Download presentation
Presentation is loading. Please wait.
1
CS691 Robin Kimzey Cell Phone Security a little computer in your pocket an easy target for malcontents
2
CS691 Robin Kimzey Presentation Topics historyfunctionalityusage security issues attack prevention attack recovery enterprisefuture
3
CS691 Robin Kimzey History the brick analog networks limited users limited availability
4
CS691 Robin Kimzey Typical Functionality voice calls text messaging web surfing bluetooth connectivity wi-fi connectivity email
5
CS691 Robin Kimzey Typical Usage verbal communication electronic communication storage of information like contacts and possibly business or personal security data personal/business photos business presentations or confidential files
6
CS691 Robin Kimzey Security Issues physical theft signal interception malware infection cloning tracking text spamming DoS (bluetooth) enterprise access
7
CS691 Robin Kimzey Attack Prevention physically secure device use security tools available to you only enable features that are used look for 3rd party software for additional security be aware of security issues and avoid them when possible trusted software from trusted sources
8
CS691 Robin Kimzey Attack Recovery report stolen/lost hardware immediately disable account wipe device contents remotely reset device and re-install authorized apps
9
CS691 Robin Kimzey Enterprise setup solid security policy for all devices enforce the security policy in place train users to understand and mitigate security issues
10
CS691 Robin Kimzey Future Trends/Issues standardized/open OSes like Android increased functionality zombie/botnet threat current computer risks are future cell phone risks
11
CS691 Robin Kimzey References NIST SP800-124, http://csrc.nist.gov/publications/drafts/800-82/draft_sp800-82- fpd.pdf http://csrc.nist.gov/publications/drafts/800-82/draft_sp800-82- fpd.pdfhttp://csrc.nist.gov/publications/drafts/800-82/draft_sp800-82- fpd.pdf Emerging Cyber Threats Report for 2009, Georgia Tech http://www.gtiscsecuritysummit.com/pdf/CyberThreatsReport2009.pdf http://www.gtiscsecuritysummit.com/pdf/CyberThreatsReport2009.pdf
12
CS691 Robin Kimzey Questions?
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.