SlideShare a Scribd company logo
1 of 19
Wireless and Mobile Security Null-The open Security Community Pushkar
News… Varanasi Bomb Blast Mail sent through hacked WiFiof a DJ in NaviMumbai. Out of 2300 connections only 16% are secured in Pune City – Cyber Crime Cell, Pune. Police making it compulsory to secure wifi. Geimini Trojan attacks Android users on New Year.
WIRELESS Technology
Wireless Network Standards….
Attacks… Identity Theft – Hacking a wireless network and using it. 	Use it for fun. 	Use it for free. 	Use it for crime. MITM – Sniff the users information. Corporate espionage. Sniff passwords DoS– Interrupt work.
Wireless Security Measures… No Security   WEP – Wireless Equivalent Protocol Simple Low level Security 40 bit shared key used. only ensured the data received is the same or not. can be easily cracked now.
Wireless Security measures contd… WPA – Wi-Fi Protected Access. 	128bit,  	TKIP – Dynamically offering keys for connection. 	Encrypted using Michael Algorithm. WPA2 – 128bit, AES encryption algorithm. More reliable and most widely used.
Mobiles – Smartphones… The next generation technology. Compact and efficient devices. A practical and cost-effective alternative to laptops. Need of the hour. Work on Move.
Who are the users … You, me and all, Corporate Directors, Managers, Executives, Salesman, Suppliers, Contractors, Government Officials College Students,
Affecting factors… Mobile Communication Capabilities : Cellular – MITM in voice transmission, with using less secured protocols or encrypting/decrypting techniques. WiFi-MITM Blutooth /Infrared - Personal Area Network SMS—Scripts to send spam sms from the device, inject malware on the phones. Corporate Firewall, Inside the firewall, 	Access to all the data on network, Outside the firewall 	Data is in the air,
Threats… Physical :  Device theft, loss of device  Misuse by trusted people (colleagues, friends, family) Malwares: 	Mobile Malwares-new and emerging threat 	Infection vectors are more. Eg., Mabir/Cabir virus: can infect Symbian OS via Bluetooth or SMS. Dampigtrojan: corrupts the system’s uninstallation settings.
Threats contd… Mobile App Downloads : Free nature of apps, 	“Jail-breaking” – process which allows users to installed pirated or unchecked applications. Application Isolation. Secure Data Storage: 	Password protection, mobile number fixed for each device, auto mounting disable. Strong Authentication with poor keyboards. Secure Operating Systems
Platforms… Android Operating System : OS by google, open source. Used by many mobile device producing companies. iOS : Apple OS. Used in iPhones, iPads Windows Mobile OS /Windows Phone 7 :  Mobile OS from Microsoft. Symbian OS /Symbian^3 : Used in Nokia devices.
Security Measures… Platform-Centric Security : Protecting the device/network instead of data. Data-Centric Security : Protecting Data instead of devices/networks.  Components in mobile security : 	Authentication and Authorization : 	Firewall Security : 	Over-the-air security : 	Offline security :
Security Measures  Authentication and Authorization : 		Authorize the device use as well as the application use by proper authentication. Firewall Security : Include and register mobile devices with company firewalls. Only give access to registered users. Over-the-air security : Encrypt the data when sent onto public mobile networks. Offline security : Prevent mobile device to reach in the wrong hands.
Security Measures … Security over PAN :  Security for Bluetooth /Infrared data transmission. Security over mobile Malwares : Install trusted anti-virus scanners in mobiles.
Wifi Cracking Demo
Conclusion … Work while on move with CAUTION …
Thank You 

More Related Content

What's hot (20)

Mobile security
Mobile security Mobile security
Mobile security
 
Mobile security
Mobile securityMobile security
Mobile security
 
Mobile security
Mobile securityMobile security
Mobile security
 
Cyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsCyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionals
 
Mobile protection
Mobile protection Mobile protection
Mobile protection
 
Mobile security
Mobile securityMobile security
Mobile security
 
Iot Security
Iot SecurityIot Security
Iot Security
 
Mobile security
Mobile securityMobile security
Mobile security
 
Network Security Presentation
Network Security PresentationNetwork Security Presentation
Network Security Presentation
 
Firewall
FirewallFirewall
Firewall
 
Security threats and safety measures
Security threats and safety measuresSecurity threats and safety measures
Security threats and safety measures
 
Cloud security
Cloud securityCloud security
Cloud security
 
Smartphone security
Smartphone  securitySmartphone  security
Smartphone security
 
Cyber security threats and trends
Cyber security threats and trendsCyber security threats and trends
Cyber security threats and trends
 
Cyber security awareness presentation nepal
Cyber security awareness presentation nepalCyber security awareness presentation nepal
Cyber security awareness presentation nepal
 
Cyber security
Cyber securityCyber security
Cyber security
 
Mobile security
Mobile securityMobile security
Mobile security
 
Cybersecurity Awareness Training
Cybersecurity Awareness TrainingCybersecurity Awareness Training
Cybersecurity Awareness Training
 
IoT security
IoT securityIoT security
IoT security
 
Cyber security
Cyber securityCyber security
Cyber security
 

Viewers also liked

Wireless power transmission
Wireless power transmissionWireless power transmission
Wireless power transmissionMohammad Azhar
 
Wireless mobile charger
Wireless mobile chargerWireless mobile charger
Wireless mobile chargerMaruf Priyo
 
Wireless mobile charger or wireless power transfer
Wireless mobile charger or  wireless power transferWireless mobile charger or  wireless power transfer
Wireless mobile charger or wireless power transferGautam Singh
 
Wireless mobile charging by Inductive Coupling.
Wireless mobile charging by Inductive Coupling.Wireless mobile charging by Inductive Coupling.
Wireless mobile charging by Inductive Coupling.siddhant212
 
Wireless charging of mobilephones
Wireless charging of  mobilephonesWireless charging of  mobilephones
Wireless charging of mobilephonesPRADEEP Cheekatla
 
Wireless charging of mobile PPT.
Wireless charging of mobile PPT.Wireless charging of mobile PPT.
Wireless charging of mobile PPT.Krishna Teja
 

Viewers also liked (8)

wireless power transfer
wireless power transfer wireless power transfer
wireless power transfer
 
Wireless power transmission
Wireless power transmissionWireless power transmission
Wireless power transmission
 
Wireless mobile charger
Wireless mobile chargerWireless mobile charger
Wireless mobile charger
 
Wireless mobile charger or wireless power transfer
Wireless mobile charger or  wireless power transferWireless mobile charger or  wireless power transfer
Wireless mobile charger or wireless power transfer
 
Wireless mobile charging by Inductive Coupling.
Wireless mobile charging by Inductive Coupling.Wireless mobile charging by Inductive Coupling.
Wireless mobile charging by Inductive Coupling.
 
Wireless charging of mobilephones
Wireless charging of  mobilephonesWireless charging of  mobilephones
Wireless charging of mobilephones
 
Witricity- Wireless Power Transmission
Witricity- Wireless Power TransmissionWitricity- Wireless Power Transmission
Witricity- Wireless Power Transmission
 
Wireless charging of mobile PPT.
Wireless charging of mobile PPT.Wireless charging of mobile PPT.
Wireless charging of mobile PPT.
 

Similar to Wireless and mobile security

Mobile security 8soft_final_summercamp2011
Mobile security 8soft_final_summercamp2011Mobile security 8soft_final_summercamp2011
Mobile security 8soft_final_summercamp2011Zarafa
 
Treads to mobile network
Treads to mobile networkTreads to mobile network
Treads to mobile networkRAVITEJA828
 
Cell Phone Viruses & Security
Cell Phone Viruses & SecurityCell Phone Viruses & Security
Cell Phone Viruses & Securityguestc03f28
 
Cell Phone Viruses & Security
Cell Phone Viruses & SecurityCell Phone Viruses & Security
Cell Phone Viruses & Securitymanish kumar
 
2010: Mobile Security - WHYMCA Developer Conference
2010: Mobile Security - WHYMCA Developer Conference2010: Mobile Security - WHYMCA Developer Conference
2010: Mobile Security - WHYMCA Developer ConferenceFabio Pietrosanti
 
cellphone virus and security
cellphone virus and securitycellphone virus and security
cellphone virus and securityAkhil Kumar
 
Cyber Security
Cyber SecurityCyber Security
Cyber SecurityBryCunal
 
Report on Mobile security
Report  on Mobile securityReport  on Mobile security
Report on Mobile securityKavita Rastogi
 
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?Do New Mobile Devices in Enterprises Pose A Serious Security Threat?
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?acijjournal
 
Network Security for Employees
Network Security for Employees Network Security for Employees
Network Security for Employees OPSWAT
 
The Consumerisation of Corporate IT
The Consumerisation of Corporate ITThe Consumerisation of Corporate IT
The Consumerisation of Corporate ITPeter Wood
 
ISACA CACS 2012 - Mobile Device Security and Privacy
ISACA CACS 2012 - Mobile Device Security and PrivacyISACA CACS 2012 - Mobile Device Security and Privacy
ISACA CACS 2012 - Mobile Device Security and PrivacyMichael Davis
 

Similar to Wireless and mobile security (20)

CS_UNIT 2(P3).pptx
CS_UNIT 2(P3).pptxCS_UNIT 2(P3).pptx
CS_UNIT 2(P3).pptx
 
Cn35499502
Cn35499502Cn35499502
Cn35499502
 
Unit-3.pptx
Unit-3.pptxUnit-3.pptx
Unit-3.pptx
 
Cp3201 mobile security final
Cp3201 mobile security finalCp3201 mobile security final
Cp3201 mobile security final
 
Mobile security 8soft_final_summercamp2011
Mobile security 8soft_final_summercamp2011Mobile security 8soft_final_summercamp2011
Mobile security 8soft_final_summercamp2011
 
Treads to mobile network
Treads to mobile networkTreads to mobile network
Treads to mobile network
 
Communication security 2021
Communication security 2021Communication security 2021
Communication security 2021
 
Smartphone
SmartphoneSmartphone
Smartphone
 
Cell Phone Viruses & Security
Cell Phone Viruses & SecurityCell Phone Viruses & Security
Cell Phone Viruses & Security
 
Cell Phone Viruses & Security
Cell Phone Viruses & SecurityCell Phone Viruses & Security
Cell Phone Viruses & Security
 
2010: Mobile Security - WHYMCA Developer Conference
2010: Mobile Security - WHYMCA Developer Conference2010: Mobile Security - WHYMCA Developer Conference
2010: Mobile Security - WHYMCA Developer Conference
 
cellphone virus and security
cellphone virus and securitycellphone virus and security
cellphone virus and security
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Report on Mobile security
Report  on Mobile securityReport  on Mobile security
Report on Mobile security
 
Information security
Information securityInformation security
Information security
 
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?Do New Mobile Devices in Enterprises Pose A Serious Security Threat?
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?
 
MIS (1).pptx
MIS (1).pptxMIS (1).pptx
MIS (1).pptx
 
Network Security for Employees
Network Security for Employees Network Security for Employees
Network Security for Employees
 
The Consumerisation of Corporate IT
The Consumerisation of Corporate ITThe Consumerisation of Corporate IT
The Consumerisation of Corporate IT
 
ISACA CACS 2012 - Mobile Device Security and Privacy
ISACA CACS 2012 - Mobile Device Security and PrivacyISACA CACS 2012 - Mobile Device Security and Privacy
ISACA CACS 2012 - Mobile Device Security and Privacy
 

Recently uploaded

4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptxmary850239
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxHumphrey A Beña
 
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...JojoEDelaCruz
 
Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4JOYLYNSAMANIEGO
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...Nguyen Thanh Tu Collection
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfTechSoup
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 
Food processing presentation for bsc agriculture hons
Food processing presentation for bsc agriculture honsFood processing presentation for bsc agriculture hons
Food processing presentation for bsc agriculture honsManeerUddin
 
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptxMusic 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptxleah joy valeriano
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...Postal Advocate Inc.
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Celine George
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Mark Reed
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptxmary850239
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 

Recently uploaded (20)

4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx
 
Raw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptxRaw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptx
 
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptxYOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
 
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
 
Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
 
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptxYOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 
Food processing presentation for bsc agriculture hons
Food processing presentation for bsc agriculture honsFood processing presentation for bsc agriculture hons
Food processing presentation for bsc agriculture hons
 
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptxMusic 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 

Wireless and mobile security

  • 1. Wireless and Mobile Security Null-The open Security Community Pushkar
  • 2. News… Varanasi Bomb Blast Mail sent through hacked WiFiof a DJ in NaviMumbai. Out of 2300 connections only 16% are secured in Pune City – Cyber Crime Cell, Pune. Police making it compulsory to secure wifi. Geimini Trojan attacks Android users on New Year.
  • 5. Attacks… Identity Theft – Hacking a wireless network and using it. Use it for fun. Use it for free. Use it for crime. MITM – Sniff the users information. Corporate espionage. Sniff passwords DoS– Interrupt work.
  • 6. Wireless Security Measures… No Security   WEP – Wireless Equivalent Protocol Simple Low level Security 40 bit shared key used. only ensured the data received is the same or not. can be easily cracked now.
  • 7. Wireless Security measures contd… WPA – Wi-Fi Protected Access. 128bit, TKIP – Dynamically offering keys for connection. Encrypted using Michael Algorithm. WPA2 – 128bit, AES encryption algorithm. More reliable and most widely used.
  • 8. Mobiles – Smartphones… The next generation technology. Compact and efficient devices. A practical and cost-effective alternative to laptops. Need of the hour. Work on Move.
  • 9. Who are the users … You, me and all, Corporate Directors, Managers, Executives, Salesman, Suppliers, Contractors, Government Officials College Students,
  • 10. Affecting factors… Mobile Communication Capabilities : Cellular – MITM in voice transmission, with using less secured protocols or encrypting/decrypting techniques. WiFi-MITM Blutooth /Infrared - Personal Area Network SMS—Scripts to send spam sms from the device, inject malware on the phones. Corporate Firewall, Inside the firewall, Access to all the data on network, Outside the firewall Data is in the air,
  • 11. Threats… Physical : Device theft, loss of device Misuse by trusted people (colleagues, friends, family) Malwares: Mobile Malwares-new and emerging threat Infection vectors are more. Eg., Mabir/Cabir virus: can infect Symbian OS via Bluetooth or SMS. Dampigtrojan: corrupts the system’s uninstallation settings.
  • 12. Threats contd… Mobile App Downloads : Free nature of apps, “Jail-breaking” – process which allows users to installed pirated or unchecked applications. Application Isolation. Secure Data Storage: Password protection, mobile number fixed for each device, auto mounting disable. Strong Authentication with poor keyboards. Secure Operating Systems
  • 13. Platforms… Android Operating System : OS by google, open source. Used by many mobile device producing companies. iOS : Apple OS. Used in iPhones, iPads Windows Mobile OS /Windows Phone 7 : Mobile OS from Microsoft. Symbian OS /Symbian^3 : Used in Nokia devices.
  • 14. Security Measures… Platform-Centric Security : Protecting the device/network instead of data. Data-Centric Security : Protecting Data instead of devices/networks. Components in mobile security : Authentication and Authorization : Firewall Security : Over-the-air security : Offline security :
  • 15. Security Measures Authentication and Authorization : Authorize the device use as well as the application use by proper authentication. Firewall Security : Include and register mobile devices with company firewalls. Only give access to registered users. Over-the-air security : Encrypt the data when sent onto public mobile networks. Offline security : Prevent mobile device to reach in the wrong hands.
  • 16. Security Measures … Security over PAN : Security for Bluetooth /Infrared data transmission. Security over mobile Malwares : Install trusted anti-virus scanners in mobiles.
  • 18. Conclusion … Work while on move with CAUTION …

Editor's Notes

  1. Wired Equivalent Protocol