SlideShare a Scribd company logo
1 of 18
Mobile Device Security:
A summary of the security
approaches employed in
Apple’s iOS and Google’s
Android
Introduction
• Today’s popular mobile platforms were designed with security
  in mind, but these provisions are not always sufficient in
  protecting enterprise assets
• In this presentation:
  – Today’s major mobile threats
  – Mobile device security models
  – Analysis of Apple’s iOS
  – Analysis of Google’s Android
  – The mobile device ecosystem
  – Mobile security solutions




                                                                 2
Today’s Major Mobile Threats
• Web-based and network-based attacks:
  – Typically launched by malicious websites or compromised legitimate sites
• Malware:
  – Three high-level categories: viruses,
    worms and Trojan horse programs




                                                                               3
Today’s Major Mobile Threats
• Social engineering attacks:
  – Leverage social engineering to trick users into disclosing sensitive
    information; can also be used to entice a users to install malware
• Resource abuse attacks:
  – Misuse network, computing or identity resources of a device; two most
    common such abuses are sending spam and launching DoS attacks




                                                                            4
Today’s Major Mobile Threats
• Data loss:
  – Employee or hacker exfiltrates sensitive information from protected
    device or network; loss can be unintentional or malicious.
• Data integrity threats:
  – Corrupt or modify data without permission of the data’s owner;
    motivations may include disrupting enterprise operations and financial
    gain (data ransom fee)




                                                                             5
Mobile Device Security Models
• Traditional access control:
  – Protects devices by using techniques such as passwords and idle-time
    screen locking
• Application provenance:
  – Each app is stamped with identity of author and made tamper resistant;
    enables user to decide whether or not to use app based on identity of
    author
• Encryption:
  – Conceals data at rest on the device to address device loss or theft




                                                                             6
Mobile Device Security Models
• Isolation:
  – Limits app’s ability to access sensitive data or systems on device
• Permissions-based access control:
  – Grants set of permissions to each app and then limits each app to
    accessing device data/systems within the scope of permissions




                                                                         7
High Level Analysis of Apple’s iOS
• iOS security model well designed and thus has far proven
  largely resistant to attack
• iOS’s security model offers strong protection against traditional
  malware, primarily due to Apple’s rigorous app certification
  process and their developer certification process, which vets
  the identity of each software author and weeds out attackers.




                                                                      8
High Level Analysis of Google’s Android
• Android’s security model a major improvement over traditional
  computing platforms; ultimately relies on users to make
  important security decisions and most users are unequipped to
  do this:
• Google has opted for a less rigorous certification model,
  permitting any software developer to create and release apps
  anonymously, without inspection. This lack of certification has
  arguably led to today’s increasing volume of Android-specific
  malware.




                                                                    9
Mobile Platform Security Summary




                                   10
Mobile Device Ecosystem
• iOS and Android devices do not work in a vacuum
  – Connect to one or more cloud-based services (enterprise Exchange server,
    Gmail, MobileMe, etc.), home or work PC, or all of above
• When properly deployed, both platforms allow users to
  simultaneously synchronize devices with private and enterprise
  cloud services without risking data exposure
  – However, there are several scenarios in which services may be abused by
    employees, resulting in exposure of enterprise data




                                                                              11
Mobile Device Ecosystem
• Scenario #1




                          12
Mobile Device Ecosystem
• Scenario #2




                          13
Mobile Device Ecosystem
• Scenario #3




                          14
Mobile Security Solutions
• Mobile antivirus:
  – Scanners for Android, but iOS’s isolation model prevents implementing on
    iOS devices
  – Effective at detecting known threats, but provide little protection against
    unknown threats; expect traditional scanners to be replaced by cloud-
    enabled, reputation-based protection
  – Addresses threats in malware threat category and subset of malware-
    based attacks in resource abuse, data loss and data integrity categories
• Secure browser:
  – Secure browser apps for iOS and Android checks visited URLs against
    blacklist or reputation database and blocks malicious pages
  – User must use the third-party secure Web browser to do all surfing
  – Secure browsers address Web-based attacks and social engineering
    attacks; can also potentially block malware downloaded through browser


                                                                              15
Mobile Security Solutions
• Mobile device management (MDM)
  – Enables admins to remotely manage iOS and Android devices
  – Admins can set security policies such as password strength, VPN settings,
    screen lock duration; can also disable specific device functions, wipe missing
    devices and use the device’s GPS to locate missing device
  – Doesn’t specifically protect against any one threat category, but helps reduce
    risk of attack from many categories
• Enterprise Sandbox
  – Aims to provide secure environment where enterprise resources such as
    email, calendar, contacts, corporate websites and sensitive documents can be
    accessed
  – Essentially divides device’s contents into two zones: secure zone for the
    enterprise data, and insecure zone for the employee’s personal and private
    data.
  – Focused on preventing malicious and unintentional data loss; though doesn’t
    block other attack categories explicitly, does limit impact of other attacks

                                                                                     16
Mobile Security Solutions
• Data loss prevention (DLP)
  – Scan publicly accessible storage areas of device for sensitive materials
  – Due to iOS’s isolation system, iOS-based DLP tools only inspect calendar
    and contact lists
  – On Android, could scan external flash storage, email and SMS inboxes, as
    well as calendar and contact lists
  – Due to isolation models, unable to scan data of other apps




                                                                               17
Thank you!
For more information, please visit:
Podcast - http://bit.ly/ipQUOf
Blog post - http://bit.ly/mk6Ywt
Infographic - http://bit.ly/leQBtV

Copyright © 2010 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in
the U.S. and other countries. Other names may be trademarks of their respective owners.

This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied,
are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice.


                                                                                                                                                                                        18

More Related Content

What's hot

Mobile Security
Mobile SecurityMobile Security
Mobile Security
Kevin Lee
 
Mobile security
Mobile securityMobile security
Mobile security
home
 
2015 Cybersecurity Predictions
2015 Cybersecurity Predictions2015 Cybersecurity Predictions
2015 Cybersecurity Predictions
Lookout
 

What's hot (20)

2015 Mobile Security Trends: Are You Ready?
2015 Mobile Security Trends: Are You Ready?2015 Mobile Security Trends: Are You Ready?
2015 Mobile Security Trends: Are You Ready?
 
2010: Mobile Security - Intense overview
2010: Mobile Security - Intense overview2010: Mobile Security - Intense overview
2010: Mobile Security - Intense overview
 
NETC 2012_Mobile Security for Smartphones and Tablets (pptx)
NETC 2012_Mobile Security for Smartphones and Tablets (pptx)NETC 2012_Mobile Security for Smartphones and Tablets (pptx)
NETC 2012_Mobile Security for Smartphones and Tablets (pptx)
 
Mobile Security
Mobile SecurityMobile Security
Mobile Security
 
Mobile security
Mobile securityMobile security
Mobile security
 
Ensuring Mobile Device Security
Ensuring Mobile Device SecurityEnsuring Mobile Device Security
Ensuring Mobile Device Security
 
Mobile security
Mobile securityMobile security
Mobile security
 
Mobile security - Intense overview
Mobile security - Intense overviewMobile security - Intense overview
Mobile security - Intense overview
 
2015 Cybersecurity Predictions
2015 Cybersecurity Predictions2015 Cybersecurity Predictions
2015 Cybersecurity Predictions
 
Mobile Security Research Projects Help
Mobile Security  Research Projects HelpMobile Security  Research Projects Help
Mobile Security Research Projects Help
 
Delivering secure mobile financial services (MFS) - "Frictionless" vs diligence
Delivering secure mobile financial services (MFS) - "Frictionless" vs diligenceDelivering secure mobile financial services (MFS) - "Frictionless" vs diligence
Delivering secure mobile financial services (MFS) - "Frictionless" vs diligence
 
ISACA CACS 2012 - Mobile Device Security and Privacy
ISACA CACS 2012 - Mobile Device Security and PrivacyISACA CACS 2012 - Mobile Device Security and Privacy
ISACA CACS 2012 - Mobile Device Security and Privacy
 
Mobile Security
Mobile SecurityMobile Security
Mobile Security
 
Lumension Security - Adjusting our defenses for 2012
Lumension Security - Adjusting our defenses for 2012Lumension Security - Adjusting our defenses for 2012
Lumension Security - Adjusting our defenses for 2012
 
Leaky Mobile Apps: What You Need to Know
Leaky Mobile Apps: What You Need to KnowLeaky Mobile Apps: What You Need to Know
Leaky Mobile Apps: What You Need to Know
 
Mobile security
Mobile securityMobile security
Mobile security
 
Mobile Security - 2015 Wrap-up and 2016 Predictions
Mobile Security - 2015 Wrap-up and 2016 PredictionsMobile Security - 2015 Wrap-up and 2016 Predictions
Mobile Security - 2015 Wrap-up and 2016 Predictions
 
Unicom Conference - Mobile Application Security
Unicom Conference - Mobile Application SecurityUnicom Conference - Mobile Application Security
Unicom Conference - Mobile Application Security
 
Report on Mobile security
Report  on Mobile securityReport  on Mobile security
Report on Mobile security
 
Building secure mobile apps
Building secure mobile appsBuilding secure mobile apps
Building secure mobile apps
 

Similar to Symantec Mobile Security Whitepaper June 2011

Security testing of mobile applications
Security testing of mobile applicationsSecurity testing of mobile applications
Security testing of mobile applications
GTestClub
 
Analysis and research of system security based on android
Analysis and research of system security based on androidAnalysis and research of system security based on android
Analysis and research of system security based on android
Ravishankar Kumar
 
Mobile Application Security
Mobile Application SecurityMobile Application Security
Mobile Application Security
Lenin Aboagye
 
SecurityWhitepaper 7-1-2015
SecurityWhitepaper 7-1-2015SecurityWhitepaper 7-1-2015
SecurityWhitepaper 7-1-2015
Francisco Anes
 

Similar to Symantec Mobile Security Whitepaper June 2011 (20)

Security testing of mobile applications
Security testing of mobile applicationsSecurity testing of mobile applications
Security testing of mobile applications
 
Untitled 1
Untitled 1Untitled 1
Untitled 1
 
Developing Secure Mobile Applications
Developing Secure Mobile ApplicationsDeveloping Secure Mobile Applications
Developing Secure Mobile Applications
 
OS-Project-Report-Team-8
OS-Project-Report-Team-8OS-Project-Report-Team-8
OS-Project-Report-Team-8
 
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
 
Bringing Government and Enterprise Security Controls to the Android Endpoint
Bringing Government and Enterprise Security Controls to the Android EndpointBringing Government and Enterprise Security Controls to the Android Endpoint
Bringing Government and Enterprise Security Controls to the Android Endpoint
 
Symantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec Mobile Security Webinar
Symantec Mobile Security Webinar
 
Analysis and research of system security based on android
Analysis and research of system security based on androidAnalysis and research of system security based on android
Analysis and research of system security based on android
 
Mobile Threat Management
Mobile Threat ManagementMobile Threat Management
Mobile Threat Management
 
Mobile application securitry risks ISACA Silicon Valley 2012
Mobile application securitry risks ISACA Silicon Valley 2012Mobile application securitry risks ISACA Silicon Valley 2012
Mobile application securitry risks ISACA Silicon Valley 2012
 
Mobile Application Security
Mobile Application SecurityMobile Application Security
Mobile Application Security
 
Chris D'Aguanno
Chris D'AguannoChris D'Aguanno
Chris D'Aguanno
 
Best practices for mobile enterprise security and the importance of endpoint ...
Best practices for mobile enterprise security and the importance of endpoint ...Best practices for mobile enterprise security and the importance of endpoint ...
Best practices for mobile enterprise security and the importance of endpoint ...
 
SecurityWhitepaper 7-1-2015
SecurityWhitepaper 7-1-2015SecurityWhitepaper 7-1-2015
SecurityWhitepaper 7-1-2015
 
Transforming any apps into self-defending apps
Transforming any apps into self-defending apps Transforming any apps into self-defending apps
Transforming any apps into self-defending apps
 
BlackHat Europe 2013 - Practical Attacks against Mobile Device Management (MDM)
BlackHat Europe 2013 - Practical Attacks against Mobile Device Management (MDM)BlackHat Europe 2013 - Practical Attacks against Mobile Device Management (MDM)
BlackHat Europe 2013 - Practical Attacks against Mobile Device Management (MDM)
 
Designing Secure Mobile Apps
Designing Secure Mobile AppsDesigning Secure Mobile Apps
Designing Secure Mobile Apps
 
An Introduction on Design and Implementation on BYOD and Mobile Security
An Introduction on Design and Implementation on BYOD and Mobile SecurityAn Introduction on Design and Implementation on BYOD and Mobile Security
An Introduction on Design and Implementation on BYOD and Mobile Security
 
Challenges2013
Challenges2013Challenges2013
Challenges2013
 
Webinar on Enterprise Security & android
Webinar on Enterprise Security & androidWebinar on Enterprise Security & android
Webinar on Enterprise Security & android
 

More from Symantec

More from Symantec (20)

Symantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of BroadcomSymantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of Broadcom
 
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
 
Symantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect ITSymantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect IT
 
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure ITSymantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
 
Symantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own ITSymantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own IT
 
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
 
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CKSymantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
 
Symantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat ReportSymantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat Report
 
Symantec Cloud Security Threat Report
Symantec Cloud Security Threat ReportSymantec Cloud Security Threat Report
Symantec Cloud Security Threat Report
 
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
 
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
 
Symantec Webinar | Tips for Successful CASB Projects
Symantec Webinar |  Tips for Successful CASB ProjectsSymantec Webinar |  Tips for Successful CASB Projects
Symantec Webinar | Tips for Successful CASB Projects
 
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
 
Symantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year OnSymantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year On
 
Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019
 
Symantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front LinesSymantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front Lines
 
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
 
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
 
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy BearSymantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
 
GDPR Breach Notification Demystifying What the Regulators Want
GDPR Breach Notification Demystifying What the Regulators WantGDPR Breach Notification Demystifying What the Regulators Want
GDPR Breach Notification Demystifying What the Regulators Want
 

Recently uploaded

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Recently uploaded (20)

Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdf
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 

Symantec Mobile Security Whitepaper June 2011

  • 1. Mobile Device Security: A summary of the security approaches employed in Apple’s iOS and Google’s Android
  • 2. Introduction • Today’s popular mobile platforms were designed with security in mind, but these provisions are not always sufficient in protecting enterprise assets • In this presentation: – Today’s major mobile threats – Mobile device security models – Analysis of Apple’s iOS – Analysis of Google’s Android – The mobile device ecosystem – Mobile security solutions 2
  • 3. Today’s Major Mobile Threats • Web-based and network-based attacks: – Typically launched by malicious websites or compromised legitimate sites • Malware: – Three high-level categories: viruses, worms and Trojan horse programs 3
  • 4. Today’s Major Mobile Threats • Social engineering attacks: – Leverage social engineering to trick users into disclosing sensitive information; can also be used to entice a users to install malware • Resource abuse attacks: – Misuse network, computing or identity resources of a device; two most common such abuses are sending spam and launching DoS attacks 4
  • 5. Today’s Major Mobile Threats • Data loss: – Employee or hacker exfiltrates sensitive information from protected device or network; loss can be unintentional or malicious. • Data integrity threats: – Corrupt or modify data without permission of the data’s owner; motivations may include disrupting enterprise operations and financial gain (data ransom fee) 5
  • 6. Mobile Device Security Models • Traditional access control: – Protects devices by using techniques such as passwords and idle-time screen locking • Application provenance: – Each app is stamped with identity of author and made tamper resistant; enables user to decide whether or not to use app based on identity of author • Encryption: – Conceals data at rest on the device to address device loss or theft 6
  • 7. Mobile Device Security Models • Isolation: – Limits app’s ability to access sensitive data or systems on device • Permissions-based access control: – Grants set of permissions to each app and then limits each app to accessing device data/systems within the scope of permissions 7
  • 8. High Level Analysis of Apple’s iOS • iOS security model well designed and thus has far proven largely resistant to attack • iOS’s security model offers strong protection against traditional malware, primarily due to Apple’s rigorous app certification process and their developer certification process, which vets the identity of each software author and weeds out attackers. 8
  • 9. High Level Analysis of Google’s Android • Android’s security model a major improvement over traditional computing platforms; ultimately relies on users to make important security decisions and most users are unequipped to do this: • Google has opted for a less rigorous certification model, permitting any software developer to create and release apps anonymously, without inspection. This lack of certification has arguably led to today’s increasing volume of Android-specific malware. 9
  • 11. Mobile Device Ecosystem • iOS and Android devices do not work in a vacuum – Connect to one or more cloud-based services (enterprise Exchange server, Gmail, MobileMe, etc.), home or work PC, or all of above • When properly deployed, both platforms allow users to simultaneously synchronize devices with private and enterprise cloud services without risking data exposure – However, there are several scenarios in which services may be abused by employees, resulting in exposure of enterprise data 11
  • 12. Mobile Device Ecosystem • Scenario #1 12
  • 13. Mobile Device Ecosystem • Scenario #2 13
  • 14. Mobile Device Ecosystem • Scenario #3 14
  • 15. Mobile Security Solutions • Mobile antivirus: – Scanners for Android, but iOS’s isolation model prevents implementing on iOS devices – Effective at detecting known threats, but provide little protection against unknown threats; expect traditional scanners to be replaced by cloud- enabled, reputation-based protection – Addresses threats in malware threat category and subset of malware- based attacks in resource abuse, data loss and data integrity categories • Secure browser: – Secure browser apps for iOS and Android checks visited URLs against blacklist or reputation database and blocks malicious pages – User must use the third-party secure Web browser to do all surfing – Secure browsers address Web-based attacks and social engineering attacks; can also potentially block malware downloaded through browser 15
  • 16. Mobile Security Solutions • Mobile device management (MDM) – Enables admins to remotely manage iOS and Android devices – Admins can set security policies such as password strength, VPN settings, screen lock duration; can also disable specific device functions, wipe missing devices and use the device’s GPS to locate missing device – Doesn’t specifically protect against any one threat category, but helps reduce risk of attack from many categories • Enterprise Sandbox – Aims to provide secure environment where enterprise resources such as email, calendar, contacts, corporate websites and sensitive documents can be accessed – Essentially divides device’s contents into two zones: secure zone for the enterprise data, and insecure zone for the employee’s personal and private data. – Focused on preventing malicious and unintentional data loss; though doesn’t block other attack categories explicitly, does limit impact of other attacks 16
  • 17. Mobile Security Solutions • Data loss prevention (DLP) – Scan publicly accessible storage areas of device for sensitive materials – Due to iOS’s isolation system, iOS-based DLP tools only inspect calendar and contact lists – On Android, could scan external flash storage, email and SMS inboxes, as well as calendar and contact lists – Due to isolation models, unable to scan data of other apps 17
  • 18. Thank you! For more information, please visit: Podcast - http://bit.ly/ipQUOf Blog post - http://bit.ly/mk6Ywt Infographic - http://bit.ly/leQBtV Copyright © 2010 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied, are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice. 18