Download presentation
Presentation is loading. Please wait.
Published byMariah Gallagher Modified over 9 years ago
1
Presented by Team Alpha MOBILE DEVICE SECURITY 1
2
INTRODUCTION (ROSS) Beginning of mobility (why, who, where, when It began) DynaTAC handheld phone First mobile call made by Martin Cooper in 1973 Cooper called Bell labs rival in New York Smartphone and Tablet devices (why, where, when, and who) Simon from IBM First introduced in 1990’s What else about Simon??? What about the first Tablet device???? What, who, where, and when??? 2
3
MOBILE SECURITY (ROSS) 3 What is mobile security? First know virus written for smartphones in 2004 Virus called “Caribe” written for Symbian operating system Classified by Kaspersky Lab as Worm.SymbOS.Cabir Started the security concern for modern phones.
4
TYPE OF DEVICE OPERATING SYSTEM (ROSS) Windows Built-in Windows Office documents and Adobe Flash support Multi-tasking capability (Live tiles on Windows 8 Phones Available for multiple phone device brands iOS Has good embedded mobile security Includes full-block, file level hardware encryption Phone device must be Apple 4
5
TYPE OF DEVICE OPERATING SYSTEM CONTINUED 5 Android Google product Community and user driven No restrictions on applications Unsecure Blackberry Very successful in government and corporate markets Ranked top in security level Excellent integration with corporate email systems
6
STATISTICAL DATA (ROSS) According to the State of Mobility Survey 2012 by Symantec, 59 percent of the 6,275 respondents reported that their organizations are making line-of-business applications accessible from mobile devices, and 71 percent said their organization is looking at implementing a corporate "store" for mobile applications. It's not hard to see why. Organizations believe embracing mobile computing increases the efficiency and effectiveness of their workforces. Symantec's survey found that 73 percent of respondents expected to increase efficiency through mobile computing, and all of them did realize that increased efficiency See link for reference http://www.cio.com/article/711258/For_BYOD_Best_Practices_Secure_Data_Not_Devices http://www.cio.com/article/711258/For_BYOD_Best_Practices_Secure_Data_Not_Devices You may choose to use or not; up to you. 6
7
THE NEED TO SECURE (JOHN) BYOD Policy Mobile Commerce Gateway to Corporate Networks Personal Content Unsecured Wireless Communications Because the US President uses one 7
8
PROS AND CONS (JOHN) Personal work space Apps and Games Inconvenient (personal and work phone) Secure communications Access to corporate data Access to business applications Remote IT support (for IT personnel) 8
9
RECOMMENDATION (KEVIN) Mobile device management (MDM) tools BYOD security policy Hire dedicated staff for MDM Educate users through InfoSec classes Encourage InfoSec staff to acquire certification 9
10
CONCLUSION (EVERYONE) 10
11
REFERENCE (EVERYONE) 11
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.