SlideShare a Scribd company logo
1 of 40
Mobile Devices
Kaushal desai
Index
Introduction
TheHistory of MobileDevices
Typesof MobileDevices
Typesof Mobile OperatingSystems
TheFuture of MobileDevices
VISUALIZING MOBILE SECURITY
ATTACKS MOVING TO MOBILE – WHY?
Wi-Fi
SMART PHONE & MOBILE DEVICE THREATS
HACKERS – TRADITIONAL
SECURITY CHALLENGE OF SMART PHONE & MOBIL
DEVICE
Introduction
Mobile Device?
 Apocket-sized computing device, typically having adisplay
screen with touch input or aminiaturekeyboard
history
It can be said thatthe mobile devices was born at
the same time the radio communication had been
invented.
The development of mobile devices starts fromthe
1920's, there are five stages.
Stage One
1920's-1940's
 Based on several wave bands of shortwave, the private mobile
communication system had been invented.
 The Detroit police car radio system is the representative one.
 The frequency of this system is 2MHz at thattime. In the 1940's the
frequency had been risen to 30~40MHz.
 Itis considered as the beginning of the modern mobile service.
Stage Two
1940's-1960's
 The public mobile service came out.
 1946 According to the plan of Federal Communications
Commission(FCC) the Bell system established the first public car
phone net inSt.Louis.
 There was three channles in thattime, the mode wassimplex.
Stage Three
1960's-1970's
America improved the mobile telephony
system(1MTS)
This period complete :
automatic channel choose
automatic dialing tothenet
Stage Four
1970's-1980's( the peak time)
The Bell Labs successfully developed the
advanced mobile phonesystem(AMPS)
The cellular network builtup, improved the
capacity of thesystem.
The cellular network becames the utility system,
used in theworldwide.
Stage Four
Achivements in thisstage:
 microelectronic technique got a significant development
which made the probability of miniaturization mobile devices
be true.
 The new system of mobile communication----cellular
network
 provide the technique for the manage and control of the large
size net
Stage Five
1980's-
The Digital Mobile Communication System(DMCS)
gets developed and mature in this period.
AMPS & TACS stand for the CellularNetworks
Ⅰ→analogsystem
Typesof Mobile Devices
Mobile Computers
 Notebook PC,MobilePC…
Handheld GameConsoles
Media Recorders
 Digital Camera, Digital Video Camera…
Contd…
Media Players/Displayers
 E-book Reader…
Communication Devices
 Mobile Phone,Pager…
Personal Navigation Devices
Different Sizes& Typesof
Mobile
• Computer size
• Micro computer
• Mobile
• Informationappliance
• Calculators
Largecomputer
super computer- Thefastest type of computer.
Minisuper computer - constituted a short-lived class of
computers that emerged in themid-1980s
Micro computer
 Personal computer - is any general-purpose computer whosesize,
capabilities, and original sales price make it useful forindividuals
 Home SFF(net top) - designed to minimize the spatial volume of a
desktop computer.
 Portable computer - designed to be moved from one place to another
and includes a display andkeyboard.
 Arcade system board - created for the purpose of runningvideo arcade
games.
 Video game console - is an interactive entertainment computeror
modified computer system
Mobile
Laptop - is a personal computer designed for mobile use.
Desktop replacement computer - provides most of the
capabilities of a desktop computer, with a similar level of performance.
Subnotebook(net book ,smart book) - designed andmarketed
with an emphasis onportability.
Tablet computer - calculator watch, wristop, virtual rentinaldisplay,
head-mounted display.
Information appliance
PDA (palm size PC,handheld PC,pocketcomputer)
- also known as a palmtop computer.
Mobile phone (smart phone, feature phone) -Amobile
phone (also called mobile, cellular telephone, or cell phone)
is an electronic device used to make mobile telephone calls
across a wide geographicarea.
P M P - A portable media player.
DAP-A digital audio player.
E-book reader - designed primarily for the purposeof
reading digital books andperiodicals.
Handheld gameconsole - allowing people to carry them
and play them at any time orplace.
Calculators
Scientific - designed to calculate problems in science(especiallyphysics),
engineering, and mathematics.
programmable- calculators capable of being programmed much like a
computer.
Graphing- capable of plotting graphs, solving simultaneous equations,
and performing numerous other tasks withvariables.
What is mobile operatingsystem?
Amobile operating system, also known asamobile OS, a
mobile platform, or ahandheld operating system, is the
operating system that controls amobile device or
information appliance
Smartphone Operating Systems
Themost common operating systems
o
SymbianOSSymbianFoundation
Android from GoogleInc.
iOSfrom Apple Inc.
RIMBlackBerry OS
Windows Mobile from Microsoft
Linux operating system
MeeGo from Nokia andIntel
 Android
Always displayed before you download from Google Play
store
 ie: “Why does this calorie counter need to access my camera
and phone calls?”
 iOS
 A little more secure
 Apps now default to no permissions outside of theirsandbox
 ie: “This app wants to use yourlocation."
 Windows
 App settings are viewable before install or through“Settings”
Similar toAndroid 9
Android
25.5%Market ShareSales
Q32010
Android is an opensource,
Linux-derived platform
backed by Google
along with majorhardware
and software developers
(such asIntel, HTC,ARM,
Samsung,Motorola and
eBay
iOS
16.7%Market ShareSales
Q32010
TheApple iPhone, iPod
Touch and iPad all usean
operating system
RIM BlackBerry OS
Originally designedfor
business
Recently hasbeen
improved to offerfull
multimedia support
Over 15,000
downloadable
applications
Windows phone
(2.8% Market ShareSales
Q32010)
Widely spread inAsia
Support both touch
screen and physical
keyboard configurations
Linux operating system
open source,GPL(2.1%
Market ShareSalesQ3
2010, non-Android
Linux-based OS'sonly)
Nokia and Intel both
unveiled 'MeeGo' abrand
new mobile operating
system which would
combine the best of
Moblin and the best of
Maemo to create atruly
open-sourced experience
for users acrossall
devices.
êUsageshare of web client
operating systems.(Source:
Median values from Usage
share of operating systems
for January2011.)
Windows XP(41.70%)
. Windows 7 (25.42%)
% Windows Vista (15.43%)
5 Mac OSX(6.92%)
5 iOS(iPhone) (2.05%)
0 Linux(1.64%)
6.2.4 AUTHENTICATION: PATTERN
LOCK
 Swipe path of length
4–9 on 3 x 3 grid
 Easy to use, suitable for mobile
devices
 Problems:
 389,112 possible patterns; (456,976
possible patterns for 4-char case-
insensitive alphabetic password!)
Attacker can see pattern from finger
oils on screen
SMARTPHONEANDMOBILEDEVICESECURITY
24
Future
The mobile devices plays an indispensable role in
nowaday's life, meanwhile this field is still rapidly
developing. More app is going tobe added into.
In 2004 July 16, Japanese telephone company NTT
DoCoMo announced the P605iC phone which carried the
FeliCa soft. This phone opened the curtain of No Cards
Generation.
Future
Nowadays the manufactures of mobile devices are
devoting on touching screen and 3D effect.
More and moreAPP will be added intothe mobile devices,
make people's life much more convenient and fun.
VISUALIZING MOBILE SECURITY
There are three points of control.
SMART PHONE AND MOBILE DEVICE SECURITY
•
•
•
On the left you have device security, protecting both the device and the data.
On the top right you have mobile application security which includes secure
application development and analyzing applications for security risk.
The bottom right highlights the need for to provide secure access to applications
•
and data.
They are all interlinked and interconnected.
4
ATTACKS MOVING TO MOBILE – WHY?
SMART PHONE AND MOBILE
DEVICE SECURITY
3.1 Mobile devices are connection-enabled
3G/LTE
Bluetooth
Camera – QR Code
Wi-Fi
NFC
GSM – SMS
3.2 Valuable data
Phone information - IMEI, Phone number, SMS history, etc.
Contact list - Social engineering, Spam database
Geo-location information - Spy, Track history
Images/Camera - Spy, Surrounding environment
3.3 Valuable resource
High speed CPU
Powerful computing
Always-On Internet connection
o
l
3.4 Smart OS eco-system
 App store market : Easy access / Simple
install
Awareness : Permission review / Security to s
flash, etc.
 PC threats in mobile: email, links,brows5
ers,
Wi-Fi
Carriers collect WIFI network names/BSSIDs and correlating
GPS data
Fine-tune location
 Can be usedindoors
Google got in trouble in 2010 for collecting data with their
StreetView cars
Decided it was simpler to use mobile devices
Enormous userbase
Constantly updated
8
5. SMART PHONE & MOBILE DEVICE THREATS
Four MajorActors
 Government agencies
 Carriers/Providers
 Hackers
 Thieves
11
HACKERS - TRADITIONAL
 Network-Based
Normal web-based rules apply
Beware public Wi-Finetworks
 App security is getting bettereveryday
 A lot of unencrypted sensitive traffic is still sent and
received
Major hole in iOS7 < 7.0.6 / iOS6 <6.1.6
 70% of Android devices in circulation
Affected by known, remote code execution vulnerability
 Beware QR Codes!
14
SECURITY CHALLENGE OF SMART PHONE & MOBILE DEVICE
•
•
•
•
•
•
1 in 20 Mobile devices stolen in 2010.
70% of Mobile device spam is fraudulent financial services.
350% by which Wi-Fi hotspots are set to increase by 2015, providing
more opportunities for “man-in-the middle” attacks.
155% by which mobile malware increased 2011.
77% growth in Google Android malware from Jun 2010 to Jan 2011.
10 Billion Android app downloads reached by the end of 2011 – over
90% of the top 100 have been hacked.
Source: Evans Data Mobile Developer Survey Mobile Development Report 2012 Volume
Source: Business Insider (September 2012)
3
a) GPS
 Most obvious
 Pretty accurate outdoors, but not so much indoors
 Very useful
 Third party applications use GPS for correlation
 Sometimes stored locally and accessible.
b) CELL-NETWORK
 Tower Triangulation
 Can be used alongside GPS
 Mandatory use in emergencies
 Law enforcement
 Carriers
 As long as you have a phone, this information is available
 Sometimes legalities or warrants involved
7
b) SOCIAL MEDIA
 The success of mobile devices and global rise of socialmedia
are unquestionably intertwined
Outside of the obvious personal data
Geo-tagged updates on Facebook andTwitter
Facebook Graph search makes hiding online much more
difficult
LinkedIn open by default
Useful tool for social engineers
 Site is scraped for names and corporate structure 10

More Related Content

What's hot

Mobile os upcoming tech
Mobile os upcoming techMobile os upcoming tech
Mobile os upcoming techAnuj Malhotra
 
Smartphone 110810195522-phpapp02
Smartphone 110810195522-phpapp02Smartphone 110810195522-phpapp02
Smartphone 110810195522-phpapp02Ramya Shet J
 
The Smartphone Snapshot Showdown (Global Smartphone and Mobile Video Stats)
The Smartphone Snapshot Showdown (Global Smartphone and Mobile Video Stats)The Smartphone Snapshot Showdown (Global Smartphone and Mobile Video Stats)
The Smartphone Snapshot Showdown (Global Smartphone and Mobile Video Stats)Jon Hoehler
 
Virtual Merchant Mobile Swipe Solution
Virtual Merchant Mobile Swipe SolutionVirtual Merchant Mobile Swipe Solution
Virtual Merchant Mobile Swipe Solutiongreatdaniel
 
Smartphone Component Trends and Outlook (Sept 2013)
Smartphone Component Trends and Outlook (Sept 2013)Smartphone Component Trends and Outlook (Sept 2013)
Smartphone Component Trends and Outlook (Sept 2013)JonCarvinzer
 
Are you Smart Phone savvy?
Are you Smart Phone savvy?Are you Smart Phone savvy?
Are you Smart Phone savvy?Simon Lock
 
L01 New Technology 2017 Course Description
L01 New Technology 2017 Course DescriptionL01 New Technology 2017 Course Description
L01 New Technology 2017 Course DescriptionÓlafur Andri Ragnarsson
 
Introduction to mobile technology
Introduction to mobile technologyIntroduction to mobile technology
Introduction to mobile technologyGautam Krishnan
 
Mobile testing
Mobile testingMobile testing
Mobile testingAlex Hung
 
Introduction to Mobile
Introduction to MobileIntroduction to Mobile
Introduction to MobileTayyab Tahir
 
The Smartphone Economy
The Smartphone EconomyThe Smartphone Economy
The Smartphone EconomyRed Magma
 
Mobile World Congress 2011 Overview
Mobile World Congress 2011 OverviewMobile World Congress 2011 Overview
Mobile World Congress 2011 OverviewBhavya Siddappa
 
Artist l1mobilecomputing
Artist l1mobilecomputingArtist l1mobilecomputing
Artist l1mobilecomputingMeg Riegel
 
Presentation on mobile phones
Presentation on mobile phonesPresentation on mobile phones
Presentation on mobile phonessirtwinkles
 
Mobile Ecosystem
Mobile EcosystemMobile Ecosystem
Mobile EcosystemPragati Rai
 
mobile hardware
mobile hardwaremobile hardware
mobile hardwareRahul S
 

What's hot (20)

Mobile os upcoming tech
Mobile os upcoming techMobile os upcoming tech
Mobile os upcoming tech
 
Smartphone 110810195522-phpapp02
Smartphone 110810195522-phpapp02Smartphone 110810195522-phpapp02
Smartphone 110810195522-phpapp02
 
The Smartphone Snapshot Showdown (Global Smartphone and Mobile Video Stats)
The Smartphone Snapshot Showdown (Global Smartphone and Mobile Video Stats)The Smartphone Snapshot Showdown (Global Smartphone and Mobile Video Stats)
The Smartphone Snapshot Showdown (Global Smartphone and Mobile Video Stats)
 
Smartphone and their market
Smartphone and their marketSmartphone and their market
Smartphone and their market
 
Virtual Merchant Mobile Swipe Solution
Virtual Merchant Mobile Swipe SolutionVirtual Merchant Mobile Swipe Solution
Virtual Merchant Mobile Swipe Solution
 
Smartphone Component Trends and Outlook (Sept 2013)
Smartphone Component Trends and Outlook (Sept 2013)Smartphone Component Trends and Outlook (Sept 2013)
Smartphone Component Trends and Outlook (Sept 2013)
 
Are you Smart Phone savvy?
Are you Smart Phone savvy?Are you Smart Phone savvy?
Are you Smart Phone savvy?
 
L01 New Technology 2017 Course Description
L01 New Technology 2017 Course DescriptionL01 New Technology 2017 Course Description
L01 New Technology 2017 Course Description
 
Introduction to mobile technology
Introduction to mobile technologyIntroduction to mobile technology
Introduction to mobile technology
 
Mobile testing
Mobile testingMobile testing
Mobile testing
 
Introduction to Mobile
Introduction to MobileIntroduction to Mobile
Introduction to Mobile
 
Hardware1n
Hardware1nHardware1n
Hardware1n
 
Network
Network Network
Network
 
Mobile phone
Mobile phoneMobile phone
Mobile phone
 
The Smartphone Economy
The Smartphone EconomyThe Smartphone Economy
The Smartphone Economy
 
Mobile World Congress 2011 Overview
Mobile World Congress 2011 OverviewMobile World Congress 2011 Overview
Mobile World Congress 2011 Overview
 
Artist l1mobilecomputing
Artist l1mobilecomputingArtist l1mobilecomputing
Artist l1mobilecomputing
 
Presentation on mobile phones
Presentation on mobile phonesPresentation on mobile phones
Presentation on mobile phones
 
Mobile Ecosystem
Mobile EcosystemMobile Ecosystem
Mobile Ecosystem
 
mobile hardware
mobile hardwaremobile hardware
mobile hardware
 

Similar to The Complete Guide to Mobile Devices, Operating Systems and Security

Mobile devices ppt
Mobile devices pptMobile devices ppt
Mobile devices pptim_mi
 
Chapter#01 Introduction, Basic Concepts, Mobile OS (1).pptx
Chapter#01 Introduction, Basic Concepts, Mobile OS (1).pptxChapter#01 Introduction, Basic Concepts, Mobile OS (1).pptx
Chapter#01 Introduction, Basic Concepts, Mobile OS (1).pptxTayyab AlEe
 
Operating Systems in Mobile Phones
Operating Systems in Mobile PhonesOperating Systems in Mobile Phones
Operating Systems in Mobile PhonesSasukeJUchiha
 
Mobile Operating Systems
Mobile Operating Systems Mobile Operating Systems
Mobile Operating Systems Anant Lodha
 
Securing hand held computing devices
Securing hand held computing devicesSecuring hand held computing devices
Securing hand held computing devicesjraja01
 
Mobile 111229042626-phpapp02
Mobile 111229042626-phpapp02Mobile 111229042626-phpapp02
Mobile 111229042626-phpapp02Rajasekar Sekaran
 
Freescale i.mx golden presentation for blogger july 2011
Freescale i.mx golden presentation for blogger july 2011Freescale i.mx golden presentation for blogger july 2011
Freescale i.mx golden presentation for blogger july 2011Dylan Ko
 
Mobile computing The brief explanation of mobile computing and how it used
Mobile computing The brief explanation of mobile computing and how it usedMobile computing The brief explanation of mobile computing and how it used
Mobile computing The brief explanation of mobile computing and how it usedAsyathShahina
 
Vulnerabilities in Mobile Devices
Vulnerabilities in Mobile DevicesVulnerabilities in Mobile Devices
Vulnerabilities in Mobile DevicesCSCJournals
 
Open-RnD Mobile Offer
Open-RnD Mobile OfferOpen-RnD Mobile Offer
Open-RnD Mobile OfferOpen-RnD
 
Welcome To The Mobile World
Welcome To The Mobile WorldWelcome To The Mobile World
Welcome To The Mobile WorldFrank La Vigne
 
551_MH_overview_handout.ppt
551_MH_overview_handout.ppt551_MH_overview_handout.ppt
551_MH_overview_handout.pptNiloyMondal10
 

Similar to The Complete Guide to Mobile Devices, Operating Systems and Security (20)

Mobile devices ppt
Mobile devices pptMobile devices ppt
Mobile devices ppt
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
 
Smartphones
SmartphonesSmartphones
Smartphones
 
Chapter#01 Introduction, Basic Concepts, Mobile OS (1).pptx
Chapter#01 Introduction, Basic Concepts, Mobile OS (1).pptxChapter#01 Introduction, Basic Concepts, Mobile OS (1).pptx
Chapter#01 Introduction, Basic Concepts, Mobile OS (1).pptx
 
smart phone
smart phonesmart phone
smart phone
 
Operating Systems in Mobile Phones
Operating Systems in Mobile PhonesOperating Systems in Mobile Phones
Operating Systems in Mobile Phones
 
Mobile Operating Systems
Mobile Operating Systems Mobile Operating Systems
Mobile Operating Systems
 
Securing hand held computing devices
Securing hand held computing devicesSecuring hand held computing devices
Securing hand held computing devices
 
Smart phone
Smart phoneSmart phone
Smart phone
 
onlineshoping.pptx
onlineshoping.pptxonlineshoping.pptx
onlineshoping.pptx
 
Mobile 111229042626-phpapp02
Mobile 111229042626-phpapp02Mobile 111229042626-phpapp02
Mobile 111229042626-phpapp02
 
Freescale i.mx golden presentation for blogger july 2011
Freescale i.mx golden presentation for blogger july 2011Freescale i.mx golden presentation for blogger july 2011
Freescale i.mx golden presentation for blogger july 2011
 
Mobile computing The brief explanation of mobile computing and how it used
Mobile computing The brief explanation of mobile computing and how it usedMobile computing The brief explanation of mobile computing and how it used
Mobile computing The brief explanation of mobile computing and how it used
 
Smart phone
Smart phoneSmart phone
Smart phone
 
Vulnerabilities in Mobile Devices
Vulnerabilities in Mobile DevicesVulnerabilities in Mobile Devices
Vulnerabilities in Mobile Devices
 
Smartphones 2015
Smartphones 2015Smartphones 2015
Smartphones 2015
 
Open-RnD Mobile Offer
Open-RnD Mobile OfferOpen-RnD Mobile Offer
Open-RnD Mobile Offer
 
Welcome To The Mobile World
Welcome To The Mobile WorldWelcome To The Mobile World
Welcome To The Mobile World
 
Prezentare 1 - LTM
Prezentare 1 - LTMPrezentare 1 - LTM
Prezentare 1 - LTM
 
551_MH_overview_handout.ppt
551_MH_overview_handout.ppt551_MH_overview_handout.ppt
551_MH_overview_handout.ppt
 

Recently uploaded

"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 

Recently uploaded (20)

"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 

The Complete Guide to Mobile Devices, Operating Systems and Security

  • 2. Index Introduction TheHistory of MobileDevices Typesof MobileDevices Typesof Mobile OperatingSystems TheFuture of MobileDevices VISUALIZING MOBILE SECURITY ATTACKS MOVING TO MOBILE – WHY? Wi-Fi SMART PHONE & MOBILE DEVICE THREATS HACKERS – TRADITIONAL SECURITY CHALLENGE OF SMART PHONE & MOBIL DEVICE
  • 3. Introduction Mobile Device?  Apocket-sized computing device, typically having adisplay screen with touch input or aminiaturekeyboard
  • 4. history It can be said thatthe mobile devices was born at the same time the radio communication had been invented. The development of mobile devices starts fromthe 1920's, there are five stages.
  • 5. Stage One 1920's-1940's  Based on several wave bands of shortwave, the private mobile communication system had been invented.  The Detroit police car radio system is the representative one.  The frequency of this system is 2MHz at thattime. In the 1940's the frequency had been risen to 30~40MHz.  Itis considered as the beginning of the modern mobile service.
  • 6. Stage Two 1940's-1960's  The public mobile service came out.  1946 According to the plan of Federal Communications Commission(FCC) the Bell system established the first public car phone net inSt.Louis.  There was three channles in thattime, the mode wassimplex.
  • 7. Stage Three 1960's-1970's America improved the mobile telephony system(1MTS) This period complete : automatic channel choose automatic dialing tothenet
  • 8. Stage Four 1970's-1980's( the peak time) The Bell Labs successfully developed the advanced mobile phonesystem(AMPS) The cellular network builtup, improved the capacity of thesystem. The cellular network becames the utility system, used in theworldwide.
  • 9. Stage Four Achivements in thisstage:  microelectronic technique got a significant development which made the probability of miniaturization mobile devices be true.  The new system of mobile communication----cellular network  provide the technique for the manage and control of the large size net
  • 10. Stage Five 1980's- The Digital Mobile Communication System(DMCS) gets developed and mature in this period. AMPS & TACS stand for the CellularNetworks Ⅰ→analogsystem
  • 11. Typesof Mobile Devices Mobile Computers  Notebook PC,MobilePC… Handheld GameConsoles Media Recorders  Digital Camera, Digital Video Camera…
  • 12. Contd… Media Players/Displayers  E-book Reader… Communication Devices  Mobile Phone,Pager… Personal Navigation Devices
  • 13. Different Sizes& Typesof Mobile • Computer size • Micro computer • Mobile • Informationappliance • Calculators
  • 14. Largecomputer super computer- Thefastest type of computer. Minisuper computer - constituted a short-lived class of computers that emerged in themid-1980s
  • 15. Micro computer  Personal computer - is any general-purpose computer whosesize, capabilities, and original sales price make it useful forindividuals  Home SFF(net top) - designed to minimize the spatial volume of a desktop computer.  Portable computer - designed to be moved from one place to another and includes a display andkeyboard.  Arcade system board - created for the purpose of runningvideo arcade games.  Video game console - is an interactive entertainment computeror modified computer system
  • 16. Mobile Laptop - is a personal computer designed for mobile use. Desktop replacement computer - provides most of the capabilities of a desktop computer, with a similar level of performance. Subnotebook(net book ,smart book) - designed andmarketed with an emphasis onportability. Tablet computer - calculator watch, wristop, virtual rentinaldisplay, head-mounted display.
  • 17. Information appliance PDA (palm size PC,handheld PC,pocketcomputer) - also known as a palmtop computer. Mobile phone (smart phone, feature phone) -Amobile phone (also called mobile, cellular telephone, or cell phone) is an electronic device used to make mobile telephone calls across a wide geographicarea. P M P - A portable media player. DAP-A digital audio player. E-book reader - designed primarily for the purposeof reading digital books andperiodicals. Handheld gameconsole - allowing people to carry them and play them at any time orplace.
  • 18. Calculators Scientific - designed to calculate problems in science(especiallyphysics), engineering, and mathematics. programmable- calculators capable of being programmed much like a computer. Graphing- capable of plotting graphs, solving simultaneous equations, and performing numerous other tasks withvariables.
  • 19. What is mobile operatingsystem? Amobile operating system, also known asamobile OS, a mobile platform, or ahandheld operating system, is the operating system that controls amobile device or information appliance
  • 21. Themost common operating systems o SymbianOSSymbianFoundation Android from GoogleInc. iOSfrom Apple Inc. RIMBlackBerry OS Windows Mobile from Microsoft Linux operating system MeeGo from Nokia andIntel
  • 22.  Android Always displayed before you download from Google Play store  ie: “Why does this calorie counter need to access my camera and phone calls?”  iOS  A little more secure  Apps now default to no permissions outside of theirsandbox  ie: “This app wants to use yourlocation."  Windows  App settings are viewable before install or through“Settings” Similar toAndroid 9
  • 23. Android 25.5%Market ShareSales Q32010 Android is an opensource, Linux-derived platform backed by Google along with majorhardware and software developers (such asIntel, HTC,ARM, Samsung,Motorola and eBay
  • 24. iOS 16.7%Market ShareSales Q32010 TheApple iPhone, iPod Touch and iPad all usean operating system
  • 25. RIM BlackBerry OS Originally designedfor business Recently hasbeen improved to offerfull multimedia support Over 15,000 downloadable applications
  • 26. Windows phone (2.8% Market ShareSales Q32010) Widely spread inAsia Support both touch screen and physical keyboard configurations
  • 27. Linux operating system open source,GPL(2.1% Market ShareSalesQ3 2010, non-Android Linux-based OS'sonly)
  • 28. Nokia and Intel both unveiled 'MeeGo' abrand new mobile operating system which would combine the best of Moblin and the best of Maemo to create atruly open-sourced experience for users acrossall devices.
  • 29. êUsageshare of web client operating systems.(Source: Median values from Usage share of operating systems for January2011.) Windows XP(41.70%) . Windows 7 (25.42%) % Windows Vista (15.43%) 5 Mac OSX(6.92%) 5 iOS(iPhone) (2.05%) 0 Linux(1.64%)
  • 30. 6.2.4 AUTHENTICATION: PATTERN LOCK  Swipe path of length 4–9 on 3 x 3 grid  Easy to use, suitable for mobile devices  Problems:  389,112 possible patterns; (456,976 possible patterns for 4-char case- insensitive alphabetic password!) Attacker can see pattern from finger oils on screen SMARTPHONEANDMOBILEDEVICESECURITY 24
  • 31. Future The mobile devices plays an indispensable role in nowaday's life, meanwhile this field is still rapidly developing. More app is going tobe added into. In 2004 July 16, Japanese telephone company NTT DoCoMo announced the P605iC phone which carried the FeliCa soft. This phone opened the curtain of No Cards Generation.
  • 32. Future Nowadays the manufactures of mobile devices are devoting on touching screen and 3D effect. More and moreAPP will be added intothe mobile devices, make people's life much more convenient and fun.
  • 33. VISUALIZING MOBILE SECURITY There are three points of control. SMART PHONE AND MOBILE DEVICE SECURITY • • • On the left you have device security, protecting both the device and the data. On the top right you have mobile application security which includes secure application development and analyzing applications for security risk. The bottom right highlights the need for to provide secure access to applications • and data. They are all interlinked and interconnected. 4
  • 34. ATTACKS MOVING TO MOBILE – WHY? SMART PHONE AND MOBILE DEVICE SECURITY 3.1 Mobile devices are connection-enabled 3G/LTE Bluetooth Camera – QR Code Wi-Fi NFC GSM – SMS 3.2 Valuable data Phone information - IMEI, Phone number, SMS history, etc. Contact list - Social engineering, Spam database Geo-location information - Spy, Track history Images/Camera - Spy, Surrounding environment 3.3 Valuable resource High speed CPU Powerful computing Always-On Internet connection o l 3.4 Smart OS eco-system  App store market : Easy access / Simple install Awareness : Permission review / Security to s flash, etc.  PC threats in mobile: email, links,brows5 ers,
  • 35. Wi-Fi Carriers collect WIFI network names/BSSIDs and correlating GPS data Fine-tune location  Can be usedindoors Google got in trouble in 2010 for collecting data with their StreetView cars Decided it was simpler to use mobile devices Enormous userbase Constantly updated 8
  • 36. 5. SMART PHONE & MOBILE DEVICE THREATS Four MajorActors  Government agencies  Carriers/Providers  Hackers  Thieves 11
  • 37. HACKERS - TRADITIONAL  Network-Based Normal web-based rules apply Beware public Wi-Finetworks  App security is getting bettereveryday  A lot of unencrypted sensitive traffic is still sent and received Major hole in iOS7 < 7.0.6 / iOS6 <6.1.6  70% of Android devices in circulation Affected by known, remote code execution vulnerability  Beware QR Codes! 14
  • 38. SECURITY CHALLENGE OF SMART PHONE & MOBILE DEVICE • • • • • • 1 in 20 Mobile devices stolen in 2010. 70% of Mobile device spam is fraudulent financial services. 350% by which Wi-Fi hotspots are set to increase by 2015, providing more opportunities for “man-in-the middle” attacks. 155% by which mobile malware increased 2011. 77% growth in Google Android malware from Jun 2010 to Jan 2011. 10 Billion Android app downloads reached by the end of 2011 – over 90% of the top 100 have been hacked. Source: Evans Data Mobile Developer Survey Mobile Development Report 2012 Volume Source: Business Insider (September 2012) 3
  • 39. a) GPS  Most obvious  Pretty accurate outdoors, but not so much indoors  Very useful  Third party applications use GPS for correlation  Sometimes stored locally and accessible. b) CELL-NETWORK  Tower Triangulation  Can be used alongside GPS  Mandatory use in emergencies  Law enforcement  Carriers  As long as you have a phone, this information is available  Sometimes legalities or warrants involved 7
  • 40. b) SOCIAL MEDIA  The success of mobile devices and global rise of socialmedia are unquestionably intertwined Outside of the obvious personal data Geo-tagged updates on Facebook andTwitter Facebook Graph search makes hiding online much more difficult LinkedIn open by default Useful tool for social engineers  Site is scraped for names and corporate structure 10