Mobile Security: Presented By:-Manik Arora Punjab Technical University

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 31

MOBILE SECURITY

Presented By:-
Manik Arora
Punjab Technical University
MOBILE DEVICES
A Mobile Device (also known as cell
phone device, handheld device, handheld
computer, or "Palmtop") Is A Pocket-Sized
Computing Device, Typically Having A
Display Screen With Touch Input Or A
Miniature Keyboard.
Mobile Computers
 Note Book PC
 Ultra-Mobile PC
 Handheld PC
 Personal Digital Assistant
 Graphic Computer
 Pocket Computer
Mobile Computers
HANDHELD GAME CONSOLES
 Nintendo DS
 Game Boy
 Sega Game Gear
 PC Engine GT
 PlayStation Portable
 N-Gage
 Pandora
 Atari Lynx
HANDHELD GAME CONSOLES
MEDIA RECORDERS
 Digital Still Camera
 Digital Video Camera
 Digital Audio Recorders
 Media Players/Displayers
 Portable Media Players
 E-Book Readers
MEDIA RECORDERS
COMMUNICATION DEVICES
 Mobile Phones
 Cordless Phones
 Pagers
 Walky-Talkies
COMMUNICATION DEVICES
MOBILE DEVICES IN OUR DAILY LIFE
WIRELESS COMMUNICATION

 Wireless LAN’s
 AdHoc Networks
 Bluetooth
 GPRS
 GSM
 CDMA
WIRELESS LAN
ADHOC NETWORK
BLUETOOTH
GPRS
GSM NETWORK
CDMA NETWORK
MOBILE DEVICE SECURITY
McAFEE MOBILE SECURITY REPORT 2008

PEOPLE WORRING ABOUT INFORMATION LOST (%)


14

86

Don't Worry Worry


McAFEE MOBILE SECURITY REPORT 2008

Global Mobile Users Directly Infected Or Know Someone


Infected (%)
14

86

Infected Not Infected


McAFEE MOBILE SECURITY REPORT 2008

Consumers knowingly Using Unprotected Devices


(%)
21

79

Protected Unprotected
McAFEE MOBILE SECURITY REPORT 2008
MOBILE DEVICES –AREAS OF RISK
 Physical Loss Of Device
 Wastage Of Time For Recovering The Lost Data
 Important Data Could Go To A Competitor Or
Lost Altogether
 Attack Of Viruses And Malware Usually On
Synchronizing Mobile Device With Office Or
Home PC.
 Use Of Mobile Devices For Stealing Company
Information From PDA’s To Lowly MP3 Players.
MOBILE SECURITY THREATS
RESTRICITING MOBILE SECURITY THREATS
Some Key Defenses Against Data Lost & Compliance Threats-

 Developing Strategic Plans, Security Policies &


Procedures For The Use Of Mobile Devices.
 Implementation Of Antiviruses And Spywares In The
Mobile Devices.
 Management Should Maintain Central Control On
The Use Of Mobile Devices In The Enterprise.
 Install Softwares That Warns The Users Against
Adding Unauthorized Applications On Their Own.
 Apply Technologies That Make It Impossible For Users
Or Devices To Break Company’s Security Policies.
PRACTICES FOR PROTECTION AGAINST
MOBILE MALWARES
 Computers To Which The Users Are Connecting
Their Mobile Devices Should Be Virus Protected.
 Keeping The Bluetooth Of Mobile Devices
Disabled When Not In Use.
 Suspicious E-mail Attachments Should Not Be
Downloaded As They May Contain Malicious
Programs.
 Backup Of Information On Phones And PDA’s
Should Be kept In Some Other Storage Device.
 Neglecting Unwanted Advertisements.
CRITICAL MOBILE SECURITY MISTAKES

 Not Knowing What Is Really At Risk


 Not Taking The Complexities Involved Seriously
Enough
 Being Too Trusty Of People
 Not Using Technology For Help
 Not Understanding How The Bad Guys Work
SECTIONS IN THE MOBILE SECURITY
POLICY
 Objective
 Ownership & Authority
 Scope
 Risk Assessment
 Security Measures
 Acceptable Usage
SUMMARY
As the use of mobile devices in enterprise organizations
increases, corporate and government organizations
need to take the necessary steps to maintain the security
of their email and application data. In using wireless
devices, data is increasingly transmitted outside the
corporate network and stored on mobile devices outside
the physical boundaries of the organization.
An effective wireless solution should be designed for
enterprise-grade security and provide an architecture
specifically for the realities of mobility. And finally,
mobile devices must be protected from data loss,
tampering and malware infection.
THANKS
THAT’S ALL

You might also like