ºÝºÝߣ

ºÝºÝߣShare a Scribd company logo
MOBILE SECURITY
Introduction
? Mobile devices, such as smart phones and tablets,
typically need to support multiple security objectives:
1)Confidentiality
2)Integrity
3)availability
Targets for attackers
? Data
? Identity
? Availability
Attacks
Based on wi-fi
Based on network
Based on sms,mms
Based on vulnarabilities in software.
Sources to insecure phone
? Worms: A worm is a program that reproduces on
multiple computers across a network.
? Malware: A malware is a computer program that aims
to harm the system in which it resides.
? Viruses: virus is malicious software designed to spread
to other computers by inserting itself into legitimate
programs and running programs in parallel.
Malware
? Cabir
? Commwarrior
? Phage
? RedBrowser
? WinCE.PmCryptic
? CardTrap
Effect of malware
security mechanisms
? The threats prevented by the various measures are not
the same depending on the case. Considering the two
cases mentioned above:
1) one would protect the system from corruption by an
application.
2) The installation of a suspicious software would be
prevented.
Mechanism¡­¡­
? Rootkit Detectors.
? Process isolation.
? File permissions.
? Memory Protection.
? Development through runtime environments.
Security software
? Antivirus and firewall
? Visual Notifications
? Turing test
? Biometric identification
Continued¡­¡­.
? Resource monitoring in the smartphone
? Battery
? Memory usage
? Network traffic
Continued¡­..
? Services
? Network surveillance
? Spam filters
? Avoid heavily customized systems
Solutions¡­..
? Enable user authentication.
? Verify the authenticity of downloaded
applications.
? Install antimalware capability.
? Install a firewall.
Continued¡­.
? Remotely disable lost or stolen devices.
? Enable encryption for data stored on device or
memory card.
? Enable whitelisting.
? Provide mobile device security training.
Continued¡­¡­
? Perform risk assessments.
? Perform configuration control and management.
THANK YOU

More Related Content

Mobile security