Vulnerabilities in Mobile Applications and Input Systems

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

How to protect yourself, your computer, and others on the internet
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
INTERNET SAFETY.
Computer Ethics Ms. Scales. Computer Ethics Ethics  the right thing to do Acceptable Use Policy  A set of rules and guidelines that are set up to regulate.
Computer Threats I can understand computer threats and how to protect myself from these threats.
Personal Security on the Internet. Introduction What is InfoSec? Information Security (InfoSec) is: –Protection of information –Its critical elements.
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
COMPUTER CRIME AND TYPES OF CRIME Prepared by: NURUL FATIHAH BT ANAS.
Internet safety By Lydia Snowden.
Introduction Our Topic: Mobile Security Why is mobile security important?
Cyber Crimes.
UNDERSTANDING THE RISKS & CHALLENGES OF Cyber Security DAVID NIMMO InDepth IT Solutions DAVID HIGGINS WatchGuard NEIL PARKER BridgePoint Group A BridgePoint.
MOBILE DEVICE SECURITY. WHAT IS MOBILE DEVICE SECURITY? Mobile Devices  Smartphones  Laptops  Tablets  USB Memory  Portable Media Player  Handheld.
Staying Safe Online Keep your Information Secure.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Liam Bradford.
Keyloggers At Work Jason Clark. History Believed to have been first used by the government Believed that they were used in the early 1990’s Software key.
-Tyler. Social/Ethical Concern Security -Sony’s Playstation Network (PSN) hacked in April Hacker gained access to personal information -May have.
Everyday Cyber Security April 27 th Why Should You Care? Ensuring your privacy and security Protecting yourself and others Practicing safe internet.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
Computer crimes.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Any criminal action perpetrated primarily through the use of a computer.
E-safety Parent Workshop Helping to keep your children safe online.
Avoiding Frauds and Scams Barbara Martin-Worley Director, Consumer Fraud Protection 18 th Judicial District Attorney’s Office Serving Arapahoe, Douglas,
Allison Gladkowski.  About privacy and why it matters  Spyware and spam vocabulary and examples  Identity theft  Unapproved access  Today's big issues.
AP CSP: Identifying People with Data and The Cost of Free
Facebook privacy policy
Take Charge of your Finances
Creating your online identity
Scams & Schemes Common Sense Media.
3.6 Fundamentals of cyber security
Survival Guide to Help avoid being Conned!
Done by… Hanoof Al-Khaldi Information Assurance
To Know what Cyber crime is
3.6 Fundamentals of cyber security
IT Security  .
Digital Citizenship Middle School
Information Security.
Lesson 3 Safe Computing.
The Cloud September 10, 2016.
Rights and Responsibilities
Take Charge of your Finances
How to build a good reputation online
Dangers of the internet
E-commerce Application Security
Online Safety.
Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Year 10 ICT ECDL/ICDL IT Security.
Lesson 2- Protecting Yourself Online
Risk of the Internet At Home
Understanding the Need for Security Measures
Cyber Security Experts
Spyware. By: Katheryn L. Gaston.
Network Security Best Practices
Cybersecurity and Personal Finance
Is your computer being used against you while you sleep?
HOW DO I KEEP MY COMPUTER SAFE?
Connecting Remotely Winter 2014.
Computer Misuse Act 1990 GCSE ICT.
How would you define media? Give an example
Ethical Hacking ‘Ethical hacking’ is the branch of computer science that involves cybersecurity and preventing cyberattacks. Ethical hackers are not malicious.
Take Charge of your Finances
Lesson 2- Protecting Yourself Online
Vulnerabilities in Mobile Applications and Input Systems
Presentation transcript:

Vulnerabilities in Mobile Applications and Input Systems Natalia Tituana

Introduction Mobile applications and Input systems have their vulnerabilities in the way they are controlled. This can range from how they are created as well as how easy it is to access them without user authorization. I’ll explore the many ways in which vulnerabilities can hinder these systems ability to operate effectively and safely.

What are mobile applications and input systems? Mobile applications are web based softwares that can be downloaded on a mobile phone. They range from email, video, social media and even banking purposes. Input systems are devices that can be paired with a computer or gaming console.

Vulnerabilities in Mobile Applications What kind of vulnerabilities can affect mobile applications? Mobile apps can be affected by many inconveniences, such as crashes and errors. Therefore software maintenance is important. But when it comes to a weakness, developers may not realize that their apps have a bug and therefore causes the app to perform irregularly.

Apple’s FaceTime App Bug In recent weeks, giant tech company Apple, was faced with a bug that affected their video chatting application FaceTime. The bug allowed users to make a call but also see and hear the call recipients conversations without them having answered the call. This vulnerability is critical to a users privacy and in having it can lead to potential hackers stealing information and as well as revealing it to other cyber criminals. Apple’s FaceTime App Bug

Applications As Spyware? Another vulnerability with using mobile applications is that they can be utilized as a form of spyware. For example, app developers can create their application to record the users key logs and screen activity. This is called “session replay”, wherein developers are able to view any information typed on the screen. This includes any personal information such as credit card info, addresses, etc. Applications As Spyware?

Applications As Spyware? (continued) In recent weeks, giant tech company Apple warned app developers to cease their use of “session replay” or their app would banned from the App Store. This is a way for the company to comply with their privacy regulations. This vulnerability in apps is another manner in which users must be careful. If app developers are recording user activity, it poses a greater risk for that information to fall into the wrong hands. It can be argued that this is a form of spyware because users are being watched through their usage activity without their consent. Applications As Spyware? (continued)

Resolution A resolution to these issues are to closely examine any possible cracks that may need patching up. Although patching may not be the only solution, since it maybe be prone to opening up a new set of bugs. Another solution is to do vigorous testing and app maintenance. In the case of applications tracking user activity, the best solution has already been provided by the application store. But another solution can be to not download the application altogether.

Vulnerabilities In Input Systems Input systems range from microphones, keyboards, controllers, and webcams. In recent years there has been an increase in hackers illegally gaining access into the webcams and microphones of many personal PCs. Many have thought of this as another sense of paranoia, therefore it is nothing to be worried about. But, we’ve even seen individuals such as billionaire Mark Zuckerberg covering the webcam on his PC. Vulnerabilities In Input Systems

Vulnerabilities In Input Systems (continued) Although many may believe that covering webcams with tape is a measure of paranoia, there is one case that stands out in this form of privacy invasion. That being the brazen invasion of privacy suffered by Miss Teen USA in 2013.

Vulnerabilities In Input Systems (continued) This is a great example because it proves that not only do these cyber crimes really happen, but also that no one is exempt from it happening to them. These types of crimes often lead to lives being ruined, wherein the person being blackmailed takes their own life. It can happen to almost anyone without them knowing, which is what happened in this example. In these types of crimes the criminals often seek money.

Resolution One may say that a resolution to prevent webcam/microphone hacking is to disconnect and or tape up webcams. But other solutions involve changing and creating stronger passwords for our devices. Another solution can also be to use a secured network, therefore potential cyber criminals are out of luck when trying to gain unauthorized access. Another resolution is to utilize a VPN or virtual private network for an extra added layer of security, specifically for IP addresses.

Conclusion To conclude, when we introduce ourselves to different forms of technology we must look at its weaknesses and strengths. Although technology is becoming smarter, we have to take the next step in outsmarting it. We must continue to teach ourselves and others to be safe with technology and not only rely on it to think for us. We must also be informed on new changes and what potential security risks it poses for us as well as what security measures we can take to prevent it.