Mobile Operating System Security A PRESENTATION BY DANIEL ADAMS CSC 345 DR. BOX.

Slides:



Advertisements
Similar presentations
Mobile device security Practical advice on how to keep your mobile device and the data on it safe.
Advertisements

Mobile Protection Overview
Thomas S. Messerges, Ezzat A. Dabbish Motorola Labs Shin Seung Uk.
Portable Device Operating Systems. Portable Device OS Portable devices use scaled down operating systems, which are smaller than those found in notebook.
 یعنی چی؟  تاریخچه  مقایسه  مزایا  معایب.  1979–1992 Mobile phones use embedded systems to control operation.  Martin Cooper.
Invasion of Smart Phones in Clinical Areas Chrissy Kyak Privacy Officer University of Maryland Upper Chesapeake Health.
Chapter 20: Mobile Communication Systems and Related Security Issues Guide to Computer Network Security.
Lab4 Part2 Lau Ting Nga Virginia Tsang Pui Yu Wong Sin Man.
Vivek-Vijayan University of Tennessee at Chattanooga.
System Software © 2013 The McGraw-Hill Companies, Inc. All rights reserved.Computing Essentials 2013.
Chung Man Ho Willims Chow Man Kei Gary Kwok Pak Wai Lion.
Student Name: Group.  Developed by Microsoft  Alliance with Nokia in 2011  4 main functions:  Outlook Mobile  Windows Media Player for Windows Mobile.
Trusted Computing Initiative Beyond trustworthy. Trusted Computing  Five Key Concepts >Endorsement Key >Secure Input and Output >Memory Curtain / Protected.
Security in By: Abdulelah Algosaibi Supervised by: Prof. Michael Rothstein Summer II 2010: CS 6/79995 Operating System Security.
 Smartphone overview › Platform comparison  App Construction  Smartphone malware and viruses  Security threats  Keeping your Smartphone clean.
CMPTR1 CHAPTER 3 COMPUTER SOFTWARE Application Software – The programs/software/apps that we run to do things like word processing, web browsing, and games.
OPERATING SYSTEMS AND SYSTEMS SOFTWARE. SYSTEMS SOFTWARE Systems software consists of the programs that control the operations of the computer and its.
Video-conferencing Jakub Topič, I2B. Video-conferencing basics  Communication using transmission of video and audio (speech) between two or more devices.
New Data Regulation Law 201 CMR TJX Video.
Operating Systems Chapter 4.
Presentation By Deepak Katta
eScan Total Security Suite with Cloud Security
Chapter Three OPERATING SYSTEMS.
Lesson 8 Operating Systems
IC3 Chapter 8 Computer Fundamentals
Mobile Devices Carry Hidden Threats With Financial Consequences Hold StillInstalled.
All Your Droid Are Belong To Us: A Survey of Current Android Attacks 단국대학교 컴퓨터 보안 및 OS 연구실 김낙영
Survey of PC and Network Operating Systems
Developing Applications for Mobile Devices Dr. Frank McCown GUI Programming Fall 2008.
Mobile Technology and Cyber Threats Deon Woods Bell Office of International Affairs The Fifth Annual African Consumer Protection Dialogue Conference Livingstone,
Protecting Your Information Assets
INTEROP 2014 Mobile Issues in the Network. Mobile Issues Data loss – Hardware theft or failure – Data corruption Data theft – Hardware theft – Spyware,
PC Security: Antivirus Presentation done by Ming-Li Emily Chang (A2980) Raymond Chok (A2419)
Your Interactive Guide to the Digital World Discovering Computers 2012.
Presented by Team Alpha MOBILE DEVICE SECURITY 1.
Visualizing Technology© 2012 Pearson Education, Inc. Publishing as Prentice Hall1 PowerPoint Presentation To Accompany Chapter 6 System Software.
Ch9QQ T F 1.Hacking is an example of unauthorized access. T F 2.A Trojan horse is a type of malware that masquerades as another type of program. T F 3.A.
What is Android……? Android is an Operating System (OS) created by Google to run on any small electronic devices such as cell phones, e- books, Media Internet.
Operating Systems for Wireless Mobile Devices Dr. Tal Lavian UC Berkeley Engineering, CET Why does.
ANDROID BY:-AANCHAL MEHTA MNW-880-2K11. Introduction to Android Open software platform for mobile development A complete stack – OS, Middleware, Applications.
Three main types of computer operating systems By Chloe Monks.
Wireless and Mobile Security
Protecting Your Computing Devices Antivirus, Anti-Spyware, Ad blocking, Antitheft and OS Maintenance.
Mobile Security By Jenish Jariwala. What is Mobile Security?  Mobile Security is the protection of smartphones, tablets, laptops and other portable computing.
About Us AVG is a global security software maker protecting 98 million active users in 170 countries from the ever-growing incidence of Web threats, viruses,
Operating Systems By-Anoushka Puri. What is an Operating System An operating system is an interface between the user and the computer hardware. It is.
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
Global Mobile Anti-malware Market WEBSITE Single User License: US$ 2500 No of Pages: 55 Corporate User License: US$
© 2015 IBM Corporation John Guidone Account Executive IBM Security IBM MaaS360.
DEVICE MANAGEMENT AND SECURITY NTM 1700/1702. LEARNING OUTCOMES 1. Students will manipulate multiple platforms and troubleshoot problems when they arise.
Mobile Device Security Threats Christina Blakley Host Computer Security.
System Software Chapter Handles technical details Works with end users, application software, and computer hardware Four types of programs –Operating.
Securing a Host Computer BY STEPHEN GOSNER. Definition of a Host  Host  In networking, a host is any device that has an IP address.  Hosts include.
Network Security and Security in Industry Paul Curtis.
Virus, Spyware & Trojan Removal By 1Akal 1Akal – Technology Services for Home & Business.
Mobile device security Practical advice on how to keep your mobile device and the data on it safe.
System Software Chapter Handles technical details Works with end users, application software, and computer hardware Four types of programs –Operating.
KASPERSKY INTERNET SECURITY FOR ANDROID. YOUR MOBILE DEVICES NEED PROTECTION More online communications and transaction are happening on tablets and phones.
IT Security Awareness Day October 19, 2016
System Software Chapter 5
Hotspot Shield Protect Your Online Identity
Discovering Computers 2012: Chapter 8
Network security threats
Enrolling Two-Factor Authentication (2FA)
Physical activities and activity tracker
Guide to Computer Network Security
Software engineering in the mobile phone platform war.
CHAPTER 2: OPERATING SYSTEMS (Part 2) COMPUTER SKILLS.
Lesson 8 Operating Systems
Presentation transcript:

Mobile Operating System Security A PRESENTATION BY DANIEL ADAMS CSC 345 DR. BOX

A brief history Palm OS ◦First mobile operating system ◦Released in 1996 ◦Lacked a file system Windows CE ◦Windows for embedded systems ◦Also released in 1996 Symbian OS ◦Released on Ericsson R380 in 1999 ◦First modern OS on a smartphone

A brief history BlackBerry ◦Released first smartphone in 2002 ◦Many business productivity applications iOS ◦Released in 2007 ◦Marketed as an “Internet communicator” Android ◦Version 1.0 released on HTC Dream in 2008 ◦Free and open source, developed by Google

Why should I worry about protecting my device? o Loss of services o Loss of data o Compromise of privacy o Potential fraudulent charges

Types of threats Denial of service ◦Unable to access resources ◦Caused by bugs or attacks Malware ◦Not as prevalent on mobile devices as computers ◦Can include ◦Viruses ◦Worms ◦Trojans ◦Rootkits

Safeguards Malware prevention ◦iOS: Apple must approve apps put on app store ◦Android: Google scans apps put on store and on phone ◦Windows Phone: Microsoft must approve apps put on app store Malware removal ◦Multitude of antimalware Android apps in app store Secure Boot ◦Uses known cryptographic signatures during boot to detect tampering by a rootkit

Safeguards SELinux ◦Security Enhanced Linux ◦Used by Android to control access to rescources File Permissions ◦Prevent processes from accessing whatever file they want ◦Can stop malware from accessing critical OS files Memory Protection ◦Prevents processes from gaining higher privledges

Safeguards Authentication ◦PIN, passcode, pattern, facial recognition ◦Thin layer of protection against theft Device encryption ◦Renders data on phone unreadable without key ◦Virtually impossible to crack