Muhammad Shafiq-recorded slides

Views:
 
Category: Entertainment
     
 

Presentation Description

mobile security

Comments

Presentation Transcript

Slide 1:

MOBILE - SECURITY Muhammad Shafiq(FA15-Bscs-073)

Introduction:

Int r oduction Mobile security is the protection of smartphones, tablets, laptops and other portable computing devices, and the networks they connect to, from threats and vulnerabilities associated with wireless computing. Mobile security is also known as wireless security . Mobile security / Mobile phone security has become increasingly important in mobile computing. It is of particular concern as it relates to the security of personal and business information now stored on smart phones. Rapid advances in low-power computing, communications, and storage technologies continue to broaden the horizons of mobile devices, such as cell phones and personal digital assistants (PDAs).

Security Issue: Mobile Virus:

Security Issue: Mobile Virus A cell-phone virus is basically the same thing as a computer virus. An unwanted executable file that "infects" a device and then copies itself to other devices. A computer virus or worm spreads through e-mail attachments and Internet downloads. A cell-phone virus or worm spreads via Internet downloads, MMS attachments and Bluetooth transfers. Current phone-to-phone viruses almost exclusively infect phones running the Symbian operating system. Standard operating systems and Bluetooth technology will enable cell phone viruses to spread either through SMS or by sending Bluetooth requests when cell phones are physically close enough.

SPREADING OF VIRUS:

SPREADING OF VIRUS Phones that can only make and receive calls are not at risk. Only smart phones with a Bluetooth connection and data capabilities can receive a cell-phone virus. These viruses spread primarily in three ways: 1. Internet download - The user downloads an infected file to the phone by way of a PC or the phone's own Internet connection.

2. Bluetooth wireless connection - The user receives a virus via Bluetooth when the phone is in discoverable mode, meaning it can be seen by other Bluetooth-enabled phones.:

2. Bluetooth wireless connection - The user receives a virus via Bluetooth when the phone is in discoverable mode, meaning it can be seen by other Bluetooth-enabled phones. 3. Multimedia Messaging Service - The virus is an attachment to an MMS text message

CURRENT STATUS OF MOBILE MALWARE:

CUR R ENT S T A TUS OF MOBILE MA L W ARE Mobile malware is malicious software that targets mobile phones or wireless- enabled Personal digital assistants (PDA), by causing the collapse of the system and loss or leakage of confidential information. As wireless phones and PDA networks have become more and more common and have grown in complexity, it has become increasingly difficult to ensure their safety and security against electronic attacks in the form of viruses or other malware . Malicious software (" malware ") that is designed specifically to target a mobile device system, such as a tablet or smartphone to damage or disrupt the device. Most mobile malware is designed to disable a mobile device, allow a malicious user to remotely control the device or to steal personal information stored on the device.

THREATS OF MOBILE PHONE VIRUS:

Virus might access and/or delete all of the contact information and calendar entries in your phone. It might send an infected MMS message to every number in your phone book. The top three areas of concern for mobile users are receiving inappropriate content, fraudulent increases in phone bills and loss of important information stored on the handset. THREATS OF MOBILE PHONE VIRUS

Mobile Payment Application:

Mobile Payment Application Securit y . Mobile payment applications need a secure mechanism to protect the credit card information of the users. Phishing is the attempt to obtain sensitive information such as usernames, passwords, and credit card details (and sometimes, indirectly, money), often for malicious reasons, in an electronic communication. Credit and debit card payment and online fraud are highly profitable criminal activities that are increasingly dominated by card-not-present transactions.

Application Provided Security &:

Application Provided Security & Privacy Mechanism The mobile application can provide other security and privacy mechanisms. For example, the application may encrypt and sign the data before they enter into the secure communication link. Another example is that the user can only access a replica of the main table of the central database so that even if they successfully attack the replica through the mobile application, the data in the central database can still be protected.

authorStream Live Help