SlideShare a Scribd company logo
1 of 22
CONTENTS
 INTRODUCTION
 SPREADING OF VIRUS
 ANAMNESIS (CASE STUDIES)
 CURRENT STATUS OF MOBILE
MALWARE
 PROTECTIVE MEASURES
 THREATS OF MOBILE PHONE
VIRUS
 CONCLUSION
INTRODUCTION
Mobile security / Mobile phone security has become
increasingly important in mobile computing.
It is of particular concern as it relates to
the security of personal and business information now
stored on smart phones.
Rapid advances in low-power computing,
communications, and storage technologies continue to
broaden the horizons of mobile devices, such as cell phones
and personal digital assistants (PDAs).
A cell-phone virus is basically the same thing as a computer
virus. An unwanted executable file that "infects" a device and then
copies itself to other devices.
1. A computer virus or worm spreads through e-mail
attachments and Internet downloads.
2. A cell-phone virus or worm spreads via Internet
downloads, MMS attachments and Bluetooth transfers.
Current phone-to-phone
viruses almost exclusively infect
phones running the Symbian
operating system.
Standard operating systems and Bluetooth technology will
enable cell phone viruses to spread either through SMS or by sending
Bluetooth requests when cell phones are physically close enough.
SPREADING OF VIRUS
Phones that can only make and receive calls are not at
risk. Only smart phones with a Bluetooth connection and
data capabilities can receive a cell-phone virus.
These viruses spread primarily in three ways:
1. Internet download - The user downloads an
infected file to the phone by way of a PC or the phone's own
Internet connection.
2. Bluetooth wireless connection - The user receives
a virus via Bluetooth when the phone is in discoverable
mode, meaning it can be seen by other Bluetooth-enabled
phones.
3. Multimedia Messaging Service - The virus is an
attachment to an MMS text message
Mobiles enabled with GPS facility can cause much
large scale of virus infection spread.
ANAMNESIS (CASE STUDIES)
1. CABIR
The first known cell-phone virus, Cabir, is entirely innocuous
(not harmful). All it does is sit in the phone and try to spread itself.
2. COMWAR
The second worm for mobile devices detected in the wild was
COMWAR . This is the first worm for mobiles phones which is able to
propagate via MMS.
3. CARDTRAP
Card Trap is the first known mobile malware that attempts a
cross-platform infection by jumping from an infected phone to a target
computer
4. DUTS
DUTS is a parasitic file infector virus. It is the first known
virus for the PocketPC platform. DUTS affects ARM-based devices
only
5. SKULLS
A Trojan horse piece of code. Once downloaded, the virus,
called Skulls, replaces all phone desktop icons with images of a
skull.
6. LASCO
It is based on the same source code which is now freely
available on the net. LASCO.A is very similar to CABIR.H.
CURRENT STATUS OF MOBILE MALWARE
The first half of 2008 was interesting from a mobile
malware point of view. It's worth stressing the following points:
1. An increase in the number of malicious programs with
Trojan-SMS behavior.
2. The cross-platform nature of mobile Trojans - Any mobile
phone which supports Java applications or has a Python interpreter
is under threat.
3. The increase in the number of WAP sites where such Trojan
programs are placed.
4. The appearance of ICQ spam which advertises WAP sites
and the malicious programs located on these sites.
5. The variety of social engineering methods used to spread
and disguise malicious programs.
6. The identification of short numbers to which short messages
are secretly sent.
THEORETICAL DEVELOPMENTS
1. Symbian Mobiles
Symbian malware has reached the stage where it is
being developed for profit. we saw the first Trojan-spy for
Symbian in April. Flexispy was being sold by its creator
for 50 USD. The Trojan established full control over smart
phones.
2. Windows Mobile
Windows Mobile, currently the second most popular
platform for smart phones, also attracted the attention of
malware writers. This sounds more serious than it actually
is given that there were only two examples of malware for
Windows Mobile – DUTS and BRADOR.
CROSS - PLATFORM MALWARE
The CXOVER virus, is the first example of a cross-
platform virus for mobile devices. CXOVER begins by
checking which operating system is working on the
infected device. Once the virus is on a mobile device it
attempts to copy itself onto accessible PCs. In addition, it
deletes user files on infected devices.
The LETUM worm, which was detected in April,
continued the cross platform trend. LETUM is a typical
email worm in that it spreads as an infected attachment and
sends copies of itself to all the addresses in the local
address book.
Protection against viruses can be implemented in two phase.
1. Network level security – It makes use of the proactive
approach .
2. System level security – It employs MOSES (Mobile
security processing system).
PROTECTIVE MEASURES
1. PROACTIVE APPROACH
The exponential growth of messaging in both home and
enterprise environments has made it a potent vector for the spread
of malicious code. The problem is compounded further by the
increasing convergence of various messaging platforms.
For example, users can now send IM messages from
mobile phones and SMS messages to mobile phones via SMS
gateways on the Internet.
In this section, we explain the basic rate-limiting and
quarantine mechanisms that serve as the building blocks of our
proactive response framework.
 QUARANTINE
In contrast with Rate-limiting, Quarantine-based
systems prevent a suspicious or infected client from
sending or receiving messages. This can be implemented at
the messaging server so that any connection attempt by the
user on an infected client is refused.
 RATE - LIMITING
The Rate-limiting (also known as “virus throttling”)
is a general class of response techniques that seek to limit
the spread of a worm or virus once it is detected on a host.
2. MOBILE SECURITY PROCESSING SYSTEM (MOSES)
Mobile Security Processing System is a programmable
security processor platform, to enable secure data and multi-media
communications in next-generation wireless handsets.
 SW Architecture
The software architecture for MOSES was designed using a
layered philosophy, much like the layering used in the design of
network protocols. At the top level, the SW architecture provides a
generic interface (API) using which security protocols and
applications can be ported to the platform.
 HW Platform Architecture
The hardware platform is based on the Xtensa configurable
and extensible processor from Tensilica, Inc.
Virus might access and/or delete all of the contact
information and calendar entries in your phone. It might send an
infected MMS message to every number in your phone book.
The top three areas of concern for mobile users are receiving
inappropriate content, fraudulent increases in phone bills and loss of
important information stored on the handset.
THREATS OF MOBILE PHONE VIRUS
CONCLUSION
The best way to protect yourself from cell-phone viruses is the
same way you protect yourself from computer viruses: Never open
anything if you don't know what it is?
Here are some steps you can take to decrease your chances of
installing a virus:
 Turn off Bluetooth discoverable mode. Set your phone to "hidden"
so other phones can't detect it and send it the virus.
 Check security updates to learn about file names you should keep
an eye out for.
 Security sites with detailed virus information include: F-Secure,
McAfee & Symantec
 Install some type of security software on your phone.
The software may simply detect and then remove the virus
once it's received and installed, or it may protect your phone from
getting certain viruses in the first place.
Future possibilities include viruses that bug phones -- so
someone can see every number you call and listen to your
conversations -- and viruses that steal financial information.
Ultimately, more connectivity means more exposure to
viruses and faster spreading of infection. As smart phones become
more common and more complex, so will the viruses that target
them. Beware of that
Plan B BullGuard Trend Micro
Examples for security software are as fallows:
Trust Port Quick Heal
kaspersky NQ Avast 360 Avira
AVG CM
& many more …
For any mistakes and suggestion’s feel free to text here
idamakanti.jaswanth@gmail.com

More Related Content

What's hot

Mobile Security 101
Mobile Security 101Mobile Security 101
Mobile Security 101Lookout
 
Mobile device security
Mobile device securityMobile device security
Mobile device securityLisa Herrera
 
Mobile Device Security
Mobile Device SecurityMobile Device Security
Mobile Device SecurityNemwos
 
Smart phone and mobile device security
Smart phone and mobile device securitySmart phone and mobile device security
Smart phone and mobile device securityCAS
 
cellphone virus and security
cellphone virus and securitycellphone virus and security
cellphone virus and securityAkhil Kumar
 
Mobile device privacy and security
Mobile device privacy and securityMobile device privacy and security
Mobile device privacy and securityImran Khan
 
Mobile security in Cyber Security
Mobile security in Cyber SecurityMobile security in Cyber Security
Mobile security in Cyber SecurityGeo Marian
 
Smartphone security
Smartphone  securitySmartphone  security
Smartphone securityManish Gupta
 
Basics of Denial of Service Attacks
Basics of Denial of Service AttacksBasics of Denial of Service Attacks
Basics of Denial of Service AttacksHansa Nidushan
 
Wireless and mobile security
Wireless and mobile securityWireless and mobile security
Wireless and mobile securityPushkar Pashupat
 
Mobile Application Security
Mobile Application SecurityMobile Application Security
Mobile Application SecurityIshan Girdhar
 
Mobile device management presentation
Mobile device management presentationMobile device management presentation
Mobile device management presentationratneshsinghparihar
 

What's hot (20)

Mobile security
Mobile securityMobile security
Mobile security
 
Mobile security
Mobile securityMobile security
Mobile security
 
Mobile Security 101
Mobile Security 101Mobile Security 101
Mobile Security 101
 
Mobile device security
Mobile device securityMobile device security
Mobile device security
 
Mobile Device Security
Mobile Device SecurityMobile Device Security
Mobile Device Security
 
Smart phone and mobile device security
Smart phone and mobile device securitySmart phone and mobile device security
Smart phone and mobile device security
 
cellphone virus and security
cellphone virus and securitycellphone virus and security
cellphone virus and security
 
Mobile device privacy and security
Mobile device privacy and securityMobile device privacy and security
Mobile device privacy and security
 
Mobile security in Cyber Security
Mobile security in Cyber SecurityMobile security in Cyber Security
Mobile security in Cyber Security
 
Mobile Security
Mobile SecurityMobile Security
Mobile Security
 
Smartphone security
Smartphone  securitySmartphone  security
Smartphone security
 
Basics of Denial of Service Attacks
Basics of Denial of Service AttacksBasics of Denial of Service Attacks
Basics of Denial of Service Attacks
 
Wireless and mobile security
Wireless and mobile securityWireless and mobile security
Wireless and mobile security
 
Bluejacking ppt
Bluejacking pptBluejacking ppt
Bluejacking ppt
 
Mobile Application Security
Mobile Application SecurityMobile Application Security
Mobile Application Security
 
Mobile Malware
Mobile MalwareMobile Malware
Mobile Malware
 
Mobile device management presentation
Mobile device management presentationMobile device management presentation
Mobile device management presentation
 
Android security
Android securityAndroid security
Android security
 
Ppt
PptPpt
Ppt
 
Mobile computing
Mobile computingMobile computing
Mobile computing
 

Viewers also liked

Mobile security
Mobile securityMobile security
Mobile securityhome
 
2015 Mobile Security Trends: Are You Ready?
2015 Mobile Security Trends: Are You Ready?2015 Mobile Security Trends: Are You Ready?
2015 Mobile Security Trends: Are You Ready?IBM Security
 
Symantec Mobile Security Whitepaper June 2011
Symantec Mobile Security Whitepaper June 2011Symantec Mobile Security Whitepaper June 2011
Symantec Mobile Security Whitepaper June 2011Symantec
 
G4H Webcast: Automated Security Analysis of Mobile Applications with Mobile S...
G4H Webcast: Automated Security Analysis of Mobile Applications with Mobile S...G4H Webcast: Automated Security Analysis of Mobile Applications with Mobile S...
G4H Webcast: Automated Security Analysis of Mobile Applications with Mobile S...Ajin Abraham
 

Viewers also liked (6)

Mobile security
Mobile securityMobile security
Mobile security
 
Mobile security
Mobile securityMobile security
Mobile security
 
2015 Mobile Security Trends: Are You Ready?
2015 Mobile Security Trends: Are You Ready?2015 Mobile Security Trends: Are You Ready?
2015 Mobile Security Trends: Are You Ready?
 
Symantec Mobile Security Whitepaper June 2011
Symantec Mobile Security Whitepaper June 2011Symantec Mobile Security Whitepaper June 2011
Symantec Mobile Security Whitepaper June 2011
 
G4H Webcast: Automated Security Analysis of Mobile Applications with Mobile S...
G4H Webcast: Automated Security Analysis of Mobile Applications with Mobile S...G4H Webcast: Automated Security Analysis of Mobile Applications with Mobile S...
G4H Webcast: Automated Security Analysis of Mobile Applications with Mobile S...
 
E commerce ppt
E commerce pptE commerce ppt
E commerce ppt
 

Similar to MOBILE PHONE SECURITY./ MOBILE SECURITY

Treads to mobile network
Treads to mobile networkTreads to mobile network
Treads to mobile networkRAVITEJA828
 
Cell Phone Viruses & Security
Cell Phone Viruses & SecurityCell Phone Viruses & Security
Cell Phone Viruses & Securitymanish kumar
 
Cell Phone Viruses & Security
Cell Phone Viruses & SecurityCell Phone Viruses & Security
Cell Phone Viruses & Securityguestc03f28
 
Mobile virus & worms
Mobile virus & wormsMobile virus & worms
Mobile virus & wormsSourav Verma
 
10940 img sytr12_mobile_malware
10940 img sytr12_mobile_malware10940 img sytr12_mobile_malware
10940 img sytr12_mobile_malwareSytelReplyUK
 
cell phone viruses and security
cell phone viruses and securitycell phone viruses and security
cell phone viruses and securityPRIYANKA944
 
INFOGRAPHIC: Top Most Dangerous Malware Trends for 2014
INFOGRAPHIC: Top Most Dangerous Malware Trends for 2014INFOGRAPHIC: Top Most Dangerous Malware Trends for 2014
INFOGRAPHIC: Top Most Dangerous Malware Trends for 2014IBM Security
 
Report on Mobile security
Report  on Mobile securityReport  on Mobile security
Report on Mobile securityKavita Rastogi
 
Mobile security 8soft_final_summercamp2011
Mobile security 8soft_final_summercamp2011Mobile security 8soft_final_summercamp2011
Mobile security 8soft_final_summercamp2011Zarafa
 
cybersecurity essay.docx
cybersecurity essay.docxcybersecurity essay.docx
cybersecurity essay.docxssuser719d6b
 
Report of android hacking
Report of android hackingReport of android hacking
Report of android hackingdiv2345
 
PhD Thesis Writing Assistance - Manuscript
PhD Thesis Writing Assistance - ManuscriptPhD Thesis Writing Assistance - Manuscript
PhD Thesis Writing Assistance - Manuscriptkarishmakittu
 
How do I activate my McAfee product key?
How do I activate my McAfee product key?How do I activate my McAfee product key?
How do I activate my McAfee product key?NovellaJohns
 

Similar to MOBILE PHONE SECURITY./ MOBILE SECURITY (20)

Treads to mobile network
Treads to mobile networkTreads to mobile network
Treads to mobile network
 
Cell Phone Viruses & Security
Cell Phone Viruses & SecurityCell Phone Viruses & Security
Cell Phone Viruses & Security
 
Cell Phone Viruses & Security
Cell Phone Viruses & SecurityCell Phone Viruses & Security
Cell Phone Viruses & Security
 
Mobile virus & worms
Mobile virus & wormsMobile virus & worms
Mobile virus & worms
 
Cp3201 mobile security final
Cp3201 mobile security finalCp3201 mobile security final
Cp3201 mobile security final
 
10940 img sytr12_mobile_malware
10940 img sytr12_mobile_malware10940 img sytr12_mobile_malware
10940 img sytr12_mobile_malware
 
COMPUTER VIRUSES AND WORMS.pdf
COMPUTER VIRUSES AND WORMS.pdfCOMPUTER VIRUSES AND WORMS.pdf
COMPUTER VIRUSES AND WORMS.pdf
 
Mobile security
Mobile securityMobile security
Mobile security
 
cell phone viruses and security
cell phone viruses and securitycell phone viruses and security
cell phone viruses and security
 
M
MM
M
 
CS_UNIT 2(P3).pptx
CS_UNIT 2(P3).pptxCS_UNIT 2(P3).pptx
CS_UNIT 2(P3).pptx
 
INFOGRAPHIC: Top Most Dangerous Malware Trends for 2014
INFOGRAPHIC: Top Most Dangerous Malware Trends for 2014INFOGRAPHIC: Top Most Dangerous Malware Trends for 2014
INFOGRAPHIC: Top Most Dangerous Malware Trends for 2014
 
Report on Mobile security
Report  on Mobile securityReport  on Mobile security
Report on Mobile security
 
Smartphone
SmartphoneSmartphone
Smartphone
 
Rp threat-predictions-2013
Rp threat-predictions-2013Rp threat-predictions-2013
Rp threat-predictions-2013
 
Mobile security 8soft_final_summercamp2011
Mobile security 8soft_final_summercamp2011Mobile security 8soft_final_summercamp2011
Mobile security 8soft_final_summercamp2011
 
cybersecurity essay.docx
cybersecurity essay.docxcybersecurity essay.docx
cybersecurity essay.docx
 
Report of android hacking
Report of android hackingReport of android hacking
Report of android hacking
 
PhD Thesis Writing Assistance - Manuscript
PhD Thesis Writing Assistance - ManuscriptPhD Thesis Writing Assistance - Manuscript
PhD Thesis Writing Assistance - Manuscript
 
How do I activate my McAfee product key?
How do I activate my McAfee product key?How do I activate my McAfee product key?
How do I activate my McAfee product key?
 

More from JASHU JASWANTH

TYPES OF TESTS ON CONCRETE
TYPES OF TESTS ON CONCRETETYPES OF TESTS ON CONCRETE
TYPES OF TESTS ON CONCRETEJASHU JASWANTH
 
Fiber Reinforced Concrete (FRC)
Fiber Reinforced Concrete (FRC)Fiber Reinforced Concrete (FRC)
Fiber Reinforced Concrete (FRC)JASHU JASWANTH
 
MAINTENANCE STRATEGIES & CASE STUDIES
MAINTENANCE STRATEGIES & CASE STUDIESMAINTENANCE STRATEGIES & CASE STUDIES
MAINTENANCE STRATEGIES & CASE STUDIESJASHU JASWANTH
 
Non-Destructive Testing (NDT)
Non-Destructive Testing (NDT)Non-Destructive Testing (NDT)
Non-Destructive Testing (NDT)JASHU JASWANTH
 
SHANGHAI TOWER - Shanghai, China
SHANGHAI TOWER - Shanghai, ChinaSHANGHAI TOWER - Shanghai, China
SHANGHAI TOWER - Shanghai, ChinaJASHU JASWANTH
 
Concept & Construction of PALM ISLAND
Concept & Construction of PALM ISLANDConcept & Construction of PALM ISLAND
Concept & Construction of PALM ISLANDJASHU JASWANTH
 
COMPUTER VISION SYNDROME( CVS ) with SOFTWARE LINK involved in it.
COMPUTER VISION SYNDROME( CVS ) with SOFTWARE LINK involved in it.COMPUTER VISION SYNDROME( CVS ) with SOFTWARE LINK involved in it.
COMPUTER VISION SYNDROME( CVS ) with SOFTWARE LINK involved in it.JASHU JASWANTH
 
The Empowerment of Women
The Empowerment of WomenThe Empowerment of Women
The Empowerment of WomenJASHU JASWANTH
 
DETAILS OF TOUGHENED GLASS OR TEMPER GLASS
DETAILS OF TOUGHENED GLASS OR TEMPER GLASSDETAILS OF TOUGHENED GLASS OR TEMPER GLASS
DETAILS OF TOUGHENED GLASS OR TEMPER GLASSJASHU JASWANTH
 
MULTIPLE CHOICE QUESTIONS for civil engineering students or may be for engine...
MULTIPLE CHOICE QUESTIONS for civil engineering students or may be for engine...MULTIPLE CHOICE QUESTIONS for civil engineering students or may be for engine...
MULTIPLE CHOICE QUESTIONS for civil engineering students or may be for engine...JASHU JASWANTH
 
FACE RECOGNITION TECHNOLOGY
FACE RECOGNITION TECHNOLOGYFACE RECOGNITION TECHNOLOGY
FACE RECOGNITION TECHNOLOGYJASHU JASWANTH
 
WIRELESS MOBILE CHARGING USING MICROWAVES
 WIRELESS MOBILE CHARGING USING MICROWAVES  WIRELESS MOBILE CHARGING USING MICROWAVES
WIRELESS MOBILE CHARGING USING MICROWAVES JASHU JASWANTH
 

More from JASHU JASWANTH (15)

TYPES OF TESTS ON CONCRETE
TYPES OF TESTS ON CONCRETETYPES OF TESTS ON CONCRETE
TYPES OF TESTS ON CONCRETE
 
Fiber Reinforced Concrete (FRC)
Fiber Reinforced Concrete (FRC)Fiber Reinforced Concrete (FRC)
Fiber Reinforced Concrete (FRC)
 
MAINTENANCE STRATEGIES & CASE STUDIES
MAINTENANCE STRATEGIES & CASE STUDIESMAINTENANCE STRATEGIES & CASE STUDIES
MAINTENANCE STRATEGIES & CASE STUDIES
 
Non-Destructive Testing (NDT)
Non-Destructive Testing (NDT)Non-Destructive Testing (NDT)
Non-Destructive Testing (NDT)
 
SHANGHAI TOWER - Shanghai, China
SHANGHAI TOWER - Shanghai, ChinaSHANGHAI TOWER - Shanghai, China
SHANGHAI TOWER - Shanghai, China
 
Concept & Construction of PALM ISLAND
Concept & Construction of PALM ISLANDConcept & Construction of PALM ISLAND
Concept & Construction of PALM ISLAND
 
COMPUTER VISION SYNDROME( CVS ) with SOFTWARE LINK involved in it.
COMPUTER VISION SYNDROME( CVS ) with SOFTWARE LINK involved in it.COMPUTER VISION SYNDROME( CVS ) with SOFTWARE LINK involved in it.
COMPUTER VISION SYNDROME( CVS ) with SOFTWARE LINK involved in it.
 
The Empowerment of Women
The Empowerment of WomenThe Empowerment of Women
The Empowerment of Women
 
UNITS & CONVERSIONS
UNITS & CONVERSIONSUNITS & CONVERSIONS
UNITS & CONVERSIONS
 
CYBER CRIME
CYBER CRIMECYBER CRIME
CYBER CRIME
 
HOW TO TEMPER GLASS ?
HOW TO TEMPER GLASS ?HOW TO TEMPER GLASS ?
HOW TO TEMPER GLASS ?
 
DETAILS OF TOUGHENED GLASS OR TEMPER GLASS
DETAILS OF TOUGHENED GLASS OR TEMPER GLASSDETAILS OF TOUGHENED GLASS OR TEMPER GLASS
DETAILS OF TOUGHENED GLASS OR TEMPER GLASS
 
MULTIPLE CHOICE QUESTIONS for civil engineering students or may be for engine...
MULTIPLE CHOICE QUESTIONS for civil engineering students or may be for engine...MULTIPLE CHOICE QUESTIONS for civil engineering students or may be for engine...
MULTIPLE CHOICE QUESTIONS for civil engineering students or may be for engine...
 
FACE RECOGNITION TECHNOLOGY
FACE RECOGNITION TECHNOLOGYFACE RECOGNITION TECHNOLOGY
FACE RECOGNITION TECHNOLOGY
 
WIRELESS MOBILE CHARGING USING MICROWAVES
 WIRELESS MOBILE CHARGING USING MICROWAVES  WIRELESS MOBILE CHARGING USING MICROWAVES
WIRELESS MOBILE CHARGING USING MICROWAVES
 

Recently uploaded

notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptMsecMca
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayEpec Engineered Technologies
 
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Bookingdharasingh5698
 
Bhosari ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...
Bhosari ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For ...Bhosari ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For ...
Bhosari ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...tanu pandey
 
2016EF22_0 solar project report rooftop projects
2016EF22_0 solar project report rooftop projects2016EF22_0 solar project report rooftop projects
2016EF22_0 solar project report rooftop projectssmsksolar
 
DC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationDC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationBhangaleSonal
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueBhangaleSonal
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXssuser89054b
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlysanyuktamishra911
 
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptxJIT KUMAR GUPTA
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startQuintin Balsdon
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756dollysharma2066
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfJiananWang21
 
Employee leave management system project.
Employee leave management system project.Employee leave management system project.
Employee leave management system project.Kamal Acharya
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . pptDineshKumar4165
 
Unit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfUnit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfRagavanV2
 

Recently uploaded (20)

Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
 
notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.ppt
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
 
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
 
Bhosari ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...
Bhosari ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For ...Bhosari ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For ...
Bhosari ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...
 
2016EF22_0 solar project report rooftop projects
2016EF22_0 solar project report rooftop projects2016EF22_0 solar project report rooftop projects
2016EF22_0 solar project report rooftop projects
 
DC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationDC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equation
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torque
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
 
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdf
 
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
 
Employee leave management system project.
Employee leave management system project.Employee leave management system project.
Employee leave management system project.
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
 
Unit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfUnit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdf
 

MOBILE PHONE SECURITY./ MOBILE SECURITY

  • 1.
  • 2. CONTENTS  INTRODUCTION  SPREADING OF VIRUS  ANAMNESIS (CASE STUDIES)  CURRENT STATUS OF MOBILE MALWARE  PROTECTIVE MEASURES  THREATS OF MOBILE PHONE VIRUS  CONCLUSION
  • 3. INTRODUCTION Mobile security / Mobile phone security has become increasingly important in mobile computing. It is of particular concern as it relates to the security of personal and business information now stored on smart phones. Rapid advances in low-power computing, communications, and storage technologies continue to broaden the horizons of mobile devices, such as cell phones and personal digital assistants (PDAs).
  • 4. A cell-phone virus is basically the same thing as a computer virus. An unwanted executable file that "infects" a device and then copies itself to other devices. 1. A computer virus or worm spreads through e-mail attachments and Internet downloads. 2. A cell-phone virus or worm spreads via Internet downloads, MMS attachments and Bluetooth transfers. Current phone-to-phone viruses almost exclusively infect phones running the Symbian operating system. Standard operating systems and Bluetooth technology will enable cell phone viruses to spread either through SMS or by sending Bluetooth requests when cell phones are physically close enough.
  • 5. SPREADING OF VIRUS Phones that can only make and receive calls are not at risk. Only smart phones with a Bluetooth connection and data capabilities can receive a cell-phone virus. These viruses spread primarily in three ways: 1. Internet download - The user downloads an infected file to the phone by way of a PC or the phone's own Internet connection.
  • 6. 2. Bluetooth wireless connection - The user receives a virus via Bluetooth when the phone is in discoverable mode, meaning it can be seen by other Bluetooth-enabled phones. 3. Multimedia Messaging Service - The virus is an attachment to an MMS text message Mobiles enabled with GPS facility can cause much large scale of virus infection spread.
  • 7. ANAMNESIS (CASE STUDIES) 1. CABIR The first known cell-phone virus, Cabir, is entirely innocuous (not harmful). All it does is sit in the phone and try to spread itself. 2. COMWAR The second worm for mobile devices detected in the wild was COMWAR . This is the first worm for mobiles phones which is able to propagate via MMS. 3. CARDTRAP Card Trap is the first known mobile malware that attempts a cross-platform infection by jumping from an infected phone to a target computer
  • 8. 4. DUTS DUTS is a parasitic file infector virus. It is the first known virus for the PocketPC platform. DUTS affects ARM-based devices only 5. SKULLS A Trojan horse piece of code. Once downloaded, the virus, called Skulls, replaces all phone desktop icons with images of a skull. 6. LASCO It is based on the same source code which is now freely available on the net. LASCO.A is very similar to CABIR.H.
  • 9. CURRENT STATUS OF MOBILE MALWARE The first half of 2008 was interesting from a mobile malware point of view. It's worth stressing the following points: 1. An increase in the number of malicious programs with Trojan-SMS behavior. 2. The cross-platform nature of mobile Trojans - Any mobile phone which supports Java applications or has a Python interpreter is under threat.
  • 10. 3. The increase in the number of WAP sites where such Trojan programs are placed. 4. The appearance of ICQ spam which advertises WAP sites and the malicious programs located on these sites. 5. The variety of social engineering methods used to spread and disguise malicious programs. 6. The identification of short numbers to which short messages are secretly sent.
  • 11. THEORETICAL DEVELOPMENTS 1. Symbian Mobiles Symbian malware has reached the stage where it is being developed for profit. we saw the first Trojan-spy for Symbian in April. Flexispy was being sold by its creator for 50 USD. The Trojan established full control over smart phones.
  • 12. 2. Windows Mobile Windows Mobile, currently the second most popular platform for smart phones, also attracted the attention of malware writers. This sounds more serious than it actually is given that there were only two examples of malware for Windows Mobile – DUTS and BRADOR.
  • 13. CROSS - PLATFORM MALWARE The CXOVER virus, is the first example of a cross- platform virus for mobile devices. CXOVER begins by checking which operating system is working on the infected device. Once the virus is on a mobile device it attempts to copy itself onto accessible PCs. In addition, it deletes user files on infected devices. The LETUM worm, which was detected in April, continued the cross platform trend. LETUM is a typical email worm in that it spreads as an infected attachment and sends copies of itself to all the addresses in the local address book.
  • 14. Protection against viruses can be implemented in two phase. 1. Network level security – It makes use of the proactive approach . 2. System level security – It employs MOSES (Mobile security processing system). PROTECTIVE MEASURES
  • 15. 1. PROACTIVE APPROACH The exponential growth of messaging in both home and enterprise environments has made it a potent vector for the spread of malicious code. The problem is compounded further by the increasing convergence of various messaging platforms. For example, users can now send IM messages from mobile phones and SMS messages to mobile phones via SMS gateways on the Internet. In this section, we explain the basic rate-limiting and quarantine mechanisms that serve as the building blocks of our proactive response framework.
  • 16.  QUARANTINE In contrast with Rate-limiting, Quarantine-based systems prevent a suspicious or infected client from sending or receiving messages. This can be implemented at the messaging server so that any connection attempt by the user on an infected client is refused.  RATE - LIMITING The Rate-limiting (also known as “virus throttling”) is a general class of response techniques that seek to limit the spread of a worm or virus once it is detected on a host.
  • 17. 2. MOBILE SECURITY PROCESSING SYSTEM (MOSES) Mobile Security Processing System is a programmable security processor platform, to enable secure data and multi-media communications in next-generation wireless handsets.  SW Architecture The software architecture for MOSES was designed using a layered philosophy, much like the layering used in the design of network protocols. At the top level, the SW architecture provides a generic interface (API) using which security protocols and applications can be ported to the platform.  HW Platform Architecture The hardware platform is based on the Xtensa configurable and extensible processor from Tensilica, Inc.
  • 18. Virus might access and/or delete all of the contact information and calendar entries in your phone. It might send an infected MMS message to every number in your phone book. The top three areas of concern for mobile users are receiving inappropriate content, fraudulent increases in phone bills and loss of important information stored on the handset. THREATS OF MOBILE PHONE VIRUS
  • 19. CONCLUSION The best way to protect yourself from cell-phone viruses is the same way you protect yourself from computer viruses: Never open anything if you don't know what it is? Here are some steps you can take to decrease your chances of installing a virus:  Turn off Bluetooth discoverable mode. Set your phone to "hidden" so other phones can't detect it and send it the virus.  Check security updates to learn about file names you should keep an eye out for.  Security sites with detailed virus information include: F-Secure, McAfee & Symantec
  • 20.  Install some type of security software on your phone. The software may simply detect and then remove the virus once it's received and installed, or it may protect your phone from getting certain viruses in the first place. Future possibilities include viruses that bug phones -- so someone can see every number you call and listen to your conversations -- and viruses that steal financial information. Ultimately, more connectivity means more exposure to viruses and faster spreading of infection. As smart phones become more common and more complex, so will the viruses that target them. Beware of that
  • 21. Plan B BullGuard Trend Micro Examples for security software are as fallows: Trust Port Quick Heal kaspersky NQ Avast 360 Avira AVG CM & many more …
  • 22. For any mistakes and suggestion’s feel free to text here idamakanti.jaswanth@gmail.com

Editor's Notes

  1. & many more …