Mobile Security and Privacy in 3G & LTE

Views:
 
     
 

Presentation Description

Mobile Security & Privacy Analysis in 3G & LTE environment

Comments

Presentation Transcript

PowerPoint Presentation:

Mobile Security and Privacy in 3G & LTE: Strategies, Solutions and Market Forecast Analysis 2012-2017 URL: http://mindcommerce.com/Publications/MobileSecurityPrivacy_2012-2017.php Published: Sep 2012 Pages: 112 Single User: $1,995.00: Company Wide: $4,995.00: Team License: $2,865.00 This market has been initially driven by business concerns about protection of corporate assets and information. Mobile threats are becoming increasingly prolific as the mobile platform continues to gain popularity through the adoption of smart devices. As end- users and businesses come to rely on smartphones and tablets in their personal and business activities, they store valuable information that is attracting the attention of cybercriminals. National mobile security markets in Europe, North America and the Asia Pacific region will experience the strongest growth. BRIC nations will also show signs of a burgeoning mobile security market as their populations increasingly adopt smart devices. This research evaluates the mobile security and privacy ecosystem and vendor/solution analysis including several case studies. It analyzes current and anticipated security and privacy concerns and associated solutions. It identifies most likely and impactful mobile threats and related strategies for defense. The report provides market projection analysis on a global, regional, and country basis for 2012 through 2017. This report also provide country-specific mobile security market analysis for Australia, Brazil, Canada, China, France, Germany, India, Russia, UK, and USA as well as regional analysis for the Middle East and Southeast Asia. It also includes analysis of the following network operator initiatives in mobile security/privacy: Airtel, AT&T, MTS, Orange, Saudi Telecom, Telefonica, T-Mobile, Verizon, and Vodafone. Target Audience:

PowerPoint Presentation:

 Mobile/wireless service providers  Mobile security and privacy vendors  Mobile/wireless device manufacturers  Mobile/wireless application developers  Government and regulatory organizations  Law enforcement including police and others Table of Contents: 1.0 EXECUTIVE SUMMARY 9 2.0 MOBILE SECURITY THREAT AND PRIVACY MARKET OVERVIEW 10 3.0 UNDERSTANDING MOBILE SECURITY: 11 3.1 DEFINING MOBILE SECURITY: 11 3.2 MOBILE DEVICE SECURITY 11 4.0 UNDERSTANDING MOBILE THREATS 13 4.1 WEB BASED THREAT 13 4.2 PHISHING SCAMS 13 4.3 DRIVE-BY DOWNLOADS: 13 4.4 BROWSER EXPLOITS: 13 4.5 WI-FI SNIFFING 14 4.6 SOCIAL ENGINEERING ATTACKS 15 4.7 RESOURCE ABUSE 15 4.8 DATA LOSS 15 4.9 DATA INTEGRITY THREATS 16 5.0 UNDERSTANDING MOBILE PRIVACY 17 5.1 THE TYPES OF THREAT 17 5.2 THE THREAT SMARTPHONES POSE TO BUSINESSES 17 5.3 THE SOPHISTICATION OF THE MOBILE DEVICE IS IT’S OWN WORST ENEMY: 17 5.4 THE BIG PROBLEM WITH DOWNLOADABLE MOBILE APPS 17 5.5 REMOTELY HOSTED MOBILE APPLICATIONS AND DATA: 18 5.6 THE PROBLEMS WITH GSM: 18 5.7 THE GROWTH OF MACHINE TO MACHINE (M2M) 18 5.8 THE BIGGEST MYTH ABOUT MOBILE SECURITY 19 6.0 MOBILE ATTACKS AND VULNERABILITIES REVIEW 2011 20 6.1 JANUARY TO DECEMBER 2011 20 6.2 APPLE IOS VULNERABILITIES 21 6.3 DIRECT ATTACKS 21 6.4 BROWSER-BASED THREATS 22 6.5 THE BASIC STEPS TO PERFORM THIS ATTACK INCLUDE: 22 6.6 THREAT FOR SMBS (SMALL & MEDIUM BUSINESSES) 23 7.0 MOBILE SECURITY THREAT BY OS PLATFORM 24 7.1 IOS 24

PowerPoint Presentation:

7.2 SUMMARY OF IOS SECURITY 24 7.3 ANDROID 25 7.4 SUMMARY OF ANDROID’S SECURITY 26 8.0 MOBILE MALWARE FOR DEVICES 28 9.0 MOBILE DEVICE SECURITY: ANTIVIRUS SOFTWARE 30 9.1 AVG MOBILE SECURITY 30 9.2 KASPERSKY MOBILE SECURITY 30 9.3 ESET MOBILE SECURITY 31 9.4 BULLGUARD MOBILE SECURITY 31 9.5 MCAFEE MOBILE SECURITY 31 9.6 LOOKOUT MOBILE SECURITY 32 9.7 F-SECURE MOBILE SECURITY 32 9.8 NORTON SMARTPHONE SECURITY 32 9.9 TREND MICRO MOBILE SECURITY 32 9.10 DR. WEB MOBILE SECURITY SUITE 33 10.0 MOBILE SECURITY TREND ANALYSIS 34 10.1 NETWORK SECURITY TREND 34 10.1.1 RANSOMWARE TO TAKE MOBILE DEVICES HOSTAGE 34 10.1.2 WORMING INTO ANDROID 34 10.1.3 POLYMORPHISM WANT A CRACKER? 34 10.1.4 CLAMPDOWN ON NETWORK-BASED MONEY LAUNDERING 35 10.1.5 PUBLIC-PRIVATE RELATIONSHIPS IN SECURITY 35 10.1.6 SCADA UNDER THE SCOPE 35 10.1.7 SPONSORED ATTACKS 36 10.1.8 HACKING A GOOD CAUSE 36 10.2 MOBILE VIRTUAL PRIVATE NETWORK TREND 37 10.3 CLOUD BASE SECURITY: 38 10.4 CASE ANALYSIS: OBLIVIOUS DATA LOSS AND THE WILD WEST OF MOBILE APP SECURITY 39 10.4.1 IN A WORST CASE SCENARIO, THEN, EXACTLY WHAT ARE THE RISKS OF OBLIVIOUS DATA LOSS? 40 11.0 TOP SECURITY THREAT TREND IN 2012 42 11.1 SOCIAL MEDIA AND THE WEB: 42 11.2 SECURITY MEANS MORE THAN MICROSOFT: 42 11.3 MOBILE DEVICES IN THE SPOTLIGHT 42 11.4 NEW WEB AND NETWORK TECHNOLOGIES 42 11.5 CASUAL CONSUMERIZATION CAUSES BACKSLIDING 42 11.6 MORE HACKTIVISM AND TARGETED ATTACKS 42 11.7 DATA REGULATIONS PROLIFERATE AND PENALTIES GROW 42 11.8 MOBILE PAYMENT TECHNOLOGY MAY BE NEW TARGET 43 11.9 CLOUD SERVICES ARE BACK IN VOGUE 43

PowerPoint Presentation:

11.10 THE BASICS STILL GO WRONG 43 12.0 GROWTH DRIVER ON TODAY’S MOBILE SECURITY & PRIVACY LANDSCAPE 44 12.1 PROLIFERATION OF SMARTPHONE & INTELLIGENT MOBILE COMPUTING DEVICES 44 12.2 INCREASING DEMAND OF DATA SERVICES 45 12.3 GROWING DEMAND ON USING OF CORPORATE AND OPEN NETWORKS 46 12.4 DEVELOPMENT OF MCOMMERCE 46 12.5 MOBILE ENTERTAINMENT PROLIFERATION 47 12.6 MOBILE PERSONALIZATION DEMAND AND MSECURITY 47 12.7 GROWTH OF OPEN SOURCE OS LIKE ANDROID 47 13.0 MOBILE SECURITY MARKET PROJECTION 2012-2017: GLOBAL VS. REGIONAL VS. NATIONAL 49 13.1 GLOBAL MARKET VALUE ON SPENDING 2012-2017 49 13.2 MARKET VALUE SHARE ACROSS ECO-SYSTEM 2012-2017 49 13.3 REGIONAL MARKET VALUE SHARE IN % VS. MOBILE SUBSCRIBER % (APAC VS. EUROPE VS. NORTH AMERICA VS. LATIN AMERICA VS. AFRICA) 51 13.4 REGIONAL MARKET VALUE IN USD MLN: APAC VS. EUROPE VS. NORTH AMERICA VS. LATIN AMERICA VS. AFRICA 2012-2017 52 13.5 CAGR COMPARISON OF 2012 TO 2017(APAC VS. EUROPE VS. NORTH AMERICA VS. LATIN AMERICA VS. AFRICA) 52 13.6 NATIONAL MARKET VALUE PROJECTION OF TOP 13 COUNTRIES/TERRITORIES 2012-2017 53 13.7 SECURITY SOFTWARE PRE-INSTALLED PROJECTION AMONG TOTAL SMARTPHONES & TABLETS 2012-2017 53 13.8 UP-TO-DATE SECURITY SOFTWARE USE BEHAVIOR AMONG MOBILE DEVICE OWNER: % OF INSTALLED VS. NOT INSTALLED 2012-2017 54 13.9 MOBILE RELATED CYBER CRIME VICTIM VS. UNAWARE ABOUT MOBILE SECURITY MEASURE: % AMONG MOBILE DEVICE OWNER 54 13.10 MOBILE OS RANKING AS PER DEVICE SECURITY 55 13.10.1 WHICH MOBILE OS CAN ENSURE HIGHEST SECURITY? 57 13.11 MOBILE SECURITY COMPANY MERGER & ACQUISITION TREND 2011-2012 58 13.12 INVESTMENT TREND AND OPTION IN MOBILE SECURITY BUSINESS 58 14.0 COUNTRY SPECIFIC MOBILE SECURITY MARKET ANALYSIS 59 14.1 CHINA 59 14.1.1 MOBILE SECURITY MARKET SHARE 2012 59 14.1.2 TOTAL MOBILE SECURITY PRODUCT USER VS. ACTIVE USER 2012 59 14.1.3 SYMBIAN VS. ANDROID: NEW VIRUS NUMBER 2010-2012 Q1 60 14.1.4 SYMBIAN VS. ANDROID: TYPES OF VIRUS 2012 60 14.1.5 MOBILE INTERNET USER PROJECTION 2012-2017 61 14.2 USA 61 14.2.1 MOBILE INTERNET USER 2012-2017 61

PowerPoint Presentation:

14.2.2 % OF MOBILE ANTIVIRUS SOFTWARE USER AMONG TOTAL MOBILE INTERNET USER 62 14.2.3 BOTNET ON SPREADING VIRUS 2012 62 14.2.4 PLATFORM USE TO SPREAD SPAM ON MOBILE DEVICE 63 14.3 UK 63 14.3.1 MOBILE INTERNET USER 2012 - 2017 63 14.3.2 MOBILE ANTIVIRUS SOFTWARE 2012 64 14.3.3 BOTNET ON SPREADING VIRUS 64 14.4 RUSSIA 65 14.4.1 MOBILE INTERNET USER 65 14.4.2 MOBILE ANTIVIRUS SOFTWARE USER 2012 65 14.4.3 COMMON TYPES OF SPAM 2012 66 14.5 FRANCE 66 14.5.1 MOBILE INTERNET USER 66 14.5.2 MOBILE ANTIVIRUS SOFTWARE 2012 67 14.5.3 COMMON TYPES OF SPAM 2012 67 14.6 BRAZIL: 68 14.6.1 MOBILE INTERNET USER 68 14.6.2 MOBILE ANTIVIRUS SOFTWARE: 68 14.6.3 PLATFORM USE TO SPREAD SPAM ON MOBILE DEVICE 69 14.7 INDIA 69 14.7.1 MOBILE INTERNET USER 69 14.7.2 MOBILE ANTIVIRUS SOFTWARE 2012 70 14.7.3 COMMON SPAM TYPES IN INDIA 70 14.8 GERMANY 71 14.8.1 MOBILE INTERNET USER 71 14.8.2 MOBILE ANTIVIRUS SOFTWARE 71 14.8.3 PLATFORM USE TO SPREAD SPAM ON MOBILE DEVICE 72 14.9 AUSTRALIA 72 14.9.1 MOBILE INTERNET USER 72 14.9.2 MOBILE ANTIVIRUS SOFTWARE 2012 73 14.10 MIDDLE EAST 73 14.10.1 MOBILE INTERNET USER 73 14.10.2 MOBILE ANTIVIRUS SOFTWARE 2012 74 14.11 SOUTH EAST ASIA 74 14.11.1 MOBILE INTERNET USER 74 14.11.2 MOBILE ANTIVIRUS SOFTWARE 2012 75 14.12 CANADA 75 14.12.1 MOBILE INTERNET USER 75 14.12.2 MOBILE ANTIVIRUS SOFTWARE 2012 76 15.0 MOBILE SECURITY VENDOR / SOLUTION PROVIDER ANALYSIS 77

PowerPoint Presentation:

15.1 VENDOR INVESTMENT INITIATIVE 2012 77 15.1.1 LOOKOUT MOBILE 77 15.1.2 SYMANTEC 77 15.1.3 MCAFEE 77 15.1.4 JUNIPER NETWORKS 77 15.1.5 CISCO 77 15.1.6 TREND MICRO 77 15.2 AVAST REVIEW 78 15.3 WORLDWIDE ANTIVIRUS SOFTWARE MARKET ANALYSIS 80 16.0 SMARTPHONE SECURITY VULNERABILITY 82 17.0 MOBILE SECURITY MERGERS AND ACQUISITIONS (M&A). 83 18.0 MOBILE HANDSET / OS PROVIDER INITIATIVE ANALYSIS 84 19.0 TELECOM NETWORK PROVIDER INITIATIVE ANALYSIS 86 19.1 AT&T 86 19.2 VODAFONE 86 19.3 T-MOBILE 86 19.4 ORANGE 86 19.5 SAUDI TELECOM 87 19.6 VERIZON 87 19.7 TELEFONICA 87 19.8 AIRTEL 87 19.9 MTS 88 20.0 MOBILE THREAT LANDSCAPE REVIEW JAN-JULY 2012 89 20.1 LATEST THREATS BY TYPE 2012 (JAN - JULY) 89 20.2 NEW VARIANTS OF ALREADY KNOWN FAMILIES 89 21.0 MOBILE PRIVACY LANDSCAPE REVIEW: DO-NOT-TRACK DEBATE 90 22.0 MOBILE SECURITY CASE ANALYSIS 91 22.1 A SYMANTEC CASE: MOBILE HACKERS IN THE VALUE CHAIN 91 22.2 A TROJAN CASE: THE RISE OF MOBILE THREATS WITH POLITICAL AGENDAS 94 22.3 BRITISH ROYAL MOBILE PHONE HACKING CASE 98 22.3.1 CAN IT BE STOPPED? 99 23.0 MOBILE PRIVACY CASE ANALYSIS 101 23.1 PANDALABS PRIVACY VIOLATION PREDICTION CASE - THE BIGGEST SECURITY THREAT OF 2012 102 23.1.1 MOBILE MALWARE 103 23.1.2 MALWARE FOR TABLETS 103 23.1.3 MAC MALWARE 103 23.1.4 PC MALWARE 103 23.1.5 SMBS UNDER ATTACK 104 23.1.6 WINDOWS 8 104 23.2 MOBILE PRIVACY THREAT CASE TO TRAVEL STORES 104

PowerPoint Presentation:

23.2.1 HEALTHCARE MOBILE DATA LOSS CASE STUDY 105 24.0 CONCLUSION & RECOMMENDATIONS: 106 24.1 CONCLUSION 106 24.2 RECOMMENDED 10 BEST PROTECTION PRACTICES AGAINST MOBILE THREAT 107 24.3 RECOMMENDED PROTECTION AGAINST MOBILE PRIVACY VIOLATION 109 24.3.1 MOBILE ANTIVIRUS 109 24.3.2 SECURE BROWSER 109 24.3.3 MOBILE DEVICE MANAGEMENT (MDM) 110 24.3.4 ENTERPRISE SANDBOX 110 24.3.5 DATA LOSS PREVENTION (DLP) 111 24.3.6 DEVICE SECURITY MODELS 111 List of Figures Figure 1: Mobile device threat Diagram 12 Figure 2: % of Web Based Threat 13 Figure 3: User’s email account on an Apple iPad exploited by the Firesheep tool (copyright: Yahoo) 14 Figure 4: Diagram of Protection against Mobile to Mobile threat 16 Figure 5: Mobile malware in multipurpose 29 Figure 6: Mobile Overtaking Web (copyright: Morgan Stanley) 45 Figure 7: Global Mobile Data Traffic Forecast by Region (copyright: Cisco) 45 Figure 8: Growth of Mobile commerce 46 Figure 9: growth of android market share 48 Figure 10: Global mSecurity Market Value on Spending 2012-2017 (USD $ Bln) 49 Figure 11: Market Value Share of Smartphone 2012 50 Figure 12: Market Ecosystem Comparison of Smartphone(Copyright chetan Sharma Consulting) 50 Figure 13: APAC vs. Europe vs. North America vs. Latin America vs. Africa: mSecurity Market Value % 2012-2017 51 Figure 14: Mobile Subscriber % of Total Global: APAC vs. Europe vs. North America vs. Latin America vs. Africa 2012-2017 51 Figure 15: APAC vs. Europe vs. North America vs. Latin America vs. Africa: mSecurity Market Value in USD mln 2012-2017 52 Figure 16: CAGR comparison of APAC vs. Europe vs. North America vs. Latin America vs. Africa during 2012-2017 52 Figure 17: Mobile security software pre-installed with smartphones & tablets % projection 2012-2017 53 Figure 18: % of Mobile Device Owner Installed vs. Not installed up-to-date security software 2012-2017 54 Figure 19: Mobile Related Cyber Crime Victim vs. Unaware about Mobile Security Measure: % among Mobile Device Owner 54

PowerPoint Presentation:

Figure 21: Market share of mobile security company in China 2012 59 Figure 22: Total Mobile Security Product User vs. Active User in China 2012 59 Figure 23: Symbian vs. Anrroid new virus number 2010-2012 Q1 60 Figure 24: Type of virus on Symbian vs. Android in China 2012 60 Figure 25: Mobile Internet User Projection in China 2012-2017 61 Figure 26: Mobile Internet user of USA 2012-2017 61 Figure 27: Active vs. Inactive Mobile Antivirus User 62 Figure 28: Types of Botnet in USA as of 2012 62 Figure 29: Spam Types In USA as of 2012 63 Figure 30: Mobile Internet User of UK 2012-2017 63 Figure 31: Active vs. Inactive Mobile Antivirus software user 2012 64 Figure 32: Types of Botnet in UK as of 2012 64 Figure 33: Mobile Internet User of Russia 2012-2017 65 Figure 34: Mobile Antivirus software user 2012 65 Figure 35: Platform use to spread Spam on Mobile device 66 Figure 36: Mobile Internet User 2012-2017 66 Figure 37: Active vs. Inactive Mobile Antivirus software user 2012 67 Figure 38: Common types of spam in Russia as of 2012 67 Figure 39: Mobile Internet User 2012-2017 68 Figure 40: Mobile Antivirus software user 68 Figure 41: Common types of spam 2012 69 Figure 42: Mobile Internet User 2012-2017 69 Figure 43: Mobile Antivirus software user 70 Figure 44: Common Spam Types in India 2012 70 Figure 45: Mobile Internet User 2012-2017 71 Figure 46: Mobile Antivirus software user 71 Figure 47: Platform use to spread Spam on Mobile device 72 Figure 48: Mobile Internet User 2012-2017 72 Figure 49: Mobile Antivirus software user 2012 73 Figure 50: Mobile Internet User 2012-2017 73 Figure 51: Mobile Antivirus software user 2012 74 Figure 52: Mobile Internet User 2012-2017 74 Figure 53: Mobile Antivirus software user 75 Figure 54: Mobile Internet User 2012-2017 75 Figure 55: Mobile Antivirus software user 76 Figure 56: Worlwide Antivirus Software Vendors (Copyright: opsvvat) 80 Figure 57: Worldwide Mobile Device Sales [1st Qtr 2012] 84 Figure 58: T-Mobile Security Interface (copyright: T-Mobile) 86 Figure 59: Latest Mobile Threat by Type 2012 (Jan - July) 89 Figure 60: Mobile Threats vs. Staged Payload (copyright: Symantec) 91 Figure 61: Mobile Threats: Android.Jmshider (copyright: Symantec) 92

PowerPoint Presentation:

Figure 62: Mobile Threat: Example of In-App Promotion To Download Threat (copyright: Symantec) 93 Figure 63: Mobile threats - embedded Trojan (copyright: Symantec) 95 Figure 64: Mobile threats- Android.Geinimi: a back door Trojan Scenario (copyright: Symantec) 96 Figure 65: Mobile threats: Group III type mobile threats - storefront apps (copyright: Symantec) 97 List of Tables Table 1: Mobile Personalization by Regions 47 Table 2: Market Value Projection by Countries: top 13 countries 53 Table 3: Mobile OS ranking while security issue considered top 55 Table 4: Mobile Handset Unit vs. Market Share by OS platform 2012 85 Contact: [email protected]