Understanding the spreading patterns of mobile phone viruses Presented by Sundararaman Natarajakumar 29.06.2012 Submitted to Prof.Dr. Eduard Heindl.

Slides:



Advertisements
Similar presentations
CS898T Mobile and Wireless Network Handheld Device Security By Yuan Chen July 25 th, 2005.
Advertisements

Mobile Viruses and Worms (Project Group 6) Amit Kumar Jain Amogh Asgekar Jeevan Chalke Manoj Kumar Ramdas Rao.
Mobile Security Guide Matt Scofield, Eric Samson, Cong Le.
Introduction of ZTE Handset Online Upgrade tool V1.1 version
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Purdue University proudly presents Doug Couch & Nathan Heck, IT Security Analysts.
OneDrive for Business Introduction First Time Use First Time Use Access from Computer Access from Computer Access from Internet Access from Internet Access.
Security strategy. What is security strategy? How an organisation plans to protect and respond to security attacks on their information technology assets.
Computer Viruses and Worms By Rafael Albuernes What is a Virus? What is a Virus? What is a Worm? What is a Worm? Types of Infections Types of Infections.
Security in By: Abdulelah Algosaibi Supervised by: Prof. Michael Rothstein Summer II 2010: CS 6/79995 Operating System Security.
The Topic : The Difference Between The Blackberry And The IPhone Week 6 HomeWork.
Malicious Attacks. Introduction Commonly referred to as: malicious software/ “malware”, computer viruses Designed to enter computers without the owner’s.
SmartPhones Student 1 Student 2 Student 3. SmartPhone Definition “A SmartPhone is one device that can take care of all your handheld computing and communication.
Computer Security 1 Keeping your computer safe. Computer Security 1 Computer Security 1 includes two lessons:  Lesson 1: An overview of computer security.
MOBILE MALWARE TOPIC #5 – INFORMATION ASSURANCE AND SECURITY Michael Fine 1.
Security. Physical security Protection from fire/water Protection from dust and extremes of temperature.
Quiz Review.
Security Advice Georgie Pepper Campsmount Acadamy.
A+ Certification Guide Chapter 10 Mobile Devices.
Trojan Virus Presented by Andy Lindberg & Denver Bohling.
Threats to I.T Internet security By Cameron Mundy.
R. FRANK NIMS MIDDLE SCHOOL A BRIEF INTRODUCTION TO VIRUSES.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
eScan Total Security Suite with Cloud Security
1 Pertemuan 10 Understanding Computers Security Matakuliah: J0282 / Pengantar Teknologi Informasi Tahun: 2005 Versi: 02/02.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
THREATS TO MOBILE NETWORK SECURITY
1 Kids on the Web. Child’s play? September, 2008.
Spyware Sue Scott Technology Librarian. What is Spyware Malware – (Malicious Software) A general term to encompass unwanted software on a personal computer.
Security Awareness ITS SECURITY TRAINING. Why am I here ? Isn’t security an IT problem ?  Technology can address only a small fraction of security risks.
Operating Systems Concepts 1/e Ruth Watson Chapter 4 Chapter 4 Windows Utilities Ruth Watson.
1.1 System Performance Security Module 1 Version 5.
Seminar On Cellular Virus
IT security By Tilly Gerlack.
Illinois Center for Wireless Systems Wireless Security Quantification and Mechanisms Bill Sanders Professor, Electrical and Computer Engineering Director,
Computer Viruses.
A virus is software that spreads from program to program, or from disk to disk, and uses each infected program or disk to make copies of itself. Basically.
Desktop computer security policies Applies to ALL computers connecting to the PathStone network irrespective of device ownership.
What is a Computer? Computer generally means a programmable machine. The two principal characteristics of a computer are: it responds to a specific set.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
Company LOGO Malicious Attacks Brian Duff Nidhi Doshi Timmy Choi Dustin Hellstern.
Homework #2 John Bach IST 110 Section 031 JMB6824 9/15/2012.
ICT Functional Skills Viruses and other malware. What is malware? software which is specifically designed to disrupt or damage a computer system – Viruses,
Android Mobile Security Krystal Salerno. Introductions.
INTERNET: The Good, The Bad and The Ugly
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
Lei Liu, Department of Computer Science, George Mason University Guanhua Yan, Information Sciences Group, Los Alamos National Laboratory Xinwen Zhang,
CONTENTS What is Virus ? Types of computer viruses.
Computer Systems Viruses. Virus A virus is a program which can destroy or cause damage to data stored on a computer. It’s a program that must be run in.
Internet safety By Suman Nazir
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
NETWORK SECURITY Definitions and Preventions Toby Wilson.
Computer and Internet Security (How to protect your computer from Threats) By: Steven Siggers Instructor: Dr. Marko Puljic.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
MIS323 – Business Telecommunications Chapter 10 Security.
Security Threats Caela Harris. What is a Virus A computer virus or a computer worm is a malicious software program that can self replicate on computer.
DEVICE MANAGEMENT AND SECURITY NTM 1700/1702. LEARNING OUTCOMES 1. Students will manipulate multiple platforms and troubleshoot problems when they arise.
ONLINE SECURITY Tips 1 Online Security Online Security Tips.
Chapter SOFTWARE Are the programs which are written by different programming languages. These programs are: a series of instruction that tells.
System Software Chapter Handles technical details Works with end users, application software, and computer hardware Four types of programs –Operating.
KASPERSKY INTERNET SECURITY FOR ANDROID. YOUR MOBILE DEVICES NEED PROTECTION More online communications and transaction are happening on tablets and phones.
Chapter 40 Internet Security.
Seminar On Cellular Virus
I S P S loss Prevention.
What is a Computer? Computer generally means a programmable machine. The two principal characteristics of a computer are: it responds to a specific set.
Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
What is a Computer? Computer generally means a programmable machine. The two principal characteristics of a computer are: it responds to a specific set.
Avira Antivirus Support via a Dedicated Helpline Number The antivirus software of Avira is recommended as a reliable as well as a proficient software security.
CHAPTER 2: OPERATING SYSTEMS (Part 2) COMPUTER SKILLS.
Understanding Browsers
Presentation transcript:

Understanding the spreading patterns of mobile phone viruses Presented by Sundararaman Natarajakumar Submitted to Prof.Dr. Eduard Heindl

Agenda Introduction Virus categorization Spreading patterns of mobile phone viruses How to prevent mobile viruses Conclusion

Introduction Overview of Mobile Phone devices Traditional phones Smart phone History of Mobile Phone virus 29A group developed ‘Carbie’ for symbian OS

Time line

What mobile phone viruses can do? Loss of vital information Disable basic phone functions Prevent you from installing antiviral software Lock memory card Abnormal loss of phone battery charge

Virus Categorization Cellular Network Bluetooth Internet USB/Active Sync

Spreading patterns Bluetooth Vulnerability:10m to 30m

Spreading patterns MMS Reaction time: 2min

Spreading patterns Hybrid Combination of Bluetooth & MMS 3 times faster than MMS virus

Spreading patterns

How to Prevent mobile viruses Aware of file you download through Bluetooth Use Bluetooth Judiciously Never open messages from unknown sender Never install unknown programs Ensure you have a antivirus program Download files from official websites Delete infected applications and re-install

Conclusion Constant threat from viruses Be proactive Educate the mobile users of possible threats Promotion of antivirus tools