Mobile Security What is mobile secuirty & Identifying smartphone security holes& Sayed Hashimi Proposal Project.

Slides:



Advertisements
Similar presentations
Mobile device security Practical advice on how to keep your mobile device and the data on it safe.
Advertisements

David Grochocki et al.  Lures Potential attackers  Smartmeters do two way communication  Millions of Meters has to be replaced  Serious damages just.
MIRAGE MALWARE SIDDARTHA ELETI CLEMSON UNIVERSITY.
7 Effective Habits when using the Internet Philip O’Kane 1.
Andrew Schroeder Networking Aspects of Cloud Computing.
Access · convergence · management security · performance Margins in Mobility – Ian Kilpatrick, Wick Hill.
Remote Access. What is the Remote Access Domain? remote access: the ability for an organization’s users to access its non-public computing resources from.
Trojan Virus Presented by Andy Lindberg & Denver Bohling.
Presentation By Deepak Katta
Introduction Our Topic: Mobile Security Why is mobile security important?
Protecting Yourself Online (Information Assurance)
Cyber Crimes.
THREATS TO MOBILE NETWORK SECURITY
MOBILE DEVICE SECURITY. WHAT IS MOBILE DEVICE SECURITY? Mobile Devices  Smartphones  Laptops  Tablets  USB Memory  Portable Media Player  Handheld.
Mobile Technology and Cyber Threats Deon Woods Bell Office of International Affairs The Fifth Annual African Consumer Protection Dialogue Conference Livingstone,
Smart Machines, Smart Privacy: Rules of the Road and Challenges Ahead The views expressed are those of the speaker and not necessarily those of the FTC.
Enforcing Cyber security in Mobile Applications – Public Sector Use Case SAPHINA MCHOME, VIOLA RUKIZA TANZANIA REVENUE AUTHORITY INFORMATION AND COMMUNICATION.
S. A. Shonola & M. S. Joy Security Framework for Mobile Learning Environments.
Convenience product security Collin Busch. What is a convenience product? A convenience product is a device or application that makes your life easier.
MobileSecurity Vulnerability Assessment Tools for the Enterprise Mobile Security Vulnerability Assessment Tools for the Enterprise Integrating Mobile/BYOD.
Mobile Security By Jenish Jariwala. What is Mobile Security?  Mobile Security is the protection of smartphones, tablets, laptops and other portable computing.
Sensors For Mobile Phones  Ambient Light Sensor  Proximity Sensor  GPS Receiver Sensor  Gyroscope Sensor  Barometer Sensor  Accelerometer Sensor.
NESSUS. Nessus Vulnerability Scanner Features: Ease of use Deep Vulnerability Analysis Discover network based and local vulnerabilities Perform configuration.
© 2015 IBM Corporation John Guidone Account Executive IBM Security IBM MaaS360.
KASPERSKY INTERNET SECURITY multi-device  Average number of devices in households: 4.5  Consumer device diversity will continue to expand.
Šarūnas Končius Technology Strategist of Microsoft Microsoft Lithuania.
Capstone Design Camera for Security App - Final Report Kim Sang Min Jeon Byeong Yong.
THREATS, VULNERABILITIES IN ANDROID OS BY DNYANADA PRAMOD ARJUNWADKAR AJINKYA THORVE Guided by, Prof. Shambhu Upadhyay.
Android and IOS Permissions Why are they here and what do they want from me?
By Barry Hren. What is iCloud? Introduced June 6, 2011.
Mobile device security Practical advice on how to keep your mobile device and the data on it safe.
KASPERSKY INTERNET SECURITY FOR ANDROID. YOUR MOBILE DEVICES NEED PROTECTION More online communications and transaction are happening on tablets and phones.
Overview We are living in a technological world and rapidly advancement in all the different fields of science. With the development in the technology.
Intro to Digital Technology Review for Final Introduction to Digital Technology Finals Seniors Monday, 5/16 – 2 nd Tuesday 5/17 – 1 st,3 rd Underclassmen.
Google. Android What is Android ? -Android is Linux Based OS -Designed for use on cell phones, e-readers, tablet PCs. -Android provides easy access to.
Final Project: Advanced security blade
Simple Threat Management For IT Teams and MSPs
Hotspot Shield Protect Your Online Identity
WEL-COME Norton Internet Security Service Number Norton Internet Security Service Number
3.6 Fundamentals of cyber security
Set up your own Cloud The search for a secure and acceptable means of gaining access to your files stored at the office from a remote location.
Backdoor Attacks.
BIG Data 25 Need-to-Know Facts.
Cyber Attacks on Businesses 43% of cyber attacks target small business Only 14% of small business rate their ability to mitigate cyber risk highly.
How To Install Norton Security on Android Phone
Webex Classes in Mobile
Physical activities and activity tracker
In Order To Get Error Free Internet Browsing Contact Avira Online Support Number Avira provides the users with the best security protection to their computer.
McAfee Issue Updating the antivirus with the most recent version accessible Activate security software suite.
Call AVG Antivirus Support | Fix Your PC
AVG Customer Support Number
How to Install Norton Antivirus on Android Phone? We are providing easy steps to install Norton antivirus on android phone. If you facing any technical issue related to installing then you should contact via support. Get more details to visit our website
ALL ABOUT USING YOUR ANDROID DEVICE
Internet of Things Vulnerabilities
Mobile Security Pertemuan Ke 5 By Turco careca m.,s.kom
Home Internet Vulnerabilities
David J. Carter, CISO Commonwealth Office of Technology
Android.Adware.Plankton.A % Android.Adware.Wapsx.A – 4.73%
Lecture 3: Secure Network Architecture
How to keep the bad guys out and your data safe
The Internet: Encryption & Public Keys
Security in mobile technologies
How to Login to English Central
MyLion Registration Website | Mobile device
In the attack index…what number is your Company?
About Us Scanster is one of the leading IT security software company. Our Software's are well integrated system that simplify computer security management.
When Machine Learning Meets Security – Secure ML or Use ML to Secure sth.? ECE 693.
Introduction to Mobile Apps
Digitization complicates visibility Market demands have taken the network beyond your perimeter Threats are more numerous and complex Threats are using.
Mcafee.com/activate
Presentation transcript:

Mobile Security What is mobile secuirty & Identifying smartphone security holes& Sayed Hashimi Proposal Project

Mobile Security what is and so what? According to an online article, “The estimated number of mobile devices is around 5.8 billion, which is thought to have grown exponentially within five years and is supposed to reach nearly 12 billion within four years. Hence, it will be an average of two mobile devices per person on the planet. This makes us fully dependent on mobile devices with our sensitive data being transported all over. As a result, mobile security is one of the most important concepts to take in consideration. Mobile Security as a concept deals with the protection of our mobile devices from possible attacks by other mobile devices, or the wireless environment that the device is connected” (https://www.tutorialspoint.com/mobile_security/mobile_security_tutorial.pdf).

More on mobile security Basically, the purpose of mobile security is that it provides complete protection of information and data on portable devices such as tablets, etc. Mobile devices are protected from malware threats The need for securing mobile devices has went up as the change in devices keeps happening with new applications updates, and the expanding of the devices of course

Identifying smartphone security holes… According to online site, “Open port backdoors could be exploited to steal private information such as contacts, security credentials and photos; to remotely control a device; to perform a denial of service attack; or to inject malicious code that could jumpstart widespread, virus-like attacks, the researchers say” (https://news.umich.edu/smartphone-security-hole-open-port-backdoors-are-widespread/).

Id. Smartphone security holes continued.. Smartphones rely on open ports for specific kind of information as online article discussed, and due to the foundation or the way the mobile networks are set up, the phones IP address as online article mentioned can alternate as they disperse in the planet which can lead to security issues According to online article, “Open ports were implicated in the November 2015 “wormhole” vulnerability in a software development kit made by Baidu, a Chinese internet services company. The issue affected thousands of Android apps and at least 100 million devices. While the number of devices affected was high, the U-M researchers say this represents just one usage of open ports” (https://news.umich.edu/smartphone-security-hole-open-port-backdoors-are-widespread/).

Capability of smartphones Smartphones compose of many sensors that are installed in them. These sensors on smartphones are capable of unique factors such as detecting weather, light, and other things. As online article discussed how on online app store like Google Play have found some apps that are abusing there way of access to the sensors apparently. As a result , Google tried to rerun the apps from Android phones. The apps can do things like record and even take picture and leak data!!

What are some smartphone sensors? As online article discussed, Accelerometer-inicates acceleration and vibrations and judges the way the action is occurring A gyroscope finds differing directions like up and down around axes Sensors held that detects whenever the phone is held near the face whenever you have to make a call. Infrared sensor-is used basically to locate user movements for gesture