Presentation is loading. Please wait.

Presentation is loading. Please wait.

Mobile Security What is mobile secuirty & Identifying smartphone security holes& Sayed Hashimi Proposal Project.

Similar presentations


Presentation on theme: "Mobile Security What is mobile secuirty & Identifying smartphone security holes& Sayed Hashimi Proposal Project."— Presentation transcript:

1 Mobile Security What is mobile secuirty & Identifying smartphone security holes& Sayed Hashimi Proposal Project

2 Mobile Security what is and so what?
According to an online article, “The estimated number of mobile devices is around 5.8 billion, which is thought to have grown exponentially within five years and is supposed to reach nearly 12 billion within four years. Hence, it will be an average of two mobile devices per person on the planet. This makes us fully dependent on mobile devices with our sensitive data being transported all over. As a result, mobile security is one of the most important concepts to take in consideration. Mobile Security as a concept deals with the protection of our mobile devices from possible attacks by other mobile devices, or the wireless environment that the device is connected” (

3 More on mobile security
Basically, the purpose of mobile security is that it provides complete protection of information and data on portable devices such as tablets, etc. Mobile devices are protected from malware threats The need for securing mobile devices has went up as the change in devices keeps happening with new applications updates, and the expanding of the devices of course

4 Identifying smartphone security holes…
According to online site, “Open port backdoors could be exploited to steal private information such as contacts, security credentials and photos; to remotely control a device; to perform a denial of service attack; or to inject malicious code that could jumpstart widespread, virus-like attacks, the researchers say” (

5 Id. Smartphone security holes continued..
Smartphones rely on open ports for specific kind of information as online article discussed, and due to the foundation or the way the mobile networks are set up, the phones IP address as online article mentioned can alternate as they disperse in the planet which can lead to security issues According to online article, “Open ports were implicated in the November 2015 “wormhole” vulnerability in a software development kit made by Baidu, a Chinese internet services company. The issue affected thousands of Android apps and at least 100 million devices. While the number of devices affected was high, the U-M researchers say this represents just one usage of open ports” (

6 Capability of smartphones
Smartphones compose of many sensors that are installed in them. These sensors on smartphones are capable of unique factors such as detecting weather, light, and other things. As online article discussed how on online app store like Google Play have found some apps that are abusing there way of access to the sensors apparently. As a result , Google tried to rerun the apps from Android phones. The apps can do things like record and even take picture and leak data!!

7 What are some smartphone sensors?
As online article discussed, Accelerometer-inicates acceleration and vibrations and judges the way the action is occurring A gyroscope finds differing directions like up and down around axes Sensors held that detects whenever the phone is held near the face whenever you have to make a call. Infrared sensor-is used basically to locate user movements for gesture


Download ppt "Mobile Security What is mobile secuirty & Identifying smartphone security holes& Sayed Hashimi Proposal Project."

Similar presentations


Ads by Google