Download presentation
Presentation is loading. Please wait.
Published byDustin Murphy Modified over 8 years ago
1
Mobile Device Security Threats Christina Blakley Host Computer Security
2
Outline I. Threats against mobile devices II. Where do the threats come from? III. What are the consequences? IV. Countermeasures V. How to protect against threats.
3
Threats Against Mobile Devices Security Locks/Passwords Application Markets SMS Social Engineering Physical Lost of Device
4
Security Locks and Passwords 54% of smartphone users use important dates or people as passcodes to phones. Social Engineering can aid attackers in retrieving passcodes to phones Advances in security locks of phones include: Biometrics Behavioral: Voice and handwriting Physiological: facial recognition and fingerprint Biometrics on cell phones have all been hacked thus far with iPhone fingerprint scanner being the latest. Most secure is passcode is 8-character combination of numbers, letters, and symbols.
5
Application Markets Ability to download third party software to mobile devices Platforms includes IOS, Android, Windows, and Blackberry. Anyone can become a developer Currently only Apple and Blackberry have app regulation policies. Apps in the app store that contain malicious software Mobile Devices have the ability to download software outside of app store through manipulation of the bootloader. Rootkits/”Jailbreaking” are also ways in which hackers can enter into devices.
6
Short Message Service Text messaging allows you to transmit data from one mobile device to another Spam unsolicited commercial email. However email is no longer the only form of spam, it now comes in the form of SMS Phone numbers are being sold by companies Phishing is the act of attempting to acquire personal information such as passwords and credit card information masquerading as a trustworthy entity. The attackers typically use urgent messages to get the victims attention. Walmart was the subject of a phishing attack when a SMS was sent to a large number of people offering a $1000 gift card.
7
Physical Lost of Device More than 33% of mobile device users do not put passwords on their devices Out of that 33%, 90% of them stated they have sensitive personal information stored in their phones. Americans lost $30 billion worth of mobile phones in 2011. Many applications with sensitive information such as banking do not always require user to re-login. Many users use notepads applications to store passwords for accounts. Could result in substantial lost for the victim.
8
Consequences Denial of Service and system unavailability attacks Trojan horses entering phones through applications False billing from providers Unwanted disclosure of Stored information Deleted, corrupted, or stolen user data Gateway to users other personal accounts
9
Countermeasures Preventative Regulation of all app stores Overhaul of mobile device anti-virus Spam block Require password protection Detective Remote security wipe Hard reset
10
How can you protect yourself? Limit personal information in phone. Use external storage system. Password protect device Use privacy screen protector to prevent shoulder surfing Do not alter phone with untrusted software.
11
Works Cited "Here's What People Are Doing On Their Smartphones And Tablets." Business Insider. N.p., n.d. Web. 05 Dec. 2013. Indiana University of PA, comp. Person Custom Business Resources. N.p.: n.p., n.d. Print. "Top Threats to Mobile Devices." - BankInfoSecurity. Roman, Jeffrey., n.d. Web. 05 Dec. 2013. PowerPoints, Host Computer Security, Dr. Obliety
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.