THREATS TO MOBILE NETWORK SECURITY

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
Thank you to IT Training at Indiana University Computer Malware.
BlueRedGreenPurpleOrange.
What are computer viruses and its types? Computer Viruses are malicious software programs that damage computer program entering into the computer without.
SECURITY CHECK Protecting Your System and Yourself Source:
Internet Safety Basics Never share names, schools, ages, phone numbers, or addresses. Never open an from a stranger – it may contain viruses that.
Network Security. Network security starts from authenticating any user. Once authenticated, firewall enforces access policies such as what services are.
Malicious Attacks. Introduction Commonly referred to as: malicious software/ “malware”, computer viruses Designed to enter computers without the owner’s.
What Are Malicious Attacks? Malicious Attacks are any intentional attempts that can compromise the state of your computer. Including but not limited to:
MOBILE MALWARE TOPIC #5 – INFORMATION ASSURANCE AND SECURITY Michael Fine 1.
Information about the computer By Sophia and Christina C.
Viruses, Hacking, and AntiVirus. What is a Virus? A type of Malware – Malware is short for malicious software A virus – a computer program – Can replicate.
Security Advice Georgie Pepper Campsmount Acadamy.
Information Security Information Technology and Computing Services Information Technology and Computing Services
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Protecting Yourself Online (Information Assurance)
CS101 Lecture 14 Security. Network = Security Risks The majority of the bad things that can be done deliberately to you or your computer happen when you.
ISNE101 Dr. Ken Cosh Week 14. This Week  Challenges (still) facing Modern IS  Reliability  Security.
Cyber Crimes.
Detrick Robinson & Amris Treadwell.  Computer viruses- are pieces of programs that are purposely made up to infect your computer.  Examples: › Internet.
MOBILE DEVICE SECURITY. WHAT IS MOBILE DEVICE SECURITY? Mobile Devices  Smartphones  Laptops  Tablets  USB Memory  Portable Media Player  Handheld.
Malware and Spyware Attacking Cell Phones Chris Gooch, Jessica Russell, Destiny Logan.
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
Seminar On Cellular Virus
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
IT security By Tilly Gerlack.
Adam Soph, Alexandra Smith, Landon Peterson. Phishing is a way of attempting to acquire information such as usernames, passwords, and credit card details.
CYBER CRIME.
ED 505 Educational Technology By James Moore.  What is the definition of Netiquette and how does it apply to social media sites? ◦ Netiquette is the.
Introduction to ITE Chapter 9 Computer Security. Why Study Security?  This is a huge area for computer technicians.  Security isn’t just anti-virus.
Types of Electronic Infection
Chapter 9 Sending and Attachments. 2Practical PC 5 th Edition Chapter 9 Getting Started In this Chapter, you will learn: − How works − How.
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
Topic 5: Basic Security.
What is Spam? d min.
Module  Introduction Introduction  Techniques and tools used to commit computer crimes Techniques and tools used to commit computer crimes.
Computer Skills and Applications Computer Security.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Computer Crime: Identity Theft, Misuse of Personal Information, and How to Protect Yourself (Tawny Walsh, Irina Lohina, Renair Jackson, Jahmele Betterson,
NETWORK SECURITY Definitions and Preventions Toby Wilson.
Computer and Internet Security (How to protect your computer from Threats) By: Steven Siggers Instructor: Dr. Marko Puljic.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
By: Jasmin Smith  ability to control what information one reveals about one’s self over the Internet.
OCTOBER IS CYBER SECURITY AWARENESS MONTH. October is Cyber Security Awareness Month  Our Cyber Security Awareness Campaign focuses on topics such as.
CIW Lesson 8 Part B. Malicious Software application that installs hidden services on systems term for software whose specific intent is to harm computer.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
Remember effective ways to search +walk (includes words) Intitle:iPad Intext:ipad site:pbs.org Site:gov filetype:jpg.
Android and IOS Permissions Why are they here and what do they want from me?
Created by the E-PoliceSlide 122 February, 2012 Dangers of s By Michael Kuc.
Network System Security - Task 2. Russell Johnston.
Digital Security Identity theft Copyright Laws Plagiarism, and More.
Managing Windows Security
3.6 Fundamentals of cyber security
IT Security  .
Unit 4 IT Security.
Seminar On Cellular Virus
Protect Your Computer Against Harmful Attacks!
How to Get Rid of Online Threats Impacting your Computer Device?
WHAT IS A VIRUS? A Computer Virus is a computer program that can copy itself and infect a computer A Computer Virus is a computer program that can copy.
Malware, Phishing and Network Policies
The Internet of Unsecure Things
Staying safe on the internet
Stay Safe While Using The Internet
9 ways to avoid viruses and spyware
Presentation transcript:

THREATS TO MOBILE NETWORK SECURITY by Gadde. RAVITEJA 14304007

CONTENTS: Introduction Threads Types of threads Protecting your phone conclusion Contents

Introduction:

Can virus infect the mobile phones? Can mobiles

The answer is YES. The first known cell-phone virus appeared in 2004 is cabir. The chance is increasing day by day and recent hoax virus, Spam SMS worms is an evidence of it. Due to the financial aspects associated with wireless communications, this subject is under through research now. 

Cell-phone Virus Basics: A cell-phone virus is basically the same thing as a computer virus .an unwanted executable file that "infects" a device and then copies itself to other devices. But whereas a computer virus or worm spreads through e-mail attachments and Internet downloads, a cell-phone virus or worm spreads via Internet downloads, MMS attachments and Bluetooth transfers. The most common type of cell-phone infection right now occurs when a cell phone downloads an infected file from a PC or the Internet ,or phone to phone.

Threats: A mobile phone user especially smartphone user is exposed to various threats when they use their phone. In the last two quarters of 2012, the number of unique mobile threats grew by 26.1%, according to ABI  (Allied Business Intelligence Research).These threats can disrupt the operation of the smartphone, and transmit or modify user data Problems to mobiles Dew to these threads Data : data management, therefore they may contain sensitive data like credit card numbers, authentication information, private information, activity logs. Identity : To steal the identity of the owner of a smartphone to commit other. Availability

Different types of threats or attacks on mobile security Attack based on communication (SMS and MMS) Attacks based on communication networks Attacks based on vulnerabilities in software applications Password cracking Malicious software (malware)

Attack based on communication (SMS and MMS) Infected text messages sometimes steal the subject line from a message you have received from a friend(chinese characters), which of course increases the likelihood of your opening it. A virus that spreads via MMS gets into the phone's contact list and sends itself to every phone number stored there. In all of these transfer methods, the user has to agree at least once (and usually twice) to run the infected file.

Attacks based on communication networks Attacks based on the GSM networks: These are form dew to the miss matching of encryption algorithms. The attacker may try to break the encryption of the mobile network and can able change the temporary identity(TMSI) . Once the encryption algorithm of GSM is broken, the attacker can intercept all unencrypted communications made by the victim's smartphone. Attacks based on Wi Fi: WAP bridges the mobile world and the Internet

Attacks on Mobile WAP network

Principle of Bluetooth based: The WAP protocol is now the leading standard for information services on wireless terminals like digital mobile phones. By the use of WAP, there is a possibility of wireless devices like mobile phones, getting infected with virus and worms. Principle of Bluetooth based: The user receives a virus via Bluetooth when the phone is in discoverable mode In this case, the virus spreads like an airborne illness.

Attacks based on vulnerabilities in software applications Web browser : Internet downloads - The virus spreads the same way a traditional computer virus does. The user downloads an infected file to the phone by way of a PC or the phone's own Internet connection. This may include file-sharing downloads, applications available from add-on sites (such as ringtones or games) and false security patches posted on the Symbian Web site.

Operating system: Problem in updating os

Password cracking: the possibility of cracking a device's password through a smudge attack. It is literally imaging the finger smudges on the screen to discern the user's password . The researchers were able to discern the device password up to 68% of the time under certain conditions.

Malicious software (malware): A malware is a computer program that aims to harm the system in which it resides. The three phases of malware attacks Infection Accomplishment of its goal Spread to other systems Examples of malware Viruses and trojans Spyware

A Trojan is a program that is on the smartphone and allows external users to connect discreetly . ex; red browser based on java, spyware based on simbion A worm is a program that reproduces on multiple computers across a network. A virus is malicious software designed to spread to other computers by inserting itself into legitimate programs and running programs in parallel.

Protecting Your Phone Spam filters. Turn off Bluetooth discoverable mode Check security updates to learn about filenames you should keep an eye out for. Install some type of security software on your phone. Memory Protection. Spam filters. Not always changed Default settings.

Conclusion: The best way to protect yourself from cell-phone viruses is the same way you protect yourself from computer viruses: Never open anything if you don't know what it is, haven't requested it or have any suspicions whatsoever that it's not what it claims to be. That said, even the most cautious person can still end up with an infected phone.

Sources 1."Cell-Phone Viruses." TechnologyReview.com.http://www.technologyreview.com/articles/05/05/issu e/feature_emerging.asp?p=9 2."Cell phone virus turns up the heat." News.com.http://news.com.com/Cell+phone+virus+turns+up+the+heat/2100 - 7349_3-5520003.html 3."Clock's ticking on phone virus outbreak, experts say." News.com.http://news.com.com/Clocks+ticking+on+phone+virus+outbreak% 2C+experts+say/2100-7349_3-5756428.html?tag=mainstry 4. European Telecommunications Standards Institute (2011). "3GPP Confidentiality and Integrity Algorithms &UEA1 UIA1".[dead link] 5. Mobile security Wikipedia, the free encyclopedia