Mobile Security iPhone and Android OS. iPhone Security Features Find my iPhone Remote wipe Automated back up at sync Auto lock / passcode lock Wipe after.

Slides:



Advertisements
Similar presentations
Mobile Device Management: Do You Know Whos Accessing Your Network? Umesh Shah, Dir. Channel Marketing.
Advertisements

This presentation, including any supporting materials, is owned by Gartner, Inc. and/or its affiliates and is for the sole use of the intended Gartner.
November 14, 2012 Securely Manage your devices, applications and data. Deploy your corporate policies on smart devices. Comply with Regulatory Laws. Detroit.
Smart Phones and Tablets: Security Issues S. Roy 1.
Sophos Mobile Control SophSkills Session Name: Thomas Lippert – Product Management DPG Date: 17-Feb-2011.
Introduction to Android Mohammad A. Gowayyed CS334-Spring 2014.
Invasion of Smart Phones in Clinical Areas Chrissy Kyak Privacy Officer University of Maryland Upper Chesapeake Health.
Mobile Security 310KM Lab 4 Group Presentation NG KING TUNG MA HO YIN CHE CHUN KIT WOO SHUN CHAK.
6218 Mobile Devices- Are They Secure Enough for our Patient's Data? Presented By Aaron Hendriks, CISSP Other: Employee of University Health Network, Toronto,
Medical University of South Carolina Office of the CIO – Information Services Endpoint Security Team Mobile Device Management March 8, 2012.
Sophos Mobile Control. Tablets on the rise 2 Trends 3 75% of 157 polled companies encourage employee owned smart phones and tablets to access corporate.
Latest Threats Against Mobile Devices Dave Jevans Founder, Chairman and CTO.
Mobile Phone Security. [ Lecturers ] Jure Bogunović Marin Cokarić.
Securing your Jail broken IPhone. iPhone Worm An iPhone worm has started jumping between jailbroken devices, taking advantage of users who have replaced.
Smartphone Security How safe are you?. Main Points 1. Malware/Spyware 2. Other Mischief 3. How a phone might get infected 4. Staying Safe a. Malware b.
Chung Man Ho Willims Chow Man Kei Gary Kwok Pak Wai Lion.
Protect your data Enable your users Unify Your Environment DevicesAppsData Help organizations enable their users to be productive on the devices they.
310KM – Team Assignment: OS Platform of Mobile workforce for Logistics Company Window Mobile OS: Chan Wai Kai Android Operation Systems: Chan Kwok.
 Smartphone overview › Platform comparison  App Construction  Smartphone malware and viruses  Security threats  Keeping your Smartphone clean.
 IPhone came out first and had more time to develop. (3G)  Also was developed using OS-X  Android was started as a mobile device OS acquired by google.
Desktop virtualization Access & information protection Mobile device & application management Hybrid identity Simplified device enrollment and.
Lu Cheng (l ). Power Consuming Services Android and iPhone support energy hungry network services 2G/3G: the two-way radio system for long range.
IOS 8 for MDM/EMM Greg Elliott Shiv Chandra Kumar.
S MARTPHONE A PPLICATION D EVELOPMENT Sam Palmer.
Phone Trivia McKay Fackrell PLAY. What is the current operating system for Apple? Question one iOS Apple 8 OS X Lion OS X Yosemite.
Android Security What is out there? Waqar Aziz. Android Market Share - I 2.
A+ Certification Guide Chapter 10 Mobile Devices.
Threats and ways you can protect your computer. There are a number of security risks that computer users face, some include; Trojans Conficker worms Key.
A METHODOLOGY FOR EMPIRICAL ANALYSIS OF PERMISSION-BASED SECURITY MODELS AND ITS APPLICATION TO ANDROID.
Securing Your Android Device Terry Labach Information Security Services, IST.
By Mihir Joshi Nikhil Dixit Limaye Pallavi Bhide Payal Godse.
 Security and Smartphones By Parker Moore. The Smartphone Takeover  Half of mobile phone subscribers in the United States have a smartphone.  An estimated.
All Your Droid Are Belong To Us: A Survey of Current Android Attacks 단국대학교 컴퓨터 보안 및 OS 연구실 김낙영
Computer and Information Sciences
ANDROID Presented By Mastan Vali.SK. © artesis 2008 | 2 1. Introduction 2. Platform 3. Software development 4. Advantages Main topics.
Frequently Asked Questions NCSC Product Certification Payroll Anytime, Anywhere!
1 Company Proprietary and ConfidentialThe document name can go here Android OS Security Omar Alaql July 8, 2013 Kent State University Android OS Security.
REMOTE LOGIN. TEAM MEMBERS AMULYA GURURAJ 1MS07IS006 AMULYA GURURAJ 1MS07IS006 BHARGAVI C.S 1MS07IS013 BHARGAVI C.S 1MS07IS013 MEGHANA N. 1MS07IS050 MEGHANA.
MICHAEL J MONROE. What is ? Collection of online services and software offered by Apple. Compatible with Mac OSX, Windows, iPhone, and iPod Touch. Released:
ANDROID BY:-AANCHAL MEHTA MNW-880-2K11. Introduction to Android Open software platform for mobile development A complete stack – OS, Middleware, Applications.
Enabling users to be productive, responsibly Finding the right balance Devices & Experiences Users Want Applications and data across devices, anywhere.
Convenience product security Collin Busch. What is a convenience product? A convenience product is a device or application that makes your life easier.
Gary Gruba Systems Engineer Absolute Manage MDM Managing iPhones, iPads, iPod Touches and Android Dougald MacNaughton Account Executive.
Grants Management Training 200 Cyber Security There are two kinds of people in America today: Those who have experienced a cyber-attack and know it, and.
Wireless and Mobile Security
MobileSecurity Vulnerability Assessment Tools for the Enterprise Mobile Security Vulnerability Assessment Tools for the Enterprise Integrating Mobile/BYOD.
Cevgroup.org C utting E dge V isionaries. cevgroup.org TODAY’s TALK 1) Internet Of Things (IoT) 2) Wi-Fi Controlled Robots 3) Augmented Reality.
Introducing the Smartphone Pentesting Framework Georgia Weidman Bulb Security LLC Approved for Public Release, Distribution Unlimited.
Step 1 Remove the wifi Network which is already connected.
NESSUS. Nessus Vulnerability Scanner Features: Ease of use Deep Vulnerability Analysis Discover network based and local vulnerabilities Perform configuration.
Protect your data Enable your users Unify Your Environment DevicesAppsData Help organizations enable their users to be productive on the devices they.
Computer Maintenance Chapter Ten Mobile Devices Dr. Mohammad AlAhmad.
CSS ONLINE CLASSES GUIDELINES CSS-2017 Sessions Contact: CSS Competition Zone Pakistan.
iSmart WiFi Light Bulb DVR Camera IP Camera + Lamp
WELCOME Mobile Applications Testing
Operating System.
Two-factor authentication
Security of Mobile Operating Systems
How To Install Norton Security on Android Phone
MOA Delta Mobile OA Installation Guide 2015/12/16.
RR RR Problems Along With Solutions For iPhone And iPad Toll Free ( )
Google 2 Step Verification Backup Codes Google 2 Steps Verification Backup Codes is very important to get access Gmail account. Backup codes is usually.
Industry Best Practices – Security For Smartphones / Mobile Devices
Chapter 10 Mobile, Linux, and OS X Operating Systems
Clemson For iOS Devices and Wi-Fi Setup
Multi-Factor Authentication
How to Download And Install McAfee Mobile Security on iOS?
Current State of Security and Privacy
IT Management, Simplified
Presentation transcript:

Mobile Security iPhone and Android OS

iPhone Security Features Find my iPhone Remote wipe Automated back up at sync Auto lock / passcode lock Wipe after 10 failures Ask to join WiFi Tightly controlled applications

Current Issues November 2009, Only jailbroken phones with SSH app (unchanged password) installed were affected, changed background to Rick Astley February 2010, Over-the-air installation files in conjunction with faked security certificates make users vulnerable to installing malicious updates

Android Security Features Every application reports necessary services at installation Lock code, without user set timer User policed applications Third party security services

Current Issues November 2008, Browser security flaw October 2009, Malformed SMS could disconnect phone from network October 2009, Malicious code in Dalvik VM could issue unauthorized restart of phone January 2010, Flaw allowing circumvention of home screen lock