SlideShare ist ein Scribd-Unternehmen logo
1 von 19
Wireless and Mobile Security Null-The open Security Community Pushkar
News… Varanasi Bomb Blast Mail sent through hacked WiFiof a DJ in NaviMumbai. Out of 2300 connections only 16% are secured in Pune City – Cyber Crime Cell, Pune. Police making it compulsory to secure wifi. Geimini Trojan attacks Android users on New Year.
WIRELESS Technology
Wireless Network Standards….
Attacks… Identity Theft – Hacking a wireless network and using it. 	Use it for fun. 	Use it for free. 	Use it for crime. MITM – Sniff the users information. Corporate espionage. Sniff passwords DoS– Interrupt work.
Wireless Security Measures… No Security   WEP – Wireless Equivalent Protocol Simple Low level Security 40 bit shared key used. only ensured the data received is the same or not. can be easily cracked now.
Wireless Security measures contd… WPA – Wi-Fi Protected Access. 	128bit,  	TKIP – Dynamically offering keys for connection. 	Encrypted using Michael Algorithm. WPA2 – 128bit, AES encryption algorithm. More reliable and most widely used.
Mobiles – Smartphones… The next generation technology. Compact and efficient devices. A practical and cost-effective alternative to laptops. Need of the hour. Work on Move.
Who are the users … You, me and all, Corporate Directors, Managers, Executives, Salesman, Suppliers, Contractors, Government Officials College Students,
Affecting factors… Mobile Communication Capabilities : Cellular – MITM in voice transmission, with using less secured protocols or encrypting/decrypting techniques. WiFi-MITM Blutooth /Infrared - Personal Area Network SMS—Scripts to send spam sms from the device, inject malware on the phones. Corporate Firewall, Inside the firewall, 	Access to all the data on network, Outside the firewall 	Data is in the air,
Threats… Physical :  Device theft, loss of device  Misuse by trusted people (colleagues, friends, family) Malwares: 	Mobile Malwares-new and emerging threat 	Infection vectors are more. Eg., Mabir/Cabir virus: can infect Symbian OS via Bluetooth or SMS. Dampigtrojan: corrupts the system’s uninstallation settings.
Threats contd… Mobile App Downloads : Free nature of apps, 	“Jail-breaking” – process which allows users to installed pirated or unchecked applications. Application Isolation. Secure Data Storage: 	Password protection, mobile number fixed for each device, auto mounting disable. Strong Authentication with poor keyboards. Secure Operating Systems
Platforms… Android Operating System : OS by google, open source. Used by many mobile device producing companies. iOS : Apple OS. Used in iPhones, iPads Windows Mobile OS /Windows Phone 7 :  Mobile OS from Microsoft. Symbian OS /Symbian^3 : Used in Nokia devices.
Security Measures… Platform-Centric Security : Protecting the device/network instead of data. Data-Centric Security : Protecting Data instead of devices/networks.  Components in mobile security : 	Authentication and Authorization : 	Firewall Security : 	Over-the-air security : 	Offline security :
Security Measures  Authentication and Authorization : 		Authorize the device use as well as the application use by proper authentication. Firewall Security : Include and register mobile devices with company firewalls. Only give access to registered users. Over-the-air security : Encrypt the data when sent onto public mobile networks. Offline security : Prevent mobile device to reach in the wrong hands.
Security Measures … Security over PAN :  Security for Bluetooth /Infrared data transmission. Security over mobile Malwares : Install trusted anti-virus scanners in mobiles.
Wifi Cracking Demo
Conclusion … Work while on move with CAUTION …
Thank You 

Weitere ähnliche Inhalte

Was ist angesagt?

Cyber security Information security
Cyber security Information securityCyber security Information security
Cyber security Information securityAYESHA JAVED
 
Network Security Presentation
Network Security PresentationNetwork Security Presentation
Network Security PresentationAllan Pratt MBA
 
Network security
Network securityNetwork security
Network securitymena kaheel
 
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...Edureka!
 
Mobile protection
Mobile protection Mobile protection
Mobile protection preetpatel72
 
Network Security
Network SecurityNetwork Security
Network Securityforpalmigho
 
Network security
Network securityNetwork security
Network securityEstiak Khan
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber Awareness Cyber Security and Cyber Awareness
Cyber Security and Cyber Awareness Jay Nagar
 
Mobile Device Security
Mobile Device SecurityMobile Device Security
Mobile Device SecurityNemwos
 
Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025Radar Cyber Security
 
Mobile Application Security
Mobile Application SecurityMobile Application Security
Mobile Application SecurityIshan Girdhar
 
Cyber security
Cyber securityCyber security
Cyber securitymanoj duli
 
Ch 10: Hacking Web Servers
Ch 10: Hacking Web ServersCh 10: Hacking Web Servers
Ch 10: Hacking Web ServersSam Bowne
 
Cybersecurity Awareness Training
Cybersecurity Awareness TrainingCybersecurity Awareness Training
Cybersecurity Awareness TrainingDave Monahan
 
General Awareness On Cyber Security
General Awareness On Cyber SecurityGeneral Awareness On Cyber Security
General Awareness On Cyber SecurityDominic Rajesh
 

Was ist angesagt? (20)

Cyber security Information security
Cyber security Information securityCyber security Information security
Cyber security Information security
 
Network Security Presentation
Network Security PresentationNetwork Security Presentation
Network Security Presentation
 
Network security
Network securityNetwork security
Network security
 
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
 
Mobile protection
Mobile protection Mobile protection
Mobile protection
 
Network Security
Network SecurityNetwork Security
Network Security
 
Network security
Network securityNetwork security
Network security
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber Awareness Cyber Security and Cyber Awareness
Cyber Security and Cyber Awareness
 
Mobile Device Security
Mobile Device SecurityMobile Device Security
Mobile Device Security
 
Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025
 
Mobile Application Security
Mobile Application SecurityMobile Application Security
Mobile Application Security
 
Security awareness
Security awarenessSecurity awareness
Security awareness
 
Cyber security
Cyber securityCyber security
Cyber security
 
Security Awareness Training by Fortinet
Security Awareness Training by FortinetSecurity Awareness Training by Fortinet
Security Awareness Training by Fortinet
 
Ch 10: Hacking Web Servers
Ch 10: Hacking Web ServersCh 10: Hacking Web Servers
Ch 10: Hacking Web Servers
 
Network security
Network security Network security
Network security
 
Mobile Security
Mobile SecurityMobile Security
Mobile Security
 
Cybersecurity Awareness Training
Cybersecurity Awareness TrainingCybersecurity Awareness Training
Cybersecurity Awareness Training
 
General Awareness On Cyber Security
General Awareness On Cyber SecurityGeneral Awareness On Cyber Security
General Awareness On Cyber Security
 
Mobile security
Mobile securityMobile security
Mobile security
 

Andere mochten auch

Wireless power transmission
Wireless power transmissionWireless power transmission
Wireless power transmissionMohammad Azhar
 
Wireless mobile charger
Wireless mobile chargerWireless mobile charger
Wireless mobile chargerMaruf Priyo
 
Wireless mobile charger or wireless power transfer
Wireless mobile charger or  wireless power transferWireless mobile charger or  wireless power transfer
Wireless mobile charger or wireless power transferGautam Singh
 
Wireless mobile charging by Inductive Coupling.
Wireless mobile charging by Inductive Coupling.Wireless mobile charging by Inductive Coupling.
Wireless mobile charging by Inductive Coupling.siddhant212
 
Wireless charging of mobilephones
Wireless charging of  mobilephonesWireless charging of  mobilephones
Wireless charging of mobilephonesPRADEEP Cheekatla
 
Wireless charging of mobile PPT.
Wireless charging of mobile PPT.Wireless charging of mobile PPT.
Wireless charging of mobile PPT.Krishna Teja
 

Andere mochten auch (8)

wireless power transfer
wireless power transfer wireless power transfer
wireless power transfer
 
Wireless power transmission
Wireless power transmissionWireless power transmission
Wireless power transmission
 
Wireless mobile charger
Wireless mobile chargerWireless mobile charger
Wireless mobile charger
 
Wireless mobile charger or wireless power transfer
Wireless mobile charger or  wireless power transferWireless mobile charger or  wireless power transfer
Wireless mobile charger or wireless power transfer
 
Wireless mobile charging by Inductive Coupling.
Wireless mobile charging by Inductive Coupling.Wireless mobile charging by Inductive Coupling.
Wireless mobile charging by Inductive Coupling.
 
Wireless charging of mobilephones
Wireless charging of  mobilephonesWireless charging of  mobilephones
Wireless charging of mobilephones
 
Witricity- Wireless Power Transmission
Witricity- Wireless Power TransmissionWitricity- Wireless Power Transmission
Witricity- Wireless Power Transmission
 
Wireless charging of mobile PPT.
Wireless charging of mobile PPT.Wireless charging of mobile PPT.
Wireless charging of mobile PPT.
 

Ähnlich wie Wireless and mobile security

Mobile security 8soft_final_summercamp2011
Mobile security 8soft_final_summercamp2011Mobile security 8soft_final_summercamp2011
Mobile security 8soft_final_summercamp2011Zarafa
 
Treads to mobile network
Treads to mobile networkTreads to mobile network
Treads to mobile networkRAVITEJA828
 
Cell Phone Viruses & Security
Cell Phone Viruses & SecurityCell Phone Viruses & Security
Cell Phone Viruses & Securityguestc03f28
 
Cell Phone Viruses & Security
Cell Phone Viruses & SecurityCell Phone Viruses & Security
Cell Phone Viruses & Securitymanish kumar
 
2010: Mobile Security - WHYMCA Developer Conference
2010: Mobile Security - WHYMCA Developer Conference2010: Mobile Security - WHYMCA Developer Conference
2010: Mobile Security - WHYMCA Developer ConferenceFabio Pietrosanti
 
cellphone virus and security
cellphone virus and securitycellphone virus and security
cellphone virus and securityAkhil Kumar
 
Cyber Security
Cyber SecurityCyber Security
Cyber SecurityBryCunal
 
Report on Mobile security
Report  on Mobile securityReport  on Mobile security
Report on Mobile securityKavita Rastogi
 
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?Do New Mobile Devices in Enterprises Pose A Serious Security Threat?
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?acijjournal
 
Network Security for Employees
Network Security for Employees Network Security for Employees
Network Security for Employees OPSWAT
 
The Consumerisation of Corporate IT
The Consumerisation of Corporate ITThe Consumerisation of Corporate IT
The Consumerisation of Corporate ITPeter Wood
 

Ähnlich wie Wireless and mobile security (20)

CS_UNIT 2(P3).pptx
CS_UNIT 2(P3).pptxCS_UNIT 2(P3).pptx
CS_UNIT 2(P3).pptx
 
Cn35499502
Cn35499502Cn35499502
Cn35499502
 
Unit-3.pptx
Unit-3.pptxUnit-3.pptx
Unit-3.pptx
 
Mobile security
Mobile securityMobile security
Mobile security
 
Cp3201 mobile security final
Cp3201 mobile security finalCp3201 mobile security final
Cp3201 mobile security final
 
Mobile security 8soft_final_summercamp2011
Mobile security 8soft_final_summercamp2011Mobile security 8soft_final_summercamp2011
Mobile security 8soft_final_summercamp2011
 
Treads to mobile network
Treads to mobile networkTreads to mobile network
Treads to mobile network
 
Communication security 2021
Communication security 2021Communication security 2021
Communication security 2021
 
Smartphone
SmartphoneSmartphone
Smartphone
 
Cell Phone Viruses & Security
Cell Phone Viruses & SecurityCell Phone Viruses & Security
Cell Phone Viruses & Security
 
Cell Phone Viruses & Security
Cell Phone Viruses & SecurityCell Phone Viruses & Security
Cell Phone Viruses & Security
 
2010: Mobile Security - WHYMCA Developer Conference
2010: Mobile Security - WHYMCA Developer Conference2010: Mobile Security - WHYMCA Developer Conference
2010: Mobile Security - WHYMCA Developer Conference
 
cellphone virus and security
cellphone virus and securitycellphone virus and security
cellphone virus and security
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Report on Mobile security
Report  on Mobile securityReport  on Mobile security
Report on Mobile security
 
Information security
Information securityInformation security
Information security
 
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?Do New Mobile Devices in Enterprises Pose A Serious Security Threat?
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?
 
MIS (1).pptx
MIS (1).pptxMIS (1).pptx
MIS (1).pptx
 
Network Security for Employees
Network Security for Employees Network Security for Employees
Network Security for Employees
 
The Consumerisation of Corporate IT
The Consumerisation of Corporate ITThe Consumerisation of Corporate IT
The Consumerisation of Corporate IT
 

Kürzlich hochgeladen

BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptxBIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptxSayali Powar
 
Q-Factor General Quiz-7th April 2024, Quiz Club NITW
Q-Factor General Quiz-7th April 2024, Quiz Club NITWQ-Factor General Quiz-7th April 2024, Quiz Club NITW
Q-Factor General Quiz-7th April 2024, Quiz Club NITWQuiz Club NITW
 
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptx
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptxDIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptx
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptxMichelleTuguinay1
 
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...DhatriParmar
 
Textual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHSTextual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHSMae Pangan
 
Scientific Writing :Research Discourse
Scientific  Writing :Research  DiscourseScientific  Writing :Research  Discourse
Scientific Writing :Research DiscourseAnita GoswamiGiri
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfVanessa Camilleri
 
How to Make a Duplicate of Your Odoo 17 Database
How to Make a Duplicate of Your Odoo 17 DatabaseHow to Make a Duplicate of Your Odoo 17 Database
How to Make a Duplicate of Your Odoo 17 DatabaseCeline George
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxHumphrey A Beña
 
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptxDecoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptxDhatriParmar
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management systemChristalin Nelson
 
Measures of Position DECILES for ungrouped data
Measures of Position DECILES for ungrouped dataMeasures of Position DECILES for ungrouped data
Measures of Position DECILES for ungrouped dataBabyAnnMotar
 
week 1 cookery 8 fourth - quarter .pptx
week 1 cookery 8  fourth  -  quarter .pptxweek 1 cookery 8  fourth  -  quarter .pptx
week 1 cookery 8 fourth - quarter .pptxJonalynLegaspi2
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfJemuel Francisco
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptxmary850239
 
Mythology Quiz-4th April 2024, Quiz Club NITW
Mythology Quiz-4th April 2024, Quiz Club NITWMythology Quiz-4th April 2024, Quiz Club NITW
Mythology Quiz-4th April 2024, Quiz Club NITWQuiz Club NITW
 
ROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxVanesaIglesias10
 

Kürzlich hochgeladen (20)

BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptxBIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
 
Q-Factor General Quiz-7th April 2024, Quiz Club NITW
Q-Factor General Quiz-7th April 2024, Quiz Club NITWQ-Factor General Quiz-7th April 2024, Quiz Club NITW
Q-Factor General Quiz-7th April 2024, Quiz Club NITW
 
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptx
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptxDIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptx
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptx
 
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
 
Textual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHSTextual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHS
 
Scientific Writing :Research Discourse
Scientific  Writing :Research  DiscourseScientific  Writing :Research  Discourse
Scientific Writing :Research Discourse
 
prashanth updated resume 2024 for Teaching Profession
prashanth updated resume 2024 for Teaching Professionprashanth updated resume 2024 for Teaching Profession
prashanth updated resume 2024 for Teaching Profession
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdf
 
How to Make a Duplicate of Your Odoo 17 Database
How to Make a Duplicate of Your Odoo 17 DatabaseHow to Make a Duplicate of Your Odoo 17 Database
How to Make a Duplicate of Your Odoo 17 Database
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
 
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptxDecoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management system
 
INCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptx
INCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptxINCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptx
INCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptx
 
Measures of Position DECILES for ungrouped data
Measures of Position DECILES for ungrouped dataMeasures of Position DECILES for ungrouped data
Measures of Position DECILES for ungrouped data
 
Faculty Profile prashantha K EEE dept Sri Sairam college of Engineering
Faculty Profile prashantha K EEE dept Sri Sairam college of EngineeringFaculty Profile prashantha K EEE dept Sri Sairam college of Engineering
Faculty Profile prashantha K EEE dept Sri Sairam college of Engineering
 
week 1 cookery 8 fourth - quarter .pptx
week 1 cookery 8  fourth  -  quarter .pptxweek 1 cookery 8  fourth  -  quarter .pptx
week 1 cookery 8 fourth - quarter .pptx
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx
 
Mythology Quiz-4th April 2024, Quiz Club NITW
Mythology Quiz-4th April 2024, Quiz Club NITWMythology Quiz-4th April 2024, Quiz Club NITW
Mythology Quiz-4th April 2024, Quiz Club NITW
 
ROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptx
 

Wireless and mobile security

  • 1. Wireless and Mobile Security Null-The open Security Community Pushkar
  • 2. News… Varanasi Bomb Blast Mail sent through hacked WiFiof a DJ in NaviMumbai. Out of 2300 connections only 16% are secured in Pune City – Cyber Crime Cell, Pune. Police making it compulsory to secure wifi. Geimini Trojan attacks Android users on New Year.
  • 5. Attacks… Identity Theft – Hacking a wireless network and using it. Use it for fun. Use it for free. Use it for crime. MITM – Sniff the users information. Corporate espionage. Sniff passwords DoS– Interrupt work.
  • 6. Wireless Security Measures… No Security   WEP – Wireless Equivalent Protocol Simple Low level Security 40 bit shared key used. only ensured the data received is the same or not. can be easily cracked now.
  • 7. Wireless Security measures contd… WPA – Wi-Fi Protected Access. 128bit, TKIP – Dynamically offering keys for connection. Encrypted using Michael Algorithm. WPA2 – 128bit, AES encryption algorithm. More reliable and most widely used.
  • 8. Mobiles – Smartphones… The next generation technology. Compact and efficient devices. A practical and cost-effective alternative to laptops. Need of the hour. Work on Move.
  • 9. Who are the users … You, me and all, Corporate Directors, Managers, Executives, Salesman, Suppliers, Contractors, Government Officials College Students,
  • 10. Affecting factors… Mobile Communication Capabilities : Cellular – MITM in voice transmission, with using less secured protocols or encrypting/decrypting techniques. WiFi-MITM Blutooth /Infrared - Personal Area Network SMS—Scripts to send spam sms from the device, inject malware on the phones. Corporate Firewall, Inside the firewall, Access to all the data on network, Outside the firewall Data is in the air,
  • 11. Threats… Physical : Device theft, loss of device Misuse by trusted people (colleagues, friends, family) Malwares: Mobile Malwares-new and emerging threat Infection vectors are more. Eg., Mabir/Cabir virus: can infect Symbian OS via Bluetooth or SMS. Dampigtrojan: corrupts the system’s uninstallation settings.
  • 12. Threats contd… Mobile App Downloads : Free nature of apps, “Jail-breaking” – process which allows users to installed pirated or unchecked applications. Application Isolation. Secure Data Storage: Password protection, mobile number fixed for each device, auto mounting disable. Strong Authentication with poor keyboards. Secure Operating Systems
  • 13. Platforms… Android Operating System : OS by google, open source. Used by many mobile device producing companies. iOS : Apple OS. Used in iPhones, iPads Windows Mobile OS /Windows Phone 7 : Mobile OS from Microsoft. Symbian OS /Symbian^3 : Used in Nokia devices.
  • 14. Security Measures… Platform-Centric Security : Protecting the device/network instead of data. Data-Centric Security : Protecting Data instead of devices/networks. Components in mobile security : Authentication and Authorization : Firewall Security : Over-the-air security : Offline security :
  • 15. Security Measures Authentication and Authorization : Authorize the device use as well as the application use by proper authentication. Firewall Security : Include and register mobile devices with company firewalls. Only give access to registered users. Over-the-air security : Encrypt the data when sent onto public mobile networks. Offline security : Prevent mobile device to reach in the wrong hands.
  • 16. Security Measures … Security over PAN : Security for Bluetooth /Infrared data transmission. Security over mobile Malwares : Install trusted anti-virus scanners in mobiles.
  • 18. Conclusion … Work while on move with CAUTION …

Hinweis der Redaktion

  1. Wired Equivalent Protocol