutions for free Wi-Fi
● Use secure channels:
– HTTPS for surfing web sites;
– SSL when using applications that access the
Internet such as a mail client.
● Use a Virtual Private Network or a tunnel SSH
● Do not use free Wi-Fi
Which Measures Smartphones
Manufacturers and Software
Developers Should Take?
We will see solutions from the project phase of
hardware and software to the phase after the
sale of the device.
Opportunity to Create Different User
Profiles
Create a profile
just for children
Separate and secure work and
personal informations
Provide Long Term Support
● Provide long term support with updates is
extremely important for keep devices safe.
● Is possible find devices for sale with a version
of the OS no more supported.
● Most users don't know how to upgrade the OS
● Manufacturers want that users buy another
phone as soon as possible.
Android' situation
More than 60% have a version
released before the October 2011
Improve security on App Stores
● Check authors' identity
● Run a new application, checking for malicious and
hidden behaviors
● Use restricted policies against spam and fake apps
● Deny applications that download others applications
● Offer a payment system for purchases that
guarantees users and sellers
Separate Running Programs
Separate Running Programs
This prevents that any compromised app will
have access to not allowed lower system levels,
including:
● reading or writing the user's private data (like
contacts or emails)
● reading or writing another application's files
● performing network access
● et cetera
Implement Protocols Correctly.
Developers should make attention when use
third party libraries such as OpenSSL or JSSE.
Some implementations perform the SSL
certificate validation incorrectly or not at all.
Insecure against man in the middle
Chain of trust
A chain of trust is made by validating each
component of hardware and software from the
bottom up.
Only signed
software can be
booted.
Conclusion
Like for computers, smartphones security is a
process that involves manufactures, developers
and users.
This is why, is not enought that devices and
softwares are safe and poka-yoke (“idiot
proofing”) but we also have to hope that in a
future users will be aware.

Mais conteúdo relacionado

Mais procurados

Mobile security in Cyber Security
Mobile security in Cyber SecurityMobile security in Cyber Security
Mobile security in Cyber SecurityGeo Marian
 
OWASP Mobile Security: Top 10 Risks for 2017
OWASP Mobile Security: Top 10 Risks for 2017OWASP Mobile Security: Top 10 Risks for 2017
OWASP Mobile Security: Top 10 Risks for 2017TecsyntSolutions
 
Two factor authentication 2018
Two factor authentication 2018Two factor authentication 2018
Two factor authentication 2018Will Adams
 
this is test for today
this is test for todaythis is test for today
this is test for todayDreamMalar
 
3 reasons your business can't ignore Two-Factor Authentication
3 reasons your business can't ignore Two-Factor Authentication3 reasons your business can't ignore Two-Factor Authentication
3 reasons your business can't ignore Two-Factor AuthenticationFortytwo
 
Avoiding Two-factor Authentication? You're Not Alone
Avoiding Two-factor Authentication? You're Not AloneAvoiding Two-factor Authentication? You're Not Alone
Avoiding Two-factor Authentication? You're Not AlonePortalGuard
 
Two Factor Authentication: Easy Setup, Major Impact
Two Factor Authentication: Easy Setup, Major ImpactTwo Factor Authentication: Easy Setup, Major Impact
Two Factor Authentication: Easy Setup, Major ImpactSalesforce Admins
 
Two factor authentication
Two factor authenticationTwo factor authentication
Two factor authenticationHai Nguyen
 
Securing sensitive accounts with MFA and Behavioral Biometrics
Securing sensitive accounts with MFA and Behavioral BiometricsSecuring sensitive accounts with MFA and Behavioral Biometrics
Securing sensitive accounts with MFA and Behavioral BiometricsDefCamp
 
Combat the Latest Two-Factor Authentication Evasion Techniques
Combat the Latest Two-Factor Authentication Evasion TechniquesCombat the Latest Two-Factor Authentication Evasion Techniques
Combat the Latest Two-Factor Authentication Evasion TechniquesIBM Security
 
101 Internet Security Tips Slideshow - Know How To Protect Your Computer Online!
101 Internet Security Tips Slideshow - Know How To Protect Your Computer Online!101 Internet Security Tips Slideshow - Know How To Protect Your Computer Online!
101 Internet Security Tips Slideshow - Know How To Protect Your Computer Online!EMBplc.com
 
Two factor authentication presentation mcit
Two factor authentication presentation mcitTwo factor authentication presentation mcit
Two factor authentication presentation mcitmmubashirkhan
 
Adding Two Factor Authentication to your App with Authy
Adding Two Factor Authentication to your App with AuthyAdding Two Factor Authentication to your App with Authy
Adding Two Factor Authentication to your App with AuthyNick Malcolm
 

Mais procurados (20)

Mobile security in Cyber Security
Mobile security in Cyber SecurityMobile security in Cyber Security
Mobile security in Cyber Security
 
OWASP Mobile Security: Top 10 Risks for 2017
OWASP Mobile Security: Top 10 Risks for 2017OWASP Mobile Security: Top 10 Risks for 2017
OWASP Mobile Security: Top 10 Risks for 2017
 
Two factor authentication 2018
Two factor authentication 2018Two factor authentication 2018
Two factor authentication 2018
 
this is test for today
this is test for todaythis is test for today
this is test for today
 
3 reasons your business can't ignore Two-Factor Authentication
3 reasons your business can't ignore Two-Factor Authentication3 reasons your business can't ignore Two-Factor Authentication
3 reasons your business can't ignore Two-Factor Authentication
 
Dos and Don'ts of Internet Security
Dos and Don'ts of Internet SecurityDos and Don'ts of Internet Security
Dos and Don'ts of Internet Security
 
Avoiding Two-factor Authentication? You're Not Alone
Avoiding Two-factor Authentication? You're Not AloneAvoiding Two-factor Authentication? You're Not Alone
Avoiding Two-factor Authentication? You're Not Alone
 
Smartphone security issues
Smartphone security issuesSmartphone security issues
Smartphone security issues
 
Two Factor Authentication: Easy Setup, Major Impact
Two Factor Authentication: Easy Setup, Major ImpactTwo Factor Authentication: Easy Setup, Major Impact
Two Factor Authentication: Easy Setup, Major Impact
 
Two factor authentication
Two factor authenticationTwo factor authentication
Two factor authentication
 
Securing sensitive accounts with MFA and Behavioral Biometrics
Securing sensitive accounts with MFA and Behavioral BiometricsSecuring sensitive accounts with MFA and Behavioral Biometrics
Securing sensitive accounts with MFA and Behavioral Biometrics
 
Combat the Latest Two-Factor Authentication Evasion Techniques
Combat the Latest Two-Factor Authentication Evasion TechniquesCombat the Latest Two-Factor Authentication Evasion Techniques
Combat the Latest Two-Factor Authentication Evasion Techniques
 
101 Internet Security Tips Slideshow - Know How To Protect Your Computer Online!
101 Internet Security Tips Slideshow - Know How To Protect Your Computer Online!101 Internet Security Tips Slideshow - Know How To Protect Your Computer Online!
101 Internet Security Tips Slideshow - Know How To Protect Your Computer Online!
 
Owasp Mobile Top 10 – 2014
Owasp Mobile Top 10 – 2014Owasp Mobile Top 10 – 2014
Owasp Mobile Top 10 – 2014
 
Smartphone
SmartphoneSmartphone
Smartphone
 
OWASP Top 10 for Mobile
OWASP Top 10 for MobileOWASP Top 10 for Mobile
OWASP Top 10 for Mobile
 
Two factor authentication presentation mcit
Two factor authentication presentation mcitTwo factor authentication presentation mcit
Two factor authentication presentation mcit
 
Mobile security
Mobile securityMobile security
Mobile security
 
Adding Two Factor Authentication to your App with Authy
Adding Two Factor Authentication to your App with AuthyAdding Two Factor Authentication to your App with Authy
Adding Two Factor Authentication to your App with Authy
 
Mobile security
Mobile securityMobile security
Mobile security
 

Destaque

Prevent browser hijack infection
Prevent browser hijack infectionPrevent browser hijack infection
Prevent browser hijack infectionscottgelbard123
 
ооо колибри строительная компания
ооо колибри строительная компанияооо колибри строительная компания
ооо колибри строительная компанияAqil Aliyev
 
Electronic surveying
Electronic surveyingElectronic surveying
Electronic surveyingifmrcmf
 
Engineering project management
Engineering project managementEngineering project management
Engineering project managementGautam Shah
 
Project annapoorna day
Project annapoorna dayProject annapoorna day
Project annapoorna daysunilmehra56
 
факторы
факторыфакторы
факторыVikarg
 
AMA SUNDAY NIGHT AUCTION 12/29/2013 JEWELRY MAKING SUPPLIES
AMA SUNDAY NIGHT AUCTION 12/29/2013 JEWELRY MAKING SUPPLIESAMA SUNDAY NIGHT AUCTION 12/29/2013 JEWELRY MAKING SUPPLIES
AMA SUNDAY NIGHT AUCTION 12/29/2013 JEWELRY MAKING SUPPLIESmrsbubba33
 
Christmas in norway
Christmas in norwayChristmas in norway
Christmas in norwayschreiber12
 
Maker Workshop 7 May 2014 - StudioX
Maker Workshop 7 May 2014 - StudioXMaker Workshop 7 May 2014 - StudioX
Maker Workshop 7 May 2014 - StudioXGelecek Hane
 
Deploiement hybride - SharePoint 2013
Deploiement hybride - SharePoint 2013Deploiement hybride - SharePoint 2013
Deploiement hybride - SharePoint 2013Luc Labelle
 
Tuesday night owl! 1.21
Tuesday night owl! 1.21Tuesday night owl! 1.21
Tuesday night owl! 1.21mrsbubba33
 
Satélites artificiais
Satélites artificiaisSatélites artificiais
Satélites artificiaisnondoufeito
 

Destaque (19)

MapReduce and Hadoop
MapReduce and HadoopMapReduce and Hadoop
MapReduce and Hadoop
 
Tari̇hfelsefeslaytı
Tari̇hfelsefeslaytıTari̇hfelsefeslaytı
Tari̇hfelsefeslaytı
 
Prevent browser hijack infection
Prevent browser hijack infectionPrevent browser hijack infection
Prevent browser hijack infection
 
Cellppt1
Cellppt1Cellppt1
Cellppt1
 
ооо колибри строительная компания
ооо колибри строительная компанияооо колибри строительная компания
ооо колибри строительная компания
 
PUSAT GROSIR SOLO
PUSAT GROSIR SOLOPUSAT GROSIR SOLO
PUSAT GROSIR SOLO
 
Electronic surveying
Electronic surveyingElectronic surveying
Electronic surveying
 
สื่อการเรียนรู้
สื่อการเรียนรู้สื่อการเรียนรู้
สื่อการเรียนรู้
 
4/3
4/34/3
4/3
 
Engineering project management
Engineering project managementEngineering project management
Engineering project management
 
Project annapoorna day
Project annapoorna dayProject annapoorna day
Project annapoorna day
 
Evaluation one final
Evaluation one finalEvaluation one final
Evaluation one final
 
факторы
факторыфакторы
факторы
 
AMA SUNDAY NIGHT AUCTION 12/29/2013 JEWELRY MAKING SUPPLIES
AMA SUNDAY NIGHT AUCTION 12/29/2013 JEWELRY MAKING SUPPLIESAMA SUNDAY NIGHT AUCTION 12/29/2013 JEWELRY MAKING SUPPLIES
AMA SUNDAY NIGHT AUCTION 12/29/2013 JEWELRY MAKING SUPPLIES
 
Christmas in norway
Christmas in norwayChristmas in norway
Christmas in norway
 
Maker Workshop 7 May 2014 - StudioX
Maker Workshop 7 May 2014 - StudioXMaker Workshop 7 May 2014 - StudioX
Maker Workshop 7 May 2014 - StudioX
 
Deploiement hybride - SharePoint 2013
Deploiement hybride - SharePoint 2013Deploiement hybride - SharePoint 2013
Deploiement hybride - SharePoint 2013
 
Tuesday night owl! 1.21
Tuesday night owl! 1.21Tuesday night owl! 1.21
Tuesday night owl! 1.21
 
Satélites artificiais
Satélites artificiaisSatélites artificiais
Satélites artificiais
 

Semelhante a Smartphones' Security

How to Secure Your Mobile Commerce App.pdf
How to Secure Your Mobile Commerce App.pdfHow to Secure Your Mobile Commerce App.pdf
How to Secure Your Mobile Commerce App.pdfOZONESOFT Solutions
 
Top Practices You Need To Develop Secure Mobile Apps.
Top Practices You Need To Develop Secure Mobile Apps.Top Practices You Need To Develop Secure Mobile Apps.
Top Practices You Need To Develop Secure Mobile Apps.Techugo
 
Mobile App Security Protecting Your App from Cyber Threats.edited.docx
Mobile App Security Protecting Your App from Cyber Threats.edited.docxMobile App Security Protecting Your App from Cyber Threats.edited.docx
Mobile App Security Protecting Your App from Cyber Threats.edited.docxmadhuri871014
 
Bolstering the security of iiot applications – how to go about it
Bolstering the security of iiot applications – how to go about it Bolstering the security of iiot applications – how to go about it
Bolstering the security of iiot applications – how to go about it Moon Technolabs Pvt. Ltd.
 
Mobile Banking Security: Challenges, Solutions
Mobile Banking Security: Challenges, SolutionsMobile Banking Security: Challenges, Solutions
Mobile Banking Security: Challenges, SolutionsCognizant
 
W01 Levent Gurses X
W01 Levent Gurses XW01 Levent Gurses X
W01 Levent Gurses XMovel
 
Usability vs. Security: Find the Right Balance in Mobile Apps
Usability vs. Security: Find the Right Balance in Mobile AppsUsability vs. Security: Find the Right Balance in Mobile Apps
Usability vs. Security: Find the Right Balance in Mobile AppsJosiah Renaudin
 
Mobile Security for the Enterprise
Mobile Security for the EnterpriseMobile Security for the Enterprise
Mobile Security for the EnterpriseWill Adams
 
Delivering secure mobile financial services (MFS) - "Frictionless" vs diligence
Delivering secure mobile financial services (MFS) - "Frictionless" vs diligenceDelivering secure mobile financial services (MFS) - "Frictionless" vs diligence
Delivering secure mobile financial services (MFS) - "Frictionless" vs diligenceNowSecure
 
Information security awareness - 101
Information security awareness - 101Information security awareness - 101
Information security awareness - 101mateenzero
 
Wfh security risks - Ed Adams, President, Security Innovation
Wfh security risks  - Ed Adams, President, Security InnovationWfh security risks  - Ed Adams, President, Security Innovation
Wfh security risks - Ed Adams, President, Security InnovationPriyanka Aash
 
6 Biggest Cyber Security Risks and How You Can Fight Back
6 Biggest Cyber Security Risks and How You Can Fight Back6 Biggest Cyber Security Risks and How You Can Fight Back
6 Biggest Cyber Security Risks and How You Can Fight BackMTG IT Professionals
 
Tips To Protect Your Mobile App from Hackers.pdf
Tips To Protect Your Mobile App from Hackers.pdfTips To Protect Your Mobile App from Hackers.pdf
Tips To Protect Your Mobile App from Hackers.pdfFuGenx Technologies
 
Document safer online for nonprofits guide
Document safer online for nonprofits guideDocument safer online for nonprofits guide
Document safer online for nonprofits guideNguyen Xuan Quang
 
Mobile App Security: Enterprise Checklist
Mobile App Security: Enterprise ChecklistMobile App Security: Enterprise Checklist
Mobile App Security: Enterprise ChecklistJignesh Solanki
 

Semelhante a Smartphones' Security (20)

How to Secure Your Mobile Commerce App.pdf
How to Secure Your Mobile Commerce App.pdfHow to Secure Your Mobile Commerce App.pdf
How to Secure Your Mobile Commerce App.pdf
 
Module 6.pdf
Module 6.pdfModule 6.pdf
Module 6.pdf
 
Module 6.Security in Evolving Technology
Module 6.Security in Evolving TechnologyModule 6.Security in Evolving Technology
Module 6.Security in Evolving Technology
 
3 steps security
3 steps security3 steps security
3 steps security
 
Secure End User
Secure End UserSecure End User
Secure End User
 
Top Practices You Need To Develop Secure Mobile Apps.
Top Practices You Need To Develop Secure Mobile Apps.Top Practices You Need To Develop Secure Mobile Apps.
Top Practices You Need To Develop Secure Mobile Apps.
 
Mobile App Security Protecting Your App from Cyber Threats.edited.docx
Mobile App Security Protecting Your App from Cyber Threats.edited.docxMobile App Security Protecting Your App from Cyber Threats.edited.docx
Mobile App Security Protecting Your App from Cyber Threats.edited.docx
 
Bolstering the security of iiot applications – how to go about it
Bolstering the security of iiot applications – how to go about it Bolstering the security of iiot applications – how to go about it
Bolstering the security of iiot applications – how to go about it
 
Mobile Banking Security: Challenges, Solutions
Mobile Banking Security: Challenges, SolutionsMobile Banking Security: Challenges, Solutions
Mobile Banking Security: Challenges, Solutions
 
W01 Levent Gurses X
W01 Levent Gurses XW01 Levent Gurses X
W01 Levent Gurses X
 
Usability vs. Security: Find the Right Balance in Mobile Apps
Usability vs. Security: Find the Right Balance in Mobile AppsUsability vs. Security: Find the Right Balance in Mobile Apps
Usability vs. Security: Find the Right Balance in Mobile Apps
 
Mobile Security for the Enterprise
Mobile Security for the EnterpriseMobile Security for the Enterprise
Mobile Security for the Enterprise
 
Delivering secure mobile financial services (MFS) - "Frictionless" vs diligence
Delivering secure mobile financial services (MFS) - "Frictionless" vs diligenceDelivering secure mobile financial services (MFS) - "Frictionless" vs diligence
Delivering secure mobile financial services (MFS) - "Frictionless" vs diligence
 
Information security awareness - 101
Information security awareness - 101Information security awareness - 101
Information security awareness - 101
 
Wfh security risks - Ed Adams, President, Security Innovation
Wfh security risks  - Ed Adams, President, Security InnovationWfh security risks  - Ed Adams, President, Security Innovation
Wfh security risks - Ed Adams, President, Security Innovation
 
6 Biggest Cyber Security Risks and How You Can Fight Back
6 Biggest Cyber Security Risks and How You Can Fight Back6 Biggest Cyber Security Risks and How You Can Fight Back
6 Biggest Cyber Security Risks and How You Can Fight Back
 
Tips To Protect Your Mobile App from Hackers.pdf
Tips To Protect Your Mobile App from Hackers.pdfTips To Protect Your Mobile App from Hackers.pdf
Tips To Protect Your Mobile App from Hackers.pdf
 
Document safer online for nonprofits guide
Document safer online for nonprofits guideDocument safer online for nonprofits guide
Document safer online for nonprofits guide
 
Mobile App Security: Enterprise Checklist
Mobile App Security: Enterprise ChecklistMobile App Security: Enterprise Checklist
Mobile App Security: Enterprise Checklist
 
Smartphone Security Article
Smartphone Security ArticleSmartphone Security Article
Smartphone Security Article
 

Último

Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 

Último (20)

Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 

Smartphones' Security

  • 1. Smartphones Security IT-Sicherheit Hochschule für Technik, Wirtschaft und Kultur Leipzig
  • 2. Why is Smartphones Security Important? Our smartphones are more than our wallets, because they can store: ● credit cards number ● contacts ● email accounts ● websites passwords ● et cetera
  • 3. Too Many Features Which features can be dangerous? and Which features can help users to increase their security and privacy?
  • 4. Bluetooth Vulnerable to: ● BlueBug, bug with which is possible: make a copy of contacts; listen calls; send and read SMS messages and force connection to Internet ● BlueSmack, denial of service attack ● Eavesdropping ● Man in the middle ● ...
  • 5. How Use Bluetooth Safely For improve our security using Bluetooth we can: ● choose PIN codes that are long and not trivial, ● avoid pairing between Bluetooth devices in crowded places, ● disable it or use in hidden mode to increase the time of a possible attack.
  • 6. Near Field Communication ● Set of standards for radio communication between close devices ● No protection against eavesdropping ● Vulnerable to data modifications Applications that use NFC should encrypt the comunications!
  • 7. Services for Remote Control Some services for remote control that we can find in our devices are: – Secure Shell – File Transert Protocol – Package Manager All these services are possible points of access to our devices. How can the average user disable them?
  • 8. Summarizing we can say that we should use an approach of "Principle of Least Privilege" enabling a feature only when needed
  • 9. Which Features Users Should Use ● Screen Lock ● Data Encryption ● Remote Wipe Service ● Antivirus ● Two-factor Authentication
  • 10. Install an Antivirus Mobile malware attacks are on the rise, this because smartphones offer easy and fast ways for make profits: ● mobile payments ● directly charging on the phone bill of the device's owner A 40% of modern smartphones don't have antivirus because users think that they don't need one. Some antivirus also offer tracking and remote wipe services, thus providing three important functions with a single application.
  • 11. Use the Two-factor Authentication Two-factor authentication (TFA) is an authentication which requires the presentation of two of the three authentication factors: “something the user knows”, “something the user has” and “something the user is”. Something the user has: its smartphone The user receives an SMS with an extra code or the code is generated by a dedicated application.
  • 12. How keep smartphones and privacy more safe? ● Remember that it's not “Just a Phone” ● Say yes to updates ● Understand allowed permissions ● Don't download Apps from untrusted sources ● Keep strong password and don't be lazy ● Be careful free Wi-Fi
  • 13. Be careful with free Wi-Fi In free Wi-Fi networks lots of plain text is exchanged and a big part of most popular websites do not offer an encrypted connection Published Date: January 14, 2013 on www.trustworthyinternet.org
  • 14. Be careful with free Wi-Fi Some websites use an encrypted connection only for login They are vulnerable to "Session Hijacking"
  • 15.
  • 16. Solutions for free Wi-Fi ● Use secure channels: – HTTPS for surfing web sites; – SSL when using applications that access the Internet such as a mail client. ● Use a Virtual Private Network or a tunnel SSH ● Do not use free Wi-Fi
  • 17. Which Measures Smartphones Manufacturers and Software Developers Should Take? We will see solutions from the project phase of hardware and software to the phase after the sale of the device.
  • 18. Opportunity to Create Different User Profiles Create a profile just for children Separate and secure work and personal informations
  • 19. Provide Long Term Support ● Provide long term support with updates is extremely important for keep devices safe. ● Is possible find devices for sale with a version of the OS no more supported. ● Most users don't know how to upgrade the OS ● Manufacturers want that users buy another phone as soon as possible.
  • 20. Android' situation More than 60% have a version released before the October 2011
  • 21. Improve security on App Stores ● Check authors' identity ● Run a new application, checking for malicious and hidden behaviors ● Use restricted policies against spam and fake apps ● Deny applications that download others applications ● Offer a payment system for purchases that guarantees users and sellers
  • 23. Separate Running Programs This prevents that any compromised app will have access to not allowed lower system levels, including: ● reading or writing the user's private data (like contacts or emails) ● reading or writing another application's files ● performing network access ● et cetera
  • 24. Implement Protocols Correctly. Developers should make attention when use third party libraries such as OpenSSL or JSSE. Some implementations perform the SSL certificate validation incorrectly or not at all. Insecure against man in the middle
  • 25. Chain of trust A chain of trust is made by validating each component of hardware and software from the bottom up. Only signed software can be booted.
  • 26. Conclusion Like for computers, smartphones security is a process that involves manufactures, developers and users. This is why, is not enought that devices and softwares are safe and poka-yoke (“idiot proofing”) but we also have to hope that in a future users will be aware.