This document provides an overview of mobile devices, including their history, types, operating systems, and security challenges. It discusses the evolution of mobile devices from the 1920s to present day. The main types of mobile devices and operating systems are described. The future of mobile is predicted to include more apps and touch/3D interfaces. Security issues facing mobile include attacks moving to take advantage of connectivity, valuable data and resources, and app ecosystems. Traditional hacker threats and location tracking possibilities are also covered.
2. Index
Introduction
TheHistory of MobileDevices
Typesof MobileDevices
Typesof Mobile OperatingSystems
TheFuture of MobileDevices
VISUALIZING MOBILE SECURITY
ATTACKS MOVING TO MOBILE – WHY?
Wi-Fi
SMART PHONE & MOBILE DEVICE THREATS
HACKERS – TRADITIONAL
SECURITY CHALLENGE OF SMART PHONE & MOBIL
DEVICE
4. history
It can be said thatthe mobile devices was born at
the same time the radio communication had been
invented.
The development of mobile devices starts fromthe
1920's, there are five stages.
5. Stage One
1920's-1940's
Based on several wave bands of shortwave, the private mobile
communication system had been invented.
The Detroit police car radio system is the representative one.
The frequency of this system is 2MHz at thattime. In the 1940's the
frequency had been risen to 30~40MHz.
Itis considered as the beginning of the modern mobile service.
6. Stage Two
1940's-1960's
The public mobile service came out.
1946 According to the plan of Federal Communications
Commission(FCC) the Bell system established the first public car
phone net inSt.Louis.
There was three channles in thattime, the mode wassimplex.
8. Stage Four
1970's-1980's( the peak time)
The Bell Labs successfully developed the
advanced mobile phonesystem(AMPS)
The cellular network builtup, improved the
capacity of thesystem.
The cellular network becames the utility system,
used in theworldwide.
9. Stage Four
Achivements in thisstage:
microelectronic technique got a significant development
which made the probability of miniaturization mobile devices
be true.
The new system of mobile communication----cellular
network
provide the technique for the manage and control of the large
size net
10. Stage Five
1980's-
The Digital Mobile Communication System(DMCS)
gets developed and mature in this period.
AMPS & TACS stand for the CellularNetworks
Ⅰ→analogsystem
11. Typesof Mobile Devices
Mobile Computers
Notebook PC,MobilePC…
Handheld GameConsoles
Media Recorders
Digital Camera, Digital Video Camera…
15. Micro computer
Personal computer - is any general-purpose computer whosesize,
capabilities, and original sales price make it useful forindividuals
Home SFF(net top) - designed to minimize the spatial volume of a
desktop computer.
Portable computer - designed to be moved from one place to another
and includes a display andkeyboard.
Arcade system board - created for the purpose of runningvideo arcade
games.
Video game console - is an interactive entertainment computeror
modified computer system
16. Mobile
Laptop - is a personal computer designed for mobile use.
Desktop replacement computer - provides most of the
capabilities of a desktop computer, with a similar level of performance.
Subnotebook(net book ,smart book) - designed andmarketed
with an emphasis onportability.
Tablet computer - calculator watch, wristop, virtual rentinaldisplay,
head-mounted display.
17. Information appliance
PDA (palm size PC,handheld PC,pocketcomputer)
- also known as a palmtop computer.
Mobile phone (smart phone, feature phone) -Amobile
phone (also called mobile, cellular telephone, or cell phone)
is an electronic device used to make mobile telephone calls
across a wide geographicarea.
P M P - A portable media player.
DAP-A digital audio player.
E-book reader - designed primarily for the purposeof
reading digital books andperiodicals.
Handheld gameconsole - allowing people to carry them
and play them at any time orplace.
18. Calculators
Scientific - designed to calculate problems in science(especiallyphysics),
engineering, and mathematics.
programmable- calculators capable of being programmed much like a
computer.
Graphing- capable of plotting graphs, solving simultaneous equations,
and performing numerous other tasks withvariables.
19. What is mobile operatingsystem?
Amobile operating system, also known asamobile OS, a
mobile platform, or ahandheld operating system, is the
operating system that controls amobile device or
information appliance
21. Themost common operating systems
o
SymbianOSSymbianFoundation
Android from GoogleInc.
iOSfrom Apple Inc.
RIMBlackBerry OS
Windows Mobile from Microsoft
Linux operating system
MeeGo from Nokia andIntel
22. Android
Always displayed before you download from Google Play
store
ie: “Why does this calorie counter need to access my camera
and phone calls?”
iOS
A little more secure
Apps now default to no permissions outside of theirsandbox
ie: “This app wants to use yourlocation."
Windows
App settings are viewable before install or through“Settings”
Similar toAndroid 9
23. Android
25.5%Market ShareSales
Q32010
Android is an opensource,
Linux-derived platform
backed by Google
along with majorhardware
and software developers
(such asIntel, HTC,ARM,
Samsung,Motorola and
eBay
28. Nokia and Intel both
unveiled 'MeeGo' abrand
new mobile operating
system which would
combine the best of
Moblin and the best of
Maemo to create atruly
open-sourced experience
for users acrossall
devices.
29. êUsageshare of web client
operating systems.(Source:
Median values from Usage
share of operating systems
for January2011.)
Windows XP(41.70%)
. Windows 7 (25.42%)
% Windows Vista (15.43%)
5 Mac OSX(6.92%)
5 iOS(iPhone) (2.05%)
0 Linux(1.64%)
30. 6.2.4 AUTHENTICATION: PATTERN
LOCK
Swipe path of length
4–9 on 3 x 3 grid
Easy to use, suitable for mobile
devices
Problems:
389,112 possible patterns; (456,976
possible patterns for 4-char case-
insensitive alphabetic password!)
Attacker can see pattern from finger
oils on screen
SMARTPHONEANDMOBILEDEVICESECURITY
24
31. Future
The mobile devices plays an indispensable role in
nowaday's life, meanwhile this field is still rapidly
developing. More app is going tobe added into.
In 2004 July 16, Japanese telephone company NTT
DoCoMo announced the P605iC phone which carried the
FeliCa soft. This phone opened the curtain of No Cards
Generation.
32. Future
Nowadays the manufactures of mobile devices are
devoting on touching screen and 3D effect.
More and moreAPP will be added intothe mobile devices,
make people's life much more convenient and fun.
33. VISUALIZING MOBILE SECURITY
There are three points of control.
SMART PHONE AND MOBILE DEVICE SECURITY
•
•
•
On the left you have device security, protecting both the device and the data.
On the top right you have mobile application security which includes secure
application development and analyzing applications for security risk.
The bottom right highlights the need for to provide secure access to applications
•
and data.
They are all interlinked and interconnected.
4
34. ATTACKS MOVING TO MOBILE – WHY?
SMART PHONE AND MOBILE
DEVICE SECURITY
3.1 Mobile devices are connection-enabled
3G/LTE
Bluetooth
Camera – QR Code
Wi-Fi
NFC
GSM – SMS
3.2 Valuable data
Phone information - IMEI, Phone number, SMS history, etc.
Contact list - Social engineering, Spam database
Geo-location information - Spy, Track history
Images/Camera - Spy, Surrounding environment
3.3 Valuable resource
High speed CPU
Powerful computing
Always-On Internet connection
o
l
3.4 Smart OS eco-system
App store market : Easy access / Simple
install
Awareness : Permission review / Security to s
flash, etc.
PC threats in mobile: email, links,brows5
ers,
35. Wi-Fi
Carriers collect WIFI network names/BSSIDs and correlating
GPS data
Fine-tune location
Can be usedindoors
Google got in trouble in 2010 for collecting data with their
StreetView cars
Decided it was simpler to use mobile devices
Enormous userbase
Constantly updated
8
36. 5. SMART PHONE & MOBILE DEVICE THREATS
Four MajorActors
Government agencies
Carriers/Providers
Hackers
Thieves
11
37. HACKERS - TRADITIONAL
Network-Based
Normal web-based rules apply
Beware public Wi-Finetworks
App security is getting bettereveryday
A lot of unencrypted sensitive traffic is still sent and
received
Major hole in iOS7 < 7.0.6 / iOS6 <6.1.6
70% of Android devices in circulation
Affected by known, remote code execution vulnerability
Beware QR Codes!
14
38. SECURITY CHALLENGE OF SMART PHONE & MOBILE DEVICE
•
•
•
•
•
•
1 in 20 Mobile devices stolen in 2010.
70% of Mobile device spam is fraudulent financial services.
350% by which Wi-Fi hotspots are set to increase by 2015, providing
more opportunities for “man-in-the middle” attacks.
155% by which mobile malware increased 2011.
77% growth in Google Android malware from Jun 2010 to Jan 2011.
10 Billion Android app downloads reached by the end of 2011 – over
90% of the top 100 have been hacked.
Source: Evans Data Mobile Developer Survey Mobile Development Report 2012 Volume
Source: Business Insider (September 2012)
3
39. a) GPS
Most obvious
Pretty accurate outdoors, but not so much indoors
Very useful
Third party applications use GPS for correlation
Sometimes stored locally and accessible.
b) CELL-NETWORK
Tower Triangulation
Can be used alongside GPS
Mandatory use in emergencies
Law enforcement
Carriers
As long as you have a phone, this information is available
Sometimes legalities or warrants involved
7
40. b) SOCIAL MEDIA
The success of mobile devices and global rise of socialmedia
are unquestionably intertwined
Outside of the obvious personal data
Geo-tagged updates on Facebook andTwitter
Facebook Graph search makes hiding online much more
difficult
LinkedIn open by default
Useful tool for social engineers
Site is scraped for names and corporate structure 10