Securing Your Android Device Terry Labach Information Security Services, IST.

Slides:



Advertisements
Similar presentations
Mobile device security Practical advice on how to keep your mobile device and the data on it safe.
Advertisements

Smartphone and Mobile Device Security IT Communication Liaisons Meeting October 11, 2012 Theresa Semmens, CITSO.
Lee Hang Lam Wong Kwun Yam Chan Sin Ping Wong Cecilia Kei Ka Mobile Phone OS.
Personal Data Protection and Security Measures Justin Law IT Services - Information Security Team 25 & 27 November 2013.
1 Alcatel Onetouch Antivirus. 2 Thinking about security on your smartphone Alcatel OneTouch? We have the solution. Among the applications on your smartphone,
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
1 MIS 2000 Class 22 System Security Update: Winter 2015.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Smartphone Security How safe are you?. Main Points 1. Malware/Spyware 2. Other Mischief 3. How a phone might get infected 4. Staying Safe a. Malware b.
Presented by: Luke Speed Computer Security. Why is computer security important! Intruders hack into computers to steal personal information that the user.
Personal Data Protection and Security Measures Justin Law IT Services - Information Security Team 18, 20 & 25 March 2015.
MOBILE MALWARE TOPIC #5 – INFORMATION ASSURANCE AND SECURITY Michael Fine 1.
Remote Access. What is the Remote Access Domain? remote access: the ability for an organization’s users to access its non-public computing resources from.
Quiz Review.
Security Liaisons Information Presentation. Introduction  What’s the big deal with computer security? Don’t we have an IT security department to take.
Securing Your Home Computer Presenter: Donnie Green Date: February 11, 2009 National Aeronautics and Space Administration
Information Security Information Technology and Computing Services Information Technology and Computing Services
Mobile Policy. Overview Security Risks with Mobile Devices Guidelines for Managing the Security of Mobile Devices in the Enterprise Threats of Mobile.
eScan Total Security Suite with Cloud Security
Malware Spyware & Viruses Overview  What does it look like?  What is it?  How can you prevent it?  What can you do about it when you get it?
Manjit kaur Manjit Kaur1. Why do we need to protect our computer from a virus? A reason why we need to protect our computer from a virus is because it.
Sophos Mobile Security
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
10 Tips for keeping MCL safe 1. Set up your defenses. Do you have adequate firewalls and antivirus software to protect you from hackers who could steal.
Cyber Crimes.
MOBILE DEVICE SECURITY. WHAT IS MOBILE DEVICE SECURITY? Mobile Devices  Smartphones  Laptops  Tablets  USB Memory  Portable Media Player  Handheld.
Mobile Devices Carry Hidden Threats With Financial Consequences Hold StillInstalled.
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
Security Awareness ITS SECURITY TRAINING. Why am I here ? Isn’t security an IT problem ?  Technology can address only a small fraction of security risks.
The Internet Netiquette and Dangers. Outline Netiquette Dangers of the Internet.
1.1 System Performance Security Module 1 Version 5.
Staying Safe Online Keep your Information Secure.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
IT security By Tilly Gerlack.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
PLUG IT IN 7 Protecting Your Information Assets. 1.How to Protect Your Assets: The Basics 2.Behavioral Actions to Protect Your Information Assets 3.Computer-Based.
Manjit kaur Manjit Kaur1. Why do we need to protect our computer from a virus? A reason why we need to protect our computer from a virus is because it.
Dimeji Ogunshola 10b  There are many threats to your computer system. The computer threats can be mainly transferred through unknown s or accidental.
Malware Spyware & Viruses Overview  What does it look like?  What is it?  How can you prevent it?  What can you do about it when you get it?
Convenience product security Collin Busch. What is a convenience product? A convenience product is a device or application that makes your life easier.
Internet Safety and Productivity Tips Presented by ITS Kerri Sorenson and Sean Hernandez December 11, 8:30-9:00 am.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
About Us AVG is a global security software maker protecting 98 million active users in 170 countries from the ever-growing incidence of Web threats, viruses,
Cybersecurity Test Review Introduction to Digital Technology.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
By: Collin Molnar. Overview  Intro to Android  Security basics  Android architecture  Application isolation  Application permissions  Physical access.
Computer Security Keeping you and your computer safe in the digital world.
Virus Removal Support Services. H OW TO K EEP Y OUR C OMPUTER F REE F ROM V IRUS T HREAT ? Virus can attack your PC any time without any.
Mobile device security Practical advice on how to keep your mobile device and the data on it safe.
How to Make Yourself More Secure Using Public Computers and Free Public Wi-Fi.
KASPERSKY INTERNET SECURITY FOR ANDROID. YOUR MOBILE DEVICES NEED PROTECTION More online communications and transaction are happening on tablets and phones.
Information Technology Security Office of the Vice President for Information Technology New Employee Orientation II.
Hotspot Shield Protect Your Online Identity
Information Security.
Secure Software Confidentiality Integrity Data Security Authentication
OWASP CONSUMER TOP TEN SAFE WEB HABITS
Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Staying Austin College
© EIT, Author Gay Robertson, 2017
Information Technology Services Education and Awareness Team
Tablet and eBook Orientation
Tablet and eBook Orientation
Protecting Your Information Assets
Industry Best Practices – Security For Smartphones / Mobile Devices
Bethesda Cybersecurity Club
How to keep the bad guys out and your data safe
Information Technology Services Education and Awareness Team
Security in mobile technologies
Presentation transcript:

Securing Your Android Device Terry Labach Information Security Services, IST

"To see everything without being seen is, needless to say, the prerogative of the biblical God whose eyes run everywhere, as well as the labor of spies and surveillance agencies, and the fondest desire of the voyeur.“ - Margaret Atwood #watitis2013

Android mobile device operating system market share 43% in Canada, 52% in the US, 80% worldwide 2013 DHS/FBI report stated Android attracted 79 per cent of all malware attacks because of “market share and open source architecture” #watitis2013

Android risks open architecture offers more opportunities for attack many vendor and developer-tweaked versions, harder to patch “rooted” phones can use wider range of features but lose protection no magic bullet to mitigate risks #watitis2013

What's on your phone? social media apps financial/banking apps photos address book usernames, passwords … #watitis2013

What are bad guys looking for? $$$ steal phone for resale banking information texts to premium SMS in-app purchases … #watitis2013

Steps to securing your device Physical security Access security File security App security Network security System security Usage security Software #watitis2013

Physical security Hang on to phone Don't leave it unattended #watitis2013

Access security Screen lock phone with –swipe code –PIN –password #watitis2013

File security Back up files Encrypt files #watitis2013

Encrypt files individually – simplest method but onerous APG - OpenPGP implementation for Android id=org.thialfihar.android.apg #watitis2013

Encrypt SD card Depending on device, select one of –Settings > Security –Settings > Storage Select SD card encryption checkbox Encrypt before adding data! Once set, any non-encrypted SD card placed in phone will be read only. #watitis2013

Pre encryption

Post encryption #watitis2013

Encrypt phone storage protects internal phone memory slows phone operations fully charge phone first, keep plugged in during encryption #watitis2013

Encrypt phone storage Depending on device, select one of –Settings > Security –Settings > Storage select Storage encryption checkbox storage will be encrypted can’t undo encryption, factory reset only way to unencrypt, causing data loss #watitis2013

Network security Turn off WiFi/Bluetooth/NFC when not needed WiFi –avoid joining unknown networks and using public hotspots Don't use unencrypted communications –VPN (AnyConnect) –Web (https) #watitis2013

Near field communication (NFC) NFC tags are chips that will share digital information on some Android devices, NFC is allowed to automatically launch the web browser could download malware villain creates malicious NFC tags and places them near legitimate ones #watitis2013

Controlling network access JuiceDefender id=com.latedroid.juicedefender&hl=en location-aware WiFi Control (e.g. enable WiFi only at home/work, disable it otherwise) #watitis2013

Usage security phishing vishing smishing #watitis2013

QR codes encode URLS as bar code used to disguise malware #watitis2013

App security some apps, even from the Google Play store, have malicious features –keyloggers –contact snooping –data theft –malware downloads more malware –root attacks #watitis2013

Limit the apps you install limit the number don't automatically install apps if website/message/popup tells you to do so don’t install if permissions are suspicious limit app permissions buy your apps instead of installing free cracked versions #watitis2013

App security disable untrusted app stores open one of –Settings>Applications –Settings>Security locate the Unknown sources ensure it is unchecked #watitis2013

Maintain your apps Prevent accidental app purchases Update your apps Remove old apps #watitis2013

System security patch and update Android vendor updates reliable third-party distributions –Cyanogenmod –Replicant #watitis2013

System security disable Google sync of WiFi passwords, settings, etc. #watitis2013

Security software Software suites Avast! Mobile Security –antivirus, firewall, phone tracker, privacy, etc. Lookout Security & Antivirus –antivirus, phone tracker, privacy, etc. 360 Mobile Security –antivirus, privacy, etc. #watitis2013

Security software Kaspersky Internet Security for Android –antivirus, phone tracker, privacy, etc. Norton Security antivirus –antivirus, phone tracker, privacy, etc. #watitis2013

Privacy software Wickr - Top Secret Messenger –self-destructing, encrypted messages Clueful for Android –shows you how installed apps use your personal information #watitis2013

My phone’s been stolen! report to campus police change passwords on accounts used by the device immediately attempt to locate using a software suite mentioned above, or Where's My Droid Android Device Manager #watitis2013

Where's My Droid special text message to phone will cause it to respond in some cases, can install from Play Store after phone is lost or stolen risk of misuse if someone knows you use this app #watitis2013

Android Device Manager nager Remotely locate and factory reset your device #watitis2013

References - Canada Public Safety Canada –Using mobile devices ctvts/mbl-eng.aspx –Using web-enabled devices safely dvcs/index-eng.aspx #watitis2013

References - US United States Computer Emergency Readiness Team – –Technical Information Paper: Cyber Threats to Mobile Devices – pdfhttp:// pdf #watitis2013

References - US CERT (Computer Emergency Response Team) – –Mobile Device Security: Threats, Risks, and Actions to Take – ederick.html #watitis2013

References - technical XDA Developers – XDA Android Developers forum – 20 security and privacy apps for Androids and iPhones – 493 #watitis2013

References - UW University of Waterloo Information Security Services (ISS) team – technology/about/organizational- structure/information-security-services University of Waterloo Security Operations Centre (SOC) #watitis2013

References - UW Terry Labach User education Developer and project consulting Web application scanning #watitis2013

Questions? #watitis2013