Mobile devices face security threats from attacks based on WiFi, networks, SMS, MMS, and software vulnerabilities. Malware like viruses, worms, and malware can spread from insecure phones and target user data, identity, and availability. To improve security, mobile devices can enable user authentication, verify app authenticity, install antivirus and firewalls, enable encryption, and provide security training for users.
2. Introduction
? Mobile devices, such as smart phones and tablets,
typically need to support multiple security objectives:
1)Confidentiality
2)Integrity
3)availability
3. Targets for attackers
? Data
? Identity
? Availability
Attacks
Based on wi-fi
Based on network
Based on sms,mms
Based on vulnarabilities in software.
4. Sources to insecure phone
? Worms: A worm is a program that reproduces on
multiple computers across a network.
? Malware: A malware is a computer program that aims
to harm the system in which it resides.
? Viruses: virus is malicious software designed to spread
to other computers by inserting itself into legitimate
programs and running programs in parallel.
7. security mechanisms
? The threats prevented by the various measures are not
the same depending on the case. Considering the two
cases mentioned above:
1) one would protect the system from corruption by an
application.
2) The installation of a suspicious software would be
prevented.
12. Solutions¡..
? Enable user authentication.
? Verify the authenticity of downloaded
applications.
? Install antimalware capability.
? Install a firewall.
13. Continued¡.
? Remotely disable lost or stolen devices.
? Enable encryption for data stored on device or
memory card.
? Enable whitelisting.
? Provide mobile device security training.