Download presentation
Presentation is loading. Please wait.
1
Mobile Technology: Security and Peripherals
2
Outcomes Describe security issues and terminology associated with mobile technology. Identify and use a range of security related applications for mobile devices. Perform a back-up and restore of data from a mobile device. Connect and configure mobile devices to operate a range of mobile peripherals.
3
Outcome 1 Describe security issues and terminology associated with mobile technology
4
Performance Criteria Describe mobile device security concepts and terminology.
5
Mobile Security The term mobile security covers everything from protecting mobile devices from malware threats to reducing risks and securing mobile devices and their data in the case of theft, unauthorized access or accidental loss of the mobile device.
6
Mobile Security Mobile security involves protecting both personal and business information stored on and transmitted from smartphones, tablets, laptops and other mobile devices.
7
Mobile Security Mobile security also refers to the means by which a mobile device can authenticate users and protect or restrict access to data stored on the device through the use of passwords, personal identification numbers (PINs), pattern screen locks or more advanced forms of authentication such as fingerprint readers, eye scanners and other forms of biometric readers.
8
Mobile Security Mobile security solutions and apps are available from a wide array of vendors for all of the popular mobile operating systems, including iOS for iPhones and iPads, Google’s Android platform and Microsoft’s Windows Phone. Mobile security is closely related to mobile device management (MDM), which is a term that specifically applies to protecting mobile devices in the enterprise or business environments from loss or theft, as well as protecting the data on these devices.
9
Mobile Security Concepts
Mobile device security includes device encryption to protect the data, screen locks to help prevent unauthorized access, and remote wipe capabilities to delete all data on a lost phone. Radio-frequency identification (RFID) methods are often used for inventory control.
10
Device Security Concepts and Concerns
Mobile device security includes device encryption to protect the data, screen locks to help prevent unauthorized access, and remote wipe capabilities to delete all data on a lost phone. Radio-frequency identification (RFID) methods are often used for inventory control.
11
Screen Locks Most devices support the use of a passcode or password to lock the device. This is similar to a password-protected screen saver on desktop systems and prevents someone from easily accessing the device and the data it contains. Some devices have an additional setting that erases all the data if the incorrect passcode is entered too many times.
12
Asset Tracking Mobile devices are easy to lose track of so organizations often use asset-tracking methods to reduce losses. For example, when a user is issued a mobile device, asset-tracking methods record it. Similarly, if the user leaves the company, asset- tracking methods ensure the user returns the device.
13
Inventory Control Many organizations use automated methods for inventory control. For example, radio-frequency identification (RFID) methods can track the movement of devices. These are the same types of devices used in stores to prevent shoplifting. Organizations won’t necessarily have an alarm, but they can track the movement of devices.
14
Performance Criteria Describe mobile device security threats.
15
Mobile Device Security Threat
Like viruses and spyware that can infect your PC, there are a variety of security threats that can affect mobile devices. There are several categories: application-based threats, web-based threats, network-based threats and physical threats.
16
Application-Based Threats
Downloadable applications can present many types of security issues for mobile devices. “Malicious apps” may look fine on a download site, but they are specifically designed to commit fraud. Even some legitimate software can be exploited for fraudulent purposes.
17
Application-Based Threats
Application-based threats generally fit into one or more of the following categories: Malware is software that performs malicious actions while installed on your phone. Spyware is designed to collect or use private data without your knowledge or approval.
18
Application-Based Threats
Privacy Threats may be caused by applications that are not necessarily malicious, but gather or use sensitive information (e.g., location, contact lists, personally identifiable information) than is necessary to perform their function. Vulnerable Applications are apps that contain flaws which can be exploited for malicious purposes. Such vulnerabilities allow an attacker to access sensitive information, perform undesirable actions, stop a service from functioning correctly, or download apps to your device without your knowledge.
19
Web-based Threats Because mobile devices are constantly connected to the Internet and frequently used to access web- based services, web-based threats pose persistent issues for mobile devices: Phishing Scams use , text messages, Facebook, and Twitter to send you links to websites that are designed to trick you into providing information like passwords or account numbers. Often these messages and sites are very different to distinguish from those of your bank or other legitimate sources.
20
Web-based Threats Drive-By Downloads can automatically download an application when you visit a web page. In some cases, you must take action to open the downloaded application, while in other cases the application can start automatically. Browser exploits take advantage of vulnerabilities in your mobile web browser or software launched by the browser such as a Flash player, PDF reader, or image viewer. Simply by visiting an unsafe web page, you can trigger a browser exploit that can install malware or perform other actions on your device.
21
Network Threats Mobile devices typically support cellular networks as well as local wireless networks (WiFi, Bluetooth). Both of these types of networks can host different classes of threats: Network exploits take advantage of flaws in the mobile operating system or other software that operates on local or cellular networks. Once connected, they can install malware on your phone without your knowledge.
22
Network Threats Wi-Fi Sniffing intercepts data as it is traveling through the air between the device and the WiFi access point. Many applications and web pages do not use proper security measures, sending unencrypted data across the network that can be easily read by someone who is grabbing data as it travels.
23
Physical Threats Mobile devices are small, valuable and we carry them everywhere with us, so their physical security is also an important consideration. Lost or Stolen Devices are one of the most prevalent mobile threats. The mobile device is valuable not only because the hardware itself can be re-sold on the black market, but more importantly because of the sensitive personal and organization information it may contain.
24
Performance Criteria Describe steps that can be taken to mitigate security threats.
25
MITIGATE MOBILE DEVICE SECURITY RISKS
As vulnerabilities increase in frequency and severity, there is a natural inclination within IT to establish rigid rules and policies for device usage around data encryption, secure and mobile browsing so that no data leakage can occur
26
MITIGATE MOBILE DEVICE SECURITY RISKS
Data on a PC versus Data on a Mobile Device Desktop and laptop computing devices typically are subject to policies and procedures, and contain security software. So they tend to be more secure than mobile devices. As a result, some organizations are providing guidelines that require data to be accessed using a netbook, and not by a mobile device such as a smart phone.
27
MITIGATE MOBILE DEVICE SECURITY RISKS
trusted anti-malware solution personal firewall solution robust password protection to protect device access
28
TRUSTED ANTI-MALWARE SOLUTION
Malware is any form of malicious software – not just viruses, worms and keyloggers, but also nuisance programs like adware that add toolbars to your web browser, bombard you with popup windows, hijack your homepage, and send your personal data to advertisers. These are not only annoying, but also present a serious security risk.
29
TRUSTED ANTI-MALWARE SOLUTION
Install only the trusted anti-malware application to boost your protection from a more diverse range of threats Scan regularly.
30
TRUSTED ANTI-MALWARE SOLUTION
EXERCISE Find a pair. Find ONE (1) Anti-Malware Solution for mobile. Describe the application. Identify the features. Screenshot how to install. (Alternative: Video) Screenshot how to scan and the result. (Alternative: Video) Justify the why you chose that application.
31
TRUSTED ANTI-MALWARE SOLUTION
Example: Avast Antivirus & Security Sophos Free Antivirus and Security Avira Antivirus Security Trend Micro Mobile Security & Antivirus
32
PERSONAL FIREWALL SOLUTION
No device is safe from the threats of malicious software and mobile phones are particularly vulnerable. As such, it’s important for mobile phone owners to arm themselves against the hackers looking to scrape their data and use it to corrupt ends. What’s even more alarming, however, is that many seemingly legitimate apps are collecting info on us, often without our knowing, and you find this fact to be more than a little disconcerting, then an effective little firewall app for mobile phones will help you regain control of the data you share.
33
PERSONAL FIREWALL SOLUTION
EXERCISE Find a pair. Find ONE (1) firewall application for mobile. Describe the application. Identify the features. Screenshot how to install it on a mobile device. Screenshot how it works. Justify the why you chose that application.
34
ROBUST PASSWORD PROTECTION
Passwords help protect your privacy and identity. The strength of your password is an important factor to consider. If passwords are guessed or stolen, someone logging in under your identity could cause problems with your credit, or reputation.
35
ROBUST PASSWORD PROTECTION
Most common passwords in 2017 123456 654321 qwertyuiop 3rjs1la7qe qwerty mynoob google 111111 123321 1q2w3e4r5t password 666666 123qwe 123123 1q2w3e4r zxcvbnm
36
ROBUST PASSWORD PROTECTION
Strong passwords coupled with biometric features, such as fingerprint authenticators, make unauthorized access nearly impossible. Your passwords should be eight or more characters long and contain alphanumeric characters.
37
ROBUST PASSWORD PROTECTION
If your mobile device allows two-factor authentication, don’t hesitate to use it. You don’t want to be subject to unforeseen attacks.
38
ROBUST PASSWORD PROTECTION
The complexities of your passwords in other apps might tempt you to store them in a similar way a browser does – that is, using the ‘remember me feature.’ This feature should be avoided at all costs since it only increases the chances of your password getting spoofed. Alternatively, if you lose your device, another person might gain full access to it.
39
ROBUST PASSWORD PROTECTION
Furthermore, don’t forget to change your password from time to time (at least every three months)
40
ROBUST PASSWORD PROTECTION
Most common passwords in 2017 123456 654321 qwertyuiop 3rjs1la7qe qwerty mynoob google 111111 123321 1q2w3e4r5t password 666666 123qwe 123123 1q2w3e4r zxcvbnm
41
ROBUST PASSWORD PROTECTION
Creating PASSWORDS Make your passwords very long Don’t use a common phrase Test your password Don’t reuse your password Use a password manager
42
ROBUST PASSWORD PROTECTION
Make your passwords very long The best answer to that is a very long string of words it is best to add some capital letters, special characters, or numbers.
43
ROBUST PASSWORD PROTECTION
Don’t use a common phrase don’t use phrases from books like So many books, so little time don’t use your birthday or the phrase printed on your favorite coffee mug.
44
ROBUST PASSWORD PROTECTION
Test your password test if your password is long enough. But they won’t warn you about common guessable phrases. typing your passwords into unfamiliar sites is a bad habit. but to be safe, just use these sites to get the gist before you make your real password.
45
ROBUST PASSWORD PROTECTION
Don’t reuse your password Don’t use a weak password for services that “don’t matter,” because some day you might give one of those services your credit card info, or use it to authorize more important services, and you won’t think to beef up your password.
46
ROBUST PASSWORD PROTECTION
Use a password manager Your “random” string of words will be something like “monkey dragon baseball princess,” four extremely common password words, and a computer will guess it. You’ll pick something memorable, which will limit your options, and a computer will guess it. You’ll manage to make a password a computer can’t guess, and you’ll forget it, and you’ll have to replace it with a weaker password, and a computer will guess it. You’ll pick something identifiable to anyone who follows you on Twitter or Facebook—like your dog’s name—and a human will guess it.
47
ROBUST PASSWORD PROTECTION
Exercise (5 minutes) create the strongest password
48
ROBUST PASSWORD PROTECTION
EXERCISE How do you provide security in your mobile devices? Screenshot your evidences.
49
THANK YOU! Any questions?
50
References: Webopedia.com. (2017). What Is Mobile Security? Webopedia Definition. [online] Available at: (2017). Mobile Security Tutorial. [online] Available at: Get Certified Get Ahead. (2017). Device Security Concepts | Get Certified Get Ahead. [online] Available at: Lookout.com. (2017). What is a mobile threat?. [online] Available at: US-CERT Technical Information Paper TIP “ Cyber Threats to Mobile Devices,” April 15, U. S. National Institute of Standards and Technology SP Guidelines on Cell Phone and PDA Security , October 2008 U.S. Defense Information Systems Agency (DISA) Information Assurance Support Environment (IASE) Security Technical Implementation Guides (STIGS) and Supporting Documents EDUCAUSE “ Ten Steps to Secure Your Mobile Devices ” Vendor web sites including Apple (for iPhone) and Blackberry
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.