SlideShare uma empresa Scribd logo
1 de 20
Mobile viruses and security


            -Priyanka Rathod
                       MOBILE VIRUSES AND
                       SECURITY             1
What is the common communication
 medium among us?????????




                 MOBILE VIRUSES AND SECURITY   2
A cell phone
MOBILE VIRUSES AND SECURITY   3
MOBILE VIRUSES AND SECURITY




Cell phone viruses and security.

                                         4
 The  technology of cell phones.
 Viruses
 How cell phone viruses work.
 Difference with pc virus.
 Different types of cell phone viruses.
 Threats.
 Security issue.


                    MOBILE VIRUSES AND SECURITY   5
(.)Analog network.

(.)Digital network.



   MOBILE VIRUSES AND SECURITY   6
 Today  all provider has switched to
 digital network and only a few of them
 are still running analog network.




                   MOBILE VIRUSES AND SECURITY   7
 FDMA(Frequency   division multiple
  access).
 CDMA(Code-division multiple access.
 TDMA(Time division multiple access).
 GSM(Global system for mobile
  communication).


                   MOBILE VIRUSES AND SECURITY   8
 Cell phone virus are electronic
  programs that attacks the cell phones
  PDA (personal digital assistant)
  devices and malfunction s/w that are
  running cell phones.
How they spread?
 Internet download.
 Bluetooth wireless connection.
 Multimedia messaging service.



                   MOBILE VIRUSES AND SECURITY   9
 Unnecessary     call/sms/mms.
 Send private information.
 Cause phone to work slowly.
 Wipe out contact book and other
  information.
 Installs “false” application




                   MOBILE VIRUSES AND SECURITY   10
 Although similar oses are being used
  differences exits:
 Lesser user of cell phones are “tech
  literate”
 Implies that it is difficult to “rollout
  security patches” to phones already sold.
 Cell phones are always connected and
  “switched on”
 “Environment” keeps changing


                      MOBILE VIRUSES AND SECURITY   11
 On
   positive side:
   A malware for 1 type of phone may
    not necessarily be able to infect
    other.
Cellphone malware not yet causing
 severe harm:
    At most they increases users billing
    Cause the cell phone to stop
    working

                    MOBILE VIRUSES AND SECURITY   12
 Timifonica
 Cabir
 Commwarrior
 Comwar
 Duts
 Skulls
 Lasco.a


                MOBILE VIRUSES AND SECURITY   13
 Firstcell phone worm.
 Spread vector-Bluetooth.
• Infected file-cabre.sis
 15 new variants exits.




                   MOBILE VIRUSES AND SECURITY   14
 Location tracking
 Camera and microphone bug
 Leaking sensitive information
 Attack on cell phone service provider.




                    MOBILE VIRUSES AND SECURITY   15
The generic security issues…




           MOBILE VIRUSES AND SECURITY   16
 The  best way to protect phones from
  cell viruses is the same way you
  protect your PCs from computer
  viruses.
 Never open anything if you don’t
  know what it is…..



                    MOBILE VIRUSES AND SECURITY   17
 Turnoff Bluetooth discoverable mode
 Keep your cell phone in hidden mode.




                   MOBILE VIRUSES AND SECURITY   18
   WWW.GOOGLE.COM

   WWW.WEKIPEDIA.COM




                        MOBILE VIRUSES AND SECURITY   19
MOBILE VIRUSES AND
SECURITY             20

Mais conteúdo relacionado

Mais procurados

Cybercrimes (Against Children)
Cybercrimes (Against Children)Cybercrimes (Against Children)
Cybercrimes (Against Children)Can R. PAHALI
 
Cyber Crime PPT
Cyber Crime PPTCyber Crime PPT
Cyber Crime PPTAnandKaGe
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber SecurityPriyanshu Ratnakar
 
Power point cybercrime
Power point cybercrimePower point cybercrime
Power point cybercrime12698
 
cellphone virus and security
cellphone virus and securitycellphone virus and security
cellphone virus and securityAkhil Kumar
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentationParab Mishra
 
Ransomware attack
Ransomware attackRansomware attack
Ransomware attackAmna
 
cyber crime and security
cyber crime and securitycyber crime and security
cyber crime and securityAjay Singh
 
Cyber crime presentation
Cyber crime presentation Cyber crime presentation
Cyber crime presentation Priya Saluja
 
Network security
Network securityNetwork security
Network securityfatimasaham
 
Cross site scripting (xss)
Cross site scripting (xss)Cross site scripting (xss)
Cross site scripting (xss)Manish Kumar
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & preventionPriSim
 
General Awareness On Cyber Security
General Awareness On Cyber SecurityGeneral Awareness On Cyber Security
General Awareness On Cyber SecurityDominic Rajesh
 
Nat'l Cyber Security Awareness Month (NCSAM) Posters
Nat'l Cyber Security Awareness Month (NCSAM) PostersNat'l Cyber Security Awareness Month (NCSAM) Posters
Nat'l Cyber Security Awareness Month (NCSAM) PostersNetLockSmith
 

Mais procurados (20)

Cybercrimes (Against Children)
Cybercrimes (Against Children)Cybercrimes (Against Children)
Cybercrimes (Against Children)
 
Cyber Crime PPT
Cyber Crime PPTCyber Crime PPT
Cyber Crime PPT
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Power point cybercrime
Power point cybercrimePower point cybercrime
Power point cybercrime
 
cellphone virus and security
cellphone virus and securitycellphone virus and security
cellphone virus and security
 
Mobile security
Mobile securityMobile security
Mobile security
 
Mobile security
Mobile securityMobile security
Mobile security
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
 
Ransomware attack
Ransomware attackRansomware attack
Ransomware attack
 
cyber crime and security
cyber crime and securitycyber crime and security
cyber crime and security
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime presentation
Cyber crime presentation Cyber crime presentation
Cyber crime presentation
 
Network security
Network securityNetwork security
Network security
 
Cross site scripting (xss)
Cross site scripting (xss)Cross site scripting (xss)
Cross site scripting (xss)
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & prevention
 
General Awareness On Cyber Security
General Awareness On Cyber SecurityGeneral Awareness On Cyber Security
General Awareness On Cyber Security
 
Nat'l Cyber Security Awareness Month (NCSAM) Posters
Nat'l Cyber Security Awareness Month (NCSAM) PostersNat'l Cyber Security Awareness Month (NCSAM) Posters
Nat'l Cyber Security Awareness Month (NCSAM) Posters
 

Destaque

Cell Phone Viruses & Security
Cell Phone Viruses & SecurityCell Phone Viruses & Security
Cell Phone Viruses & Securityguestc03f28
 
Cell Phone Viruses & Security
Cell Phone Viruses & SecurityCell Phone Viruses & Security
Cell Phone Viruses & Securitymanish kumar
 
Mobile security
Mobile securityMobile security
Mobile securityhome
 
Health and safety ICT
Health and safety ICT Health and safety ICT
Health and safety ICT Leahdabitch
 
Mind Reading Computer
Mind Reading ComputerMind Reading Computer
Mind Reading ComputerDev Ashish
 
Health & safety presentation
Health & safety presentationHealth & safety presentation
Health & safety presentationPhalinng
 
Cyber Crime is around us
Cyber Crime is around usCyber Crime is around us
Cyber Crime is around uslichuyuliting
 
Lab 5--Cybersquatting
Lab 5--CybersquattingLab 5--Cybersquatting
Lab 5--Cybersquattingaah3420
 
Mobile Security
Mobile SecurityMobile Security
Mobile SecurityKevin Lee
 
Mind reading computer ppt
Mind reading computer pptMind reading computer ppt
Mind reading computer pptIshan Khan
 
Cybersquatting in India - Genesis & Legal Scenario
Cybersquatting in India - Genesis & Legal ScenarioCybersquatting in India - Genesis & Legal Scenario
Cybersquatting in India - Genesis & Legal ScenarioNishi Shabana
 
Cybersquatting
CybersquattingCybersquatting
Cybersquattingbobbyb85
 
Mind reading computer report
Mind reading computer reportMind reading computer report
Mind reading computer reportIshan Khan
 

Destaque (20)

Cell Phone Viruses & Security
Cell Phone Viruses & SecurityCell Phone Viruses & Security
Cell Phone Viruses & Security
 
SEMINAR
SEMINARSEMINAR
SEMINAR
 
Cell Phone Viruses & Security
Cell Phone Viruses & SecurityCell Phone Viruses & Security
Cell Phone Viruses & Security
 
Mobile security
Mobile securityMobile security
Mobile security
 
Mobile security
Mobile securityMobile security
Mobile security
 
Him
HimHim
Him
 
Health and safety ICT
Health and safety ICT Health and safety ICT
Health and safety ICT
 
Nram presentation 3
Nram presentation 3Nram presentation 3
Nram presentation 3
 
Mind Reading Computer
Mind Reading ComputerMind Reading Computer
Mind Reading Computer
 
Health & safety presentation
Health & safety presentationHealth & safety presentation
Health & safety presentation
 
Cyber Crime is around us
Cyber Crime is around usCyber Crime is around us
Cyber Crime is around us
 
Lab 5--Cybersquatting
Lab 5--CybersquattingLab 5--Cybersquatting
Lab 5--Cybersquatting
 
ELECTRONIC FRAUD TACTICS
ELECTRONIC FRAUD TACTICS ELECTRONIC FRAUD TACTICS
ELECTRONIC FRAUD TACTICS
 
Mobile Security
Mobile SecurityMobile Security
Mobile Security
 
Cyber security mis
Cyber security  misCyber security  mis
Cyber security mis
 
Mind reading computer ppt
Mind reading computer pptMind reading computer ppt
Mind reading computer ppt
 
Cybersquatting in India - Genesis & Legal Scenario
Cybersquatting in India - Genesis & Legal ScenarioCybersquatting in India - Genesis & Legal Scenario
Cybersquatting in India - Genesis & Legal Scenario
 
Cybersquatting
CybersquattingCybersquatting
Cybersquatting
 
Mobile Security
Mobile SecurityMobile Security
Mobile Security
 
Mind reading computer report
Mind reading computer reportMind reading computer report
Mind reading computer report
 

Semelhante a cell phone viruses and security

Treads to mobile network
Treads to mobile networkTreads to mobile network
Treads to mobile networkRAVITEJA828
 
Report on Mobile security
Report  on Mobile securityReport  on Mobile security
Report on Mobile securityKavita Rastogi
 
10940 img sytr12_mobile_malware
10940 img sytr12_mobile_malware10940 img sytr12_mobile_malware
10940 img sytr12_mobile_malwareSytelReplyUK
 
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?Do New Mobile Devices in Enterprises Pose A Serious Security Threat?
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?acijjournal
 
Smart phone and mobile device security
Smart phone and mobile device securitySmart phone and mobile device security
Smart phone and mobile device securityCAS
 
Wireless and mobile security
Wireless and mobile securityWireless and mobile security
Wireless and mobile securityPushkar Pashupat
 
Cyber Threat Intelligence: Highlights and Trends for 2020
Cyber Threat Intelligence: Highlights and Trends for 2020Cyber Threat Intelligence: Highlights and Trends for 2020
Cyber Threat Intelligence: Highlights and Trends for 2020DevOps.com
 
C0c0n 2011 mobile security presentation v1.2
C0c0n 2011 mobile  security presentation v1.2C0c0n 2011 mobile  security presentation v1.2
C0c0n 2011 mobile security presentation v1.2Santosh Satam
 
MOBILE SECURITY.pptx
MOBILE SECURITY.pptxMOBILE SECURITY.pptx
MOBILE SECURITY.pptxKakshaPatel3
 
IRJET- Android Device Attacks and Threats
IRJET-  	  Android Device Attacks and ThreatsIRJET-  	  Android Device Attacks and Threats
IRJET- Android Device Attacks and ThreatsIRJET Journal
 
VIRUS AND ITS TYPES.pptx
VIRUS AND ITS TYPES.pptxVIRUS AND ITS TYPES.pptx
VIRUS AND ITS TYPES.pptxSiddeshGowda8
 
Third Annual Mobile Threats Report
Third Annual Mobile Threats ReportThird Annual Mobile Threats Report
Third Annual Mobile Threats ReportJuniper Networks
 
Pocket virus threat
Pocket virus threatPocket virus threat
Pocket virus threatAli J
 
mobile or cellphones attacked by viruses,phishing,swishing-1.pptx
mobile or cellphones attacked by viruses,phishing,swishing-1.pptxmobile or cellphones attacked by viruses,phishing,swishing-1.pptx
mobile or cellphones attacked by viruses,phishing,swishing-1.pptxvrandmandora1
 

Semelhante a cell phone viruses and security (20)

Treads to mobile network
Treads to mobile networkTreads to mobile network
Treads to mobile network
 
Smartphone
SmartphoneSmartphone
Smartphone
 
Report on Mobile security
Report  on Mobile securityReport  on Mobile security
Report on Mobile security
 
Cp3201 mobile security final
Cp3201 mobile security finalCp3201 mobile security final
Cp3201 mobile security final
 
10940 img sytr12_mobile_malware
10940 img sytr12_mobile_malware10940 img sytr12_mobile_malware
10940 img sytr12_mobile_malware
 
Tips and Tricks on Securing your Android Devices
Tips and Tricks on Securing your Android DevicesTips and Tricks on Securing your Android Devices
Tips and Tricks on Securing your Android Devices
 
Top 6-Security-Threats-on-iOS
Top 6-Security-Threats-on-iOSTop 6-Security-Threats-on-iOS
Top 6-Security-Threats-on-iOS
 
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?Do New Mobile Devices in Enterprises Pose A Serious Security Threat?
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?
 
CS_UNIT 2(P3).pptx
CS_UNIT 2(P3).pptxCS_UNIT 2(P3).pptx
CS_UNIT 2(P3).pptx
 
Smart phone and mobile device security
Smart phone and mobile device securitySmart phone and mobile device security
Smart phone and mobile device security
 
Wireless and mobile security
Wireless and mobile securityWireless and mobile security
Wireless and mobile security
 
Cyber Threat Intelligence: Highlights and Trends for 2020
Cyber Threat Intelligence: Highlights and Trends for 2020Cyber Threat Intelligence: Highlights and Trends for 2020
Cyber Threat Intelligence: Highlights and Trends for 2020
 
C0c0n 2011 mobile security presentation v1.2
C0c0n 2011 mobile  security presentation v1.2C0c0n 2011 mobile  security presentation v1.2
C0c0n 2011 mobile security presentation v1.2
 
MOBILE SECURITY.pptx
MOBILE SECURITY.pptxMOBILE SECURITY.pptx
MOBILE SECURITY.pptx
 
IRJET- Android Device Attacks and Threats
IRJET-  	  Android Device Attacks and ThreatsIRJET-  	  Android Device Attacks and Threats
IRJET- Android Device Attacks and Threats
 
VIRUS AND ITS TYPES.pptx
VIRUS AND ITS TYPES.pptxVIRUS AND ITS TYPES.pptx
VIRUS AND ITS TYPES.pptx
 
Third Annual Mobile Threats Report
Third Annual Mobile Threats ReportThird Annual Mobile Threats Report
Third Annual Mobile Threats Report
 
Pocket virus threat
Pocket virus threatPocket virus threat
Pocket virus threat
 
mobile or cellphones attacked by viruses,phishing,swishing-1.pptx
mobile or cellphones attacked by viruses,phishing,swishing-1.pptxmobile or cellphones attacked by viruses,phishing,swishing-1.pptx
mobile or cellphones attacked by viruses,phishing,swishing-1.pptx
 
Unit-3.pptx
Unit-3.pptxUnit-3.pptx
Unit-3.pptx
 

Último

Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxCarlos105
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfErwinPantujan2
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
FILIPINO PSYCHology sikolohiyang pilipino
FILIPINO PSYCHology sikolohiyang pilipinoFILIPINO PSYCHology sikolohiyang pilipino
FILIPINO PSYCHology sikolohiyang pilipinojohnmickonozaleda
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parentsnavabharathschool99
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxHumphrey A Beña
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4MiaBumagat1
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxAshokKarra1
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management SystemChristalin Nelson
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptxiammrhaywood
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17Celine George
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptxSherlyMaeNeri
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfphamnguyenenglishnb
 

Último (20)

Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
FILIPINO PSYCHology sikolohiyang pilipino
FILIPINO PSYCHology sikolohiyang pilipinoFILIPINO PSYCHology sikolohiyang pilipino
FILIPINO PSYCHology sikolohiyang pilipino
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parents
 
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptxFINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptx
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management System
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptx
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
 

cell phone viruses and security

  • 1. Mobile viruses and security -Priyanka Rathod MOBILE VIRUSES AND SECURITY 1
  • 2. What is the common communication medium among us????????? MOBILE VIRUSES AND SECURITY 2
  • 3. A cell phone MOBILE VIRUSES AND SECURITY 3
  • 4. MOBILE VIRUSES AND SECURITY Cell phone viruses and security. 4
  • 5.  The technology of cell phones.  Viruses  How cell phone viruses work.  Difference with pc virus.  Different types of cell phone viruses.  Threats.  Security issue. MOBILE VIRUSES AND SECURITY 5
  • 6. (.)Analog network. (.)Digital network. MOBILE VIRUSES AND SECURITY 6
  • 7.  Today all provider has switched to digital network and only a few of them are still running analog network. MOBILE VIRUSES AND SECURITY 7
  • 8.  FDMA(Frequency division multiple access).  CDMA(Code-division multiple access.  TDMA(Time division multiple access).  GSM(Global system for mobile communication). MOBILE VIRUSES AND SECURITY 8
  • 9.  Cell phone virus are electronic programs that attacks the cell phones PDA (personal digital assistant) devices and malfunction s/w that are running cell phones. How they spread?  Internet download.  Bluetooth wireless connection.  Multimedia messaging service. MOBILE VIRUSES AND SECURITY 9
  • 10.  Unnecessary call/sms/mms.  Send private information.  Cause phone to work slowly.  Wipe out contact book and other information.  Installs “false” application MOBILE VIRUSES AND SECURITY 10
  • 11.  Although similar oses are being used differences exits:  Lesser user of cell phones are “tech literate”  Implies that it is difficult to “rollout security patches” to phones already sold.  Cell phones are always connected and “switched on”  “Environment” keeps changing MOBILE VIRUSES AND SECURITY 11
  • 12.  On positive side: A malware for 1 type of phone may not necessarily be able to infect other. Cellphone malware not yet causing severe harm:  At most they increases users billing  Cause the cell phone to stop working MOBILE VIRUSES AND SECURITY 12
  • 13.  Timifonica  Cabir  Commwarrior  Comwar  Duts  Skulls  Lasco.a MOBILE VIRUSES AND SECURITY 13
  • 14.  Firstcell phone worm.  Spread vector-Bluetooth. • Infected file-cabre.sis  15 new variants exits. MOBILE VIRUSES AND SECURITY 14
  • 15.  Location tracking  Camera and microphone bug  Leaking sensitive information  Attack on cell phone service provider. MOBILE VIRUSES AND SECURITY 15
  • 16. The generic security issues… MOBILE VIRUSES AND SECURITY 16
  • 17.  The best way to protect phones from cell viruses is the same way you protect your PCs from computer viruses.  Never open anything if you don’t know what it is….. MOBILE VIRUSES AND SECURITY 17
  • 18.  Turnoff Bluetooth discoverable mode  Keep your cell phone in hidden mode. MOBILE VIRUSES AND SECURITY 18
  • 19. WWW.GOOGLE.COM  WWW.WEKIPEDIA.COM MOBILE VIRUSES AND SECURITY 19