CS691 Robin Kimzey Cell Phone Security a little computer in your pocket an easy target for malcontents.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

CS898T Mobile and Wireless Network Handheld Device Security By Yuan Chen July 25 th, 2005.
Smartphone and Mobile Device Security IT Communication Liaisons Meeting October 11, 2012 Theresa Semmens, CITSO.
Copyright © 2012 AirWatch, LLC. All rights reserved. Proprietary & Confidential. Mobile Content Strategies and Deployment Best Practices.
Identify risks with mobile devices: Portable data storage Wireless connections 3 rd party applications Data integrity Data availability 2.
Mobile Devices and Wireless Tracy Jackson Liz Nenni Matt Hinson Chris Eiben.
_Protecting Our Kids New Technology: New Pitfalls Purpose: To help families ask the right questions, and make an informed decision for their children regarding.
Invasion of Smart Phones in Clinical Areas Chrissy Kyak Privacy Officer University of Maryland Upper Chesapeake Health.
1 Alcatel Onetouch Antivirus. 2 Thinking about security on your smartphone Alcatel OneTouch? We have the solution. Among the applications on your smartphone,
Meraki Mobile Device Management
© 2014 wheresjenny.com Cyber crime CYBER CRIME. © 2014 wheresjenny.com Cyber crime Vocabulary Defacement : An attack on a website that changes the visual.
Is There a Security Problem in Computing? Network Security / G. Steffen1.
Building and Deploying Safe and Secure Android Apps for Enterprise Presented by Technology Consulting Group at Endeavour Software Technologies.
Separate Domains of IT Infrastructure
Chapter 8 Chapter 8 Digital Defense: Securing Your Data and Privacy
Evidor: The Evidence Collector Software using for: Software for lawyers, law firms, corporate law and IT security departments, licensed investigators,
MOBILE MALWARE TOPIC #5 – INFORMATION ASSURANCE AND SECURITY Michael Fine 1.
Smartphones. Lesson Objectives To understand and demonstrate an understanding of Smartphones.
Remote Access. What is the Remote Access Domain? remote access: the ability for an organization’s users to access its non-public computing resources from.
By Paul Capers.  A cell phone is a portable telephone that does not use a wired connection. It connects to a wireless carrier network using radio waves.
Threats and ways you can protect your computer. There are a number of security risks that computer users face, some include; Trojans Conficker worms Key.
SHASHANK MASHETTY security. Introduction Electronic mail most commonly referred to as or e- mail. Electronic mail is one of the most commonly.
Copyright Security-Assessment.com 2004 New Technology Enforcement Strategies by Peter Benson.
A First Course in Information Security
Cyber Crimes.
Topic: Information Security Risk Management Framework: China Aerospace Systems Engineering Corporation (Case Study) Supervisor: Dr. Raymond Choo Student:
Mobile Devices Carry Hidden Threats With Financial Consequences Hold StillInstalled.
PROJECT PAPER ON BLUEFIRE MOBILE SECURITY. BY PONNURU VENKATA DINESH KUMAR STUDENT ID # A0815 PROFESSOR – VICKY HSU CS-426.
Unified Communications LITN Spring  A set of products that provides a consistent, unified user interface and user experience across multiple devices.
Enforcing Cyber security in Mobile Applications – Public Sector Use Case SAPHINA MCHOME, VIOLA RUKIZA TANZANIA REVENUE AUTHORITY INFORMATION AND COMMUNICATION.
Chapter 2 Securing Network Server and User Workstations.
Topic 5: Basic Security.
Grants Management Training 200 Cyber Security There are two kinds of people in America today: Those who have experienced a cyber-attack and know it, and.
MANY WAYS TO COMMUNICATE ELECTRONICALLY Advantages vs Disadvantages Created by Karma Lattin.
SMARTPHONE FORENSICS 101 General Overview of Smartphone Investigations.
MobileSecurity Vulnerability Assessment Tools for the Enterprise Mobile Security Vulnerability Assessment Tools for the Enterprise Integrating Mobile/BYOD.
Separate Domains of IT Infrastructure CS Domains of IT 1. User Domain 2.Workstation Domain 3.LAN Domain 4.LAN to WAN Domain 5.WAN Domain 6.Remote.
Information Security In the Corporate World. About Me Graduated from Utica College with a degree in Economic Crime Investigation (ECI) in Spring 2005.
Introducing the Smartphone Pentesting Framework Georgia Weidman Bulb Security LLC Approved for Public Release, Distribution Unlimited.
ONLINE SAFETY AND SECURITY Computer Basics 1.5. INFAMOUS CYBER ATTACKS IN 2014 Sony Pictures: Attackers stole just about everything in the corporate network,
Safe’n’Sec IT security solutions for enterprises of any size.
© 2013 Toshiba Corporation B2B PC Training Mailer - Toshiba Device Access Control.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
MIS323 – Business Telecommunications Chapter 10 Security.
Cyber Security in the Mobile Era KEEPING ENTERPRISE DATA SAFE IN THE BYOD ERA.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Introduction to Networking. What is a Network? Discuss in groups.
Sources of Network Intrusion Security threats from network intruders can come from both internal and external sources.  External Threats - External threats.
ONLINE SECURITY Tips 1 Online Security Online Security Tips.
Enterprise Mobility Suite: Simplify security, stay productive Protect data and empower workers Unsecured company data can cost millions in lost research,
TECHDOTCOMP SUPPORT TECHDOTCOMP nd Ave, Seattle, WA 98122, USA Phone:
Mobile Device Security Threats Christina Blakley Host Computer Security.
Implementing a Security Policy JISC – ICT Security Threats & Promises, April 2002 Mick Ismail ICT Services Manager City of Wolverhampton College.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
How to Recover Deleted Files from Android Phone Internal Memory and External SD Card
Computer Forensics. OVERVIEW OF SEMINAR Introduction Introduction Defining Cyber Crime Defining Cyber Crime Cyber Crime Cyber Crime Cyber Crime As Global.
Mobile device security Practical advice on how to keep your mobile device and the data on it safe.
KASPERSKY INTERNET SECURITY FOR ANDROID. YOUR MOBILE DEVICES NEED PROTECTION More online communications and transaction are happening on tablets and phones.
EAST AFRICAN DATA HANDLERS DATA SECURITY/MOBILITY
Information Security.
Cybersecurity Awareness
How to Secure Facebook Using Norton. If you are Norton customers and holds a Facebook account, this is how you can secure your account in few simple steps:
Norton.com/Setup | +1(844) | Norton Internet Security
Information Technology Services Education and Awareness Team
Industry Best Practices – Security For Smartphones / Mobile Devices
Implementing Client Security on Windows 2000 and Windows XP Level 150
Many ways to communicate Electronically
Information Technology Services Education and Awareness Team
Security in mobile technologies
Presentation transcript:

CS691 Robin Kimzey Cell Phone Security a little computer in your pocket an easy target for malcontents

CS691 Robin Kimzey Presentation Topics historyfunctionalityusage security issues attack prevention attack recovery enterprisefuture

CS691 Robin Kimzey History the brick analog networks limited users limited availability

CS691 Robin Kimzey Typical Functionality voice calls text messaging web surfing bluetooth connectivity wi-fi connectivity

CS691 Robin Kimzey Typical Usage verbal communication electronic communication storage of information like contacts and possibly business or personal security data personal/business photos business presentations or confidential files

CS691 Robin Kimzey Security Issues physical theft signal interception malware infection cloning tracking text spamming DoS (bluetooth) enterprise access

CS691 Robin Kimzey Attack Prevention physically secure device use security tools available to you only enable features that are used look for 3rd party software for additional security be aware of security issues and avoid them when possible trusted software from trusted sources

CS691 Robin Kimzey Attack Recovery report stolen/lost hardware immediately disable account wipe device contents remotely reset device and re-install authorized apps

CS691 Robin Kimzey Enterprise setup solid security policy for all devices enforce the security policy in place train users to understand and mitigate security issues

CS691 Robin Kimzey Future Trends/Issues standardized/open OSes like Android increased functionality zombie/botnet threat current computer risks are future cell phone risks

CS691 Robin Kimzey References NIST SP , fpd.pdf fpd.pdfhttp://csrc.nist.gov/publications/drafts/800-82/draft_sp fpd.pdf Emerging Cyber Threats Report for 2009, Georgia Tech

CS691 Robin Kimzey Questions?