mobile device security informative v2
TRANSCRIPT
![Page 1: Mobile device security informative v2](https://reader036.vdocuments.site/reader036/viewer/2022080214/55a771e31a28abb8298b45e4/html5/thumbnails/1.jpg)
MOBILE DEVICE SECURITY
MUHAMMAD SALMAN ZAHID
![Page 2: Mobile device security informative v2](https://reader036.vdocuments.site/reader036/viewer/2022080214/55a771e31a28abb8298b45e4/html5/thumbnails/2.jpg)
AGENDA
Overview
Execution Model
• iOS
• Android
Risks
GPS
Attacks
Securing your Device
1/7
/20
15
2
MS
Z
![Page 3: Mobile device security informative v2](https://reader036.vdocuments.site/reader036/viewer/2022080214/55a771e31a28abb8298b45e4/html5/thumbnails/3.jpg)
OVERVIEW
Mainly focused on
• iOS
• Android
Same concepts also apply on other OSes
• Windows
• Blackberry
Smart Phones are simple computers
• Mobile devices don’t come with the tools required to analyze what’s happening
• Root level access required
1/7
/20
15
3
MS
Z
![Page 4: Mobile device security informative v2](https://reader036.vdocuments.site/reader036/viewer/2022080214/55a771e31a28abb8298b45e4/html5/thumbnails/4.jpg)
EXECUTION MODEL
Android & iOS
• Sandbox concept
• Each process runs it a partitioned environment
• No direct access to OS resources
• Not allowed to interact directly with other Applications or their data
iOS
• Strict API
• SDK enforces restrictions
• Applications must be signed and can only be deployed from a single trusted source
Android
• Dalvik VM
• Multiple/Unknown sources
1/7
/20
15
4
MS
Z
![Page 5: Mobile device security informative v2](https://reader036.vdocuments.site/reader036/viewer/2022080214/55a771e31a28abb8298b45e4/html5/thumbnails/5.jpg)
RISKS
• Virus
• Malware
• Buffer Overflow
• Password theft
• Key logging
Smart phones are computers
• FB
• E-mails
• Other applications
Multiple -Login Applications
1/7
/20
15
5
MS
Z
![Page 6: Mobile device security informative v2](https://reader036.vdocuments.site/reader036/viewer/2022080214/55a771e31a28abb8298b45e4/html5/thumbnails/6.jpg)
GPS
Global Positioning System
• Every smart phone has GPS
• Must aware the use of GPS
• GPS information passed on via third parties without your knowledge.
• For example: Face book, Maps etc.
1/7
/20
15
6
MS
Z
![Page 7: Mobile device security informative v2](https://reader036.vdocuments.site/reader036/viewer/2022080214/55a771e31a28abb8298b45e4/html5/thumbnails/7.jpg)
ATTACKS
• Most common among devices
• Avoid unnecessary pairingBluetooth
• Don’t use untrsuted Wi-Fi
Wireless Access Points
1/7
/20
15
7
MS
Z
![Page 8: Mobile device security informative v2](https://reader036.vdocuments.site/reader036/viewer/2022080214/55a771e31a28abb8298b45e4/html5/thumbnails/8.jpg)
SECURING YOUR DEVICE
• Graphic pattern is commonly usedUse password
• Automatic on in iOS
• Android: we can turn it on
• Hardware must be supported else slow responseUse Encryption
• Clouds are helpfulUse backup &
Sync.
• Supported in iOS
• Need an Application in Android
Lock device on multiple failed
attempts
1/7
/20
15
8
MS
Z
![Page 9: Mobile device security informative v2](https://reader036.vdocuments.site/reader036/viewer/2022080214/55a771e31a28abb8298b45e4/html5/thumbnails/9.jpg)
SECURING YOUR DEVICE CONT...
• Security cameras Be aware of Surrounding
• Applications Installation
• iOS & Google have certificates & CodesLevel of Trust
• Regular update itAntivirus
Ignore/Delete unknown prompted
messages/links
• Any abnormality can effect the BatteryMonitor Battery Life
1/7
/20
15
9
MS
Z
![Page 10: Mobile device security informative v2](https://reader036.vdocuments.site/reader036/viewer/2022080214/55a771e31a28abb8298b45e4/html5/thumbnails/10.jpg)
SECURING YOUR DEVICE CONT...
1/7
/20
15
10
MS
Z
![Page 11: Mobile device security informative v2](https://reader036.vdocuments.site/reader036/viewer/2022080214/55a771e31a28abb8298b45e4/html5/thumbnails/11.jpg)
1/7
/20
15
MS
Z
11