SlideShare ist ein Scribd-Unternehmen logo
1 von 35
BYOD AND MOBILE SECURITY
Sina Manavi 13Feb 2014
ABOUT ME

My name is Sina Manavi ,
Master of Computer Security and Digital Forensics
CEH and CHFI Certificate Holder
Contact : Manavi.Sina@gmail.com
AGENDA

•
•
•
•
•
•
•
1.
2.
3.
4.

What are mobile devices?
Mobile device threads
BYOD
BYOD Pros and Cons
4 Steps to design BYOD:
BYOD Strategy
Mobile Hacking techniques demo:
Android Phone
Mobile Application Security
Laptop
Pendrives

• BYOD or BYOA
• How to Secure the data storages and
transportation
WHAT ARE MOBILE DEVICES?
THREATS

•
•
•
•
•
•
•
•
•

Unauthorized Access
Infected Machine
Unreliable Application
Camera ? !
Media Storages
Mobile Phones
Internet Surfing
Network Access
Cloud ?

•
•
•
•

Malware
Synchronization
Phishing or SMiShing
Malicious Links or Websites
BYOD?!!!

Using the personally owned mobile devices such as smart
phones, IPad, Tablets , laptop, thumb drives to access organization network
and corporate data such as databases, organizational software, emails…etc.
BYOD PROS

• Cost effective:
•

No need to buy lots of PC, Tablets

• Technology familiarity:
•

Apple users are more comfortable with apples likewise windows user are more likely to use
windows applications

•

Flexibility:

•

Employees don’t need to carry both their personal devices and their work needs, they can work
whenever wherever they need while they have access to all data needed
BYOD CONS

Cost for employee:
• Not everybody has such devices,
• Increase usage and transportation may lead to quicker depreciation
• Repairing, upgrading or any possible accident would be under employee responsibility
which is not very pleasant
BYOD CONS

Different devices:
different OS, application and quality level, which brings difficulties in managing them.

Security:
Normally companies spend a lot amount of money to buy firewalls, Anti-viruses, original
application which as yearly supports and maintenance. Which employees cant afford such
prices himself
BYOD CONS (CONT…)

Security:
while PODs contain corporate data, it can bring security risk of data leackage
Privacy issue for employee, PODs should be accessible on demand for the organization
whenever they need to investigate, they might not be happy to surf internet or perform
their routine daily life with that device (e.g instant messaging, calls, social networking, web
browsing ,personal images….)

• What happens if an employee leave?!!!!!!!!!!
ICT AND POD

• Information and Communication Techonology devices ( Owned by
Organization) (ICT)
• Personally Owned Device (POD)
4 STEPS TO DESIGN BYOD

1.
2.
3.
4.

Know your businesses and regulatory
Creating a protocol Foundation
Legal Right and responsibility
Security Concerns
STEP 1: KNOW YOUR BUSINESSES
AND REGULATORY

•
•
•
•
•

What does the company seek to gain from BYOD?
What unique divisions does the organization have?
What information and applications need to be accessed by each division?
What level of security will be applied to this information?
What are the data-usage requirements for each division?
STEP 2: CREATING A PROTOCOL
FOUNDATION

Sourcing: Where did the device or softwares come from? Was it a preferred
vendor or some random source?
Supporting devices: what if one individual employee uses very unknown device
?should the IT team be able to support all type of devices and vendors ?
Bandwidth: allocating bandwidth to employees based on their activity and
requirement related to his responsibility at work. (high speed bandwidth for
downloading?)
Business support vs. personal support: supporting all type of application although
they are not related to organization routines? For financial department is it
necessary to support Photoshop or 3D MAX? or Does multimedia design team
need to support specific hardware?
Device Lost: what strategy do you need for a lost device? Wiping the device
remotely? Detach it from network or known devices?
STEP 3: LEGAL RIGHT AND
RESPONSIBILITY

• Responsibility
The BYOD policy should determine who is responsible to protect data on the device?

• Privacy:
How much access can organization have to the private files of the employees

• Regulation and rights
Different countries and companies have their own regulation and rights
STEP 4: SECURITY CONCERNS

• Device:
what kind of device , OS and hardware is accessible for organization.

• Security:
In what level security and risk are needed for each device and employee.

• Application management:
What application can be installed on the device, and assign proper level of
control based on the employee requirement to perform her job

• Data access
Data access should be allocated based in a proper way, no need to give access
of financial or human resource department to nonrelated departments.
BYOD POLICY

• Individual user can only use the POD, if it has configuration and software
installed with the right privilege, otherwise they just can use guest internet
or network which has no access to the corporation network.
• Each POD has to have specific registered digital certificate, and it
shouldn’t be copy from one POD to another POD, although devices
blonge to one person
BYOD STRATEGY

• POD should be utilized with appropriate for of userID, Passwords and
authentication devices.
• Organization has the right to investigate and control its information and
device functionality, backup, retrieve, modify and deleting the corporation
data , without permission of owner or user POD
BYOD STRATEGY

• All PODs should have proper Antivirus according to the Administrator
management policy
• Synchronize the created or modified valuable corporate data on the
POD using corporate network or using secure removable media
• All the data should be transfer through the network or media storages in
encrypted form for instance :
 Network (SSl or VPN)


Storage Media ( using like TrueCrypt)
BYOD STRATEGY

As organization may need to investigate the POD on demand based on the
reasonable expectation, the possibility of gaining access to the personal data is
high, users should be advice to store their private data in different directory
with a clear name such as “private” or “personal”
BYOD STRATEGY

Before any video/audio recording inside organization should be confirmed
with management Installing application on PODs should be under control of
the management (such as Email Client, social networks, web browser…etc.)
Employees and administrators should be educated and aware of risks and
vulnerabilities of the PODs
BYOD STRATEGY

Data that are not allowed to be stored, process, create on PODs:
• Classified secret files or above
• Highly valuable or sensitive information
• Big data such as 1Gb of corporate data on POD
BYOD STRATEGY

These strategies and policy may be different in different organization due to
organization nature and functionality
BYOD SECURITY PLAN STEPS

1- Identify the risk elements that BYOD introduces with a research group
2- Decide how to enforce policies for devices connecting to your network
3- Build a project plan to include these capabilities:
 Remote device management
 Application control

 Policy compliance and audit reports
 Data and device encryption
 Augmenting cloud storage security
 Wiping devices when retired
 Revoking access to devices when end-user relationship changes from employee to guest
 Revoking access to devices when employees are terminated by the company
BYOD SECURITY PLAN STEPS

4- Evaluation
 from each department chose number of users to see the feedbacks
MOBILE HACKING DEVICE HACKING
TECHNIQUES DEMO: LAPTOP

•
•
•
•

Using hacking tools such Cain and Able
Wireshark for network sniffing
Bruteforce tools for password cracking
Sql injection or cookie injector tools for compromising the organization
database or website authentication.
• Virtualization application for Anti-Forensics activity

• Demo Now 
MOBILE HACKING DEVICE HACKING
TECHNIQUES DEMO: MEDIA STORAGE

• Using personal data storage for backuping or running personal application
or data
• Running USB live tools such as Backtrack , Helix, or
• Live CD/DVD OS which has illegal tools such as Dropbox, google
Drive,….for accessing the or stealing data.
• Usually USB or live CD/DVD tools can be utilized for Anti-Forensics
activity
• Personal VPN to hide their activity

• Demo …… now 
BYOD OR BYOA

• Bring Your Own Device = Bring Your Own Application
• Downloading unknown applications or downloading application from
untrusted appstores such as cracked tools can brings malwares as a gift to
the organization.
• Employees show be limited in downloading application which is beyond
the BYOD policy list
• Mobile phones should not be rooted or jailbreak
• Application should be download from trusted app markets such as
official Apple app-store or google Play or Microsoft app-store.
HOW TO SECURE DATA ON BYOD

• all the data storages must encrypt corporate data
• Just legitimate user can leave organization with corporation data
• All data transfer through network should be encrypted via SSL or VPN
which belongs to organization
MOBILE APPLICATION SECURITY
MOBILE HACKING DEVICE HACKING
TECHNIQUES DEMO: ANDROID PHONE

• Network Spoofer / Dsicovery
[Need root access]
• Shark for root ( like Wireshark on PC) [Need root access]

•
•
•
•
•
•
•

TcpDump
Ettercap
dSploit
dDoS tool for Mobile Devices
Bluetooth Cloning
DroidShip
etc
ANDROID HACKING

Demo stealing file from android phone…
NOW MY QUESTION?

Whats your opinion about BYOD?
• Do you think BYOD increase the IT and security cost
• Brings more risk to organization
• Data leakage
• Data lost
• Stealing data
ANY QUESTION?
Thanks for your attention

If you have any Question don’t hesitate to ask:

Manavi.Sina@gmail.com

Weitere ähnliche Inhalte

Was ist angesagt?

Mobile security in Cyber Security
Mobile security in Cyber SecurityMobile security in Cyber Security
Mobile security in Cyber SecurityGeo Marian
 
Cyber Security Presentation "It Will Never Happen To Me"
Cyber Security Presentation "It Will Never Happen To Me" Cyber Security Presentation "It Will Never Happen To Me"
Cyber Security Presentation "It Will Never Happen To Me" Simon Salter
 
Cyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsCyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsKrishna Srikanth Manda
 
Cybercrime and Security
Cybercrime and SecurityCybercrime and Security
Cybercrime and SecurityNoushad Hasan
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx56ushodayareddy
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullyingAyanaRukasar
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber AwarenessCyber Security and Cyber Awareness
Cyber Security and Cyber AwarenessArjith K Raj
 
Cyber security & Data Protection
Cyber security & Data ProtectionCyber security & Data Protection
Cyber security & Data ProtectionDr. Hemant Kumar Singh
 
wifi
wifiwifi
wifiAmmar WK
 
Cyber security government ppt By Vishwadeep Badgujar
Cyber security government  ppt By Vishwadeep BadgujarCyber security government  ppt By Vishwadeep Badgujar
Cyber security government ppt By Vishwadeep BadgujarVishwadeep Badgujar
 

Was ist angesagt? (20)

Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Mobile security in Cyber Security
Mobile security in Cyber SecurityMobile security in Cyber Security
Mobile security in Cyber Security
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Cyber Security Presentation "It Will Never Happen To Me"
Cyber Security Presentation "It Will Never Happen To Me" Cyber Security Presentation "It Will Never Happen To Me"
Cyber Security Presentation "It Will Never Happen To Me"
 
Cyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsCyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionals
 
Ppt
PptPpt
Ppt
 
cyber stalking
cyber stalking cyber stalking
cyber stalking
 
Digital copyright
Digital copyrightDigital copyright
Digital copyright
 
Cybercrime and Security
Cybercrime and SecurityCybercrime and Security
Cybercrime and Security
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
cyber security
cyber securitycyber security
cyber security
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber AwarenessCyber Security and Cyber Awareness
Cyber Security and Cyber Awareness
 
Cyber security & Data Protection
Cyber security & Data ProtectionCyber security & Data Protection
Cyber security & Data Protection
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
wifi
wifiwifi
wifi
 
Cyber security government ppt By Vishwadeep Badgujar
Cyber security government  ppt By Vishwadeep BadgujarCyber security government  ppt By Vishwadeep Badgujar
Cyber security government ppt By Vishwadeep Badgujar
 

Andere mochten auch

BYOD Presentation for 2015 Year
BYOD Presentation for 2015 YearBYOD Presentation for 2015 Year
BYOD Presentation for 2015 YearSunnyhillsSchool
 
BYOD: Implementation and Security Issues
BYOD: Implementation and Security IssuesBYOD: Implementation and Security Issues
BYOD: Implementation and Security IssuesHarsh Kishore Mishra
 
Track Goods Transportation
Track Goods TransportationTrack Goods Transportation
Track Goods Transportationsmrosell
 
Mobile Devices & BYOD Security – Deployment & Best Practices
Mobile Devices & BYOD Security – Deployment & Best PracticesMobile Devices & BYOD Security – Deployment & Best Practices
Mobile Devices & BYOD Security – Deployment & Best PracticesCisco Canada
 
An Insight to the World of Wearable Computing
An Insight to the World of Wearable ComputingAn Insight to the World of Wearable Computing
An Insight to the World of Wearable ComputingFAIZAL T H
 
TRB 2011 - Evaluating the Effectiveness of the Travel Assistance Device
TRB 2011 - Evaluating the Effectiveness of the Travel Assistance DeviceTRB 2011 - Evaluating the Effectiveness of the Travel Assistance Device
TRB 2011 - Evaluating the Effectiveness of the Travel Assistance DeviceSean Barbeau
 
Internet of Things - Technological Perspective
Internet of Things - Technological PerspectiveInternet of Things - Technological Perspective
Internet of Things - Technological PerspectiveAndri Yadi
 
Sensors for Biometry and Recognition - 2016 Report by Yole Developpement
Sensors for Biometry and Recognition - 2016 Report by Yole DeveloppementSensors for Biometry and Recognition - 2016 Report by Yole Developpement
Sensors for Biometry and Recognition - 2016 Report by Yole DeveloppementYole Developpement
 
Wearable Biosensors Presentation
Wearable Biosensors PresentationWearable Biosensors Presentation
Wearable Biosensors Presentationraj7
 
Sensors for Wearable Electronics & Mobile Healthcare 2015 Report by Yole Deve...
Sensors for Wearable Electronics & Mobile Healthcare 2015 Report by Yole Deve...Sensors for Wearable Electronics & Mobile Healthcare 2015 Report by Yole Deve...
Sensors for Wearable Electronics & Mobile Healthcare 2015 Report by Yole Deve...Yole Developpement
 
Imaging Technologies for Automotive 2016 Report by Yole Developpement
Imaging Technologies for Automotive 2016 Report by Yole Developpement	Imaging Technologies for Automotive 2016 Report by Yole Developpement
Imaging Technologies for Automotive 2016 Report by Yole Developpement Yole Developpement
 

Andere mochten auch (20)

BYOD Presentation for 2015 Year
BYOD Presentation for 2015 YearBYOD Presentation for 2015 Year
BYOD Presentation for 2015 Year
 
BYOD: Implementation and Security Issues
BYOD: Implementation and Security IssuesBYOD: Implementation and Security Issues
BYOD: Implementation and Security Issues
 
Track Goods Transportation
Track Goods TransportationTrack Goods Transportation
Track Goods Transportation
 
Mobile Devices & BYOD Security – Deployment & Best Practices
Mobile Devices & BYOD Security – Deployment & Best PracticesMobile Devices & BYOD Security – Deployment & Best Practices
Mobile Devices & BYOD Security – Deployment & Best Practices
 
Wearable Computing
Wearable ComputingWearable Computing
Wearable Computing
 
Bring Your Own Device
Bring Your Own Device Bring Your Own Device
Bring Your Own Device
 
An Insight to the World of Wearable Computing
An Insight to the World of Wearable ComputingAn Insight to the World of Wearable Computing
An Insight to the World of Wearable Computing
 
Clothing for Biosensing
Clothing for BiosensingClothing for Biosensing
Clothing for Biosensing
 
TRB 2011 - Evaluating the Effectiveness of the Travel Assistance Device
TRB 2011 - Evaluating the Effectiveness of the Travel Assistance DeviceTRB 2011 - Evaluating the Effectiveness of the Travel Assistance Device
TRB 2011 - Evaluating the Effectiveness of the Travel Assistance Device
 
Wearable computing
Wearable computingWearable computing
Wearable computing
 
Internet of Things - Technological Perspective
Internet of Things - Technological PerspectiveInternet of Things - Technological Perspective
Internet of Things - Technological Perspective
 
Bio Sensor
Bio SensorBio Sensor
Bio Sensor
 
Human cloning
Human cloningHuman cloning
Human cloning
 
Sensors for Biometry and Recognition - 2016 Report by Yole Developpement
Sensors for Biometry and Recognition - 2016 Report by Yole DeveloppementSensors for Biometry and Recognition - 2016 Report by Yole Developpement
Sensors for Biometry and Recognition - 2016 Report by Yole Developpement
 
WEARABLE BIOSENSORS
WEARABLE BIOSENSORSWEARABLE BIOSENSORS
WEARABLE BIOSENSORS
 
Wearable Biosensors Presentation
Wearable Biosensors PresentationWearable Biosensors Presentation
Wearable Biosensors Presentation
 
Human Cloning
Human CloningHuman Cloning
Human Cloning
 
Sensors for Wearable Electronics & Mobile Healthcare 2015 Report by Yole Deve...
Sensors for Wearable Electronics & Mobile Healthcare 2015 Report by Yole Deve...Sensors for Wearable Electronics & Mobile Healthcare 2015 Report by Yole Deve...
Sensors for Wearable Electronics & Mobile Healthcare 2015 Report by Yole Deve...
 
Biosensor ppt
Biosensor pptBiosensor ppt
Biosensor ppt
 
Imaging Technologies for Automotive 2016 Report by Yole Developpement
Imaging Technologies for Automotive 2016 Report by Yole Developpement	Imaging Technologies for Automotive 2016 Report by Yole Developpement
Imaging Technologies for Automotive 2016 Report by Yole Developpement
 

Ähnlich wie BYOD and Mobile Security

BYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, WestBYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, WestJay McLaughlin
 
Exploring byod approaches for mobile learning
Exploring byod approaches for mobile learningExploring byod approaches for mobile learning
Exploring byod approaches for mobile learningDebbie Richards
 
Outside the Office: Mobile Security
Outside the Office: Mobile SecurityOutside the Office: Mobile Security
Outside the Office: Mobile SecurityMcKonly & Asbury, LLP
 
Preparing for Mobile Device Management & Bring your Own Device
Preparing for Mobile Device Management & Bring your Own DevicePreparing for Mobile Device Management & Bring your Own Device
Preparing for Mobile Device Management & Bring your Own DeviceWaterstons Ltd
 
Security Testing for IoT Systems
Security Testing for IoT SystemsSecurity Testing for IoT Systems
Security Testing for IoT SystemsSecurity Innovation
 
Securing your digital world - Cybersecurity for SBEs
Securing your digital world - Cybersecurity for SBEsSecuring your digital world - Cybersecurity for SBEs
Securing your digital world - Cybersecurity for SBEsSonny Hashmi
 
Securing your digital world cybersecurity for sb es
Securing your digital world   cybersecurity for sb esSecuring your digital world   cybersecurity for sb es
Securing your digital world cybersecurity for sb esSonny Hashmi
 
Ten Commandments of BYOD
Ten Commandments of BYODTen Commandments of BYOD
Ten Commandments of BYODK Singh
 
Ch15 power point
Ch15 power pointCh15 power point
Ch15 power pointbodo-con
 
IoT Security: Debunking the "We Aren't THAT Connected" Myth
IoT Security: Debunking the "We Aren't THAT Connected" MythIoT Security: Debunking the "We Aren't THAT Connected" Myth
IoT Security: Debunking the "We Aren't THAT Connected" MythSecurity Innovation
 
Top 5 Cloud Security Threats in Healthcare
Top 5 Cloud Security Threats in HealthcareTop 5 Cloud Security Threats in Healthcare
Top 5 Cloud Security Threats in HealthcareBitglass
 
Secure Android Mobile Device: SOTI MobiControl and Android Plus technology
Secure Android Mobile Device: SOTI MobiControl and Android Plus technology Secure Android Mobile Device: SOTI MobiControl and Android Plus technology
Secure Android Mobile Device: SOTI MobiControl and Android Plus technology MobileWorxs
 
Pete Wassell (Augmate Corportation) Security in the Enterprise Smart Glasses
Pete Wassell (Augmate Corportation) Security in the Enterprise Smart GlassesPete Wassell (Augmate Corportation) Security in the Enterprise Smart Glasses
Pete Wassell (Augmate Corportation) Security in the Enterprise Smart GlassesAugmentedWorldExpo
 
Byod security
Byod security Byod security
Byod security Denise Bailey
 
The Accidental Cloud: Privacy and Security Issues in a BYOD World
The Accidental Cloud: Privacy and Security Issues in a BYOD WorldThe Accidental Cloud: Privacy and Security Issues in a BYOD World
The Accidental Cloud: Privacy and Security Issues in a BYOD Worldmkeane
 
Team black
Team blackTeam black
Team blackhetvi naik
 
Chapter 13
Chapter 13Chapter 13
Chapter 13bodo-con
 
Mitigating the Top 5 Cloud Security Threats
Mitigating the Top 5 Cloud Security ThreatsMitigating the Top 5 Cloud Security Threats
Mitigating the Top 5 Cloud Security ThreatsBitglass
 
Smarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst ServicesSmarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst ServicesChris Pepin
 

Ähnlich wie BYOD and Mobile Security (20)

BYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, WestBYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, West
 
Exploring byod approaches for mobile learning
Exploring byod approaches for mobile learningExploring byod approaches for mobile learning
Exploring byod approaches for mobile learning
 
Outside the Office: Mobile Security
Outside the Office: Mobile SecurityOutside the Office: Mobile Security
Outside the Office: Mobile Security
 
Preparing for Mobile Device Management & Bring your Own Device
Preparing for Mobile Device Management & Bring your Own DevicePreparing for Mobile Device Management & Bring your Own Device
Preparing for Mobile Device Management & Bring your Own Device
 
Security Testing for IoT Systems
Security Testing for IoT SystemsSecurity Testing for IoT Systems
Security Testing for IoT Systems
 
Securing your digital world - Cybersecurity for SBEs
Securing your digital world - Cybersecurity for SBEsSecuring your digital world - Cybersecurity for SBEs
Securing your digital world - Cybersecurity for SBEs
 
Securing your digital world cybersecurity for sb es
Securing your digital world   cybersecurity for sb esSecuring your digital world   cybersecurity for sb es
Securing your digital world cybersecurity for sb es
 
Ten Commandments of BYOD
Ten Commandments of BYODTen Commandments of BYOD
Ten Commandments of BYOD
 
Ch15 power point
Ch15 power pointCh15 power point
Ch15 power point
 
Byod
ByodByod
Byod
 
IoT Security: Debunking the "We Aren't THAT Connected" Myth
IoT Security: Debunking the "We Aren't THAT Connected" MythIoT Security: Debunking the "We Aren't THAT Connected" Myth
IoT Security: Debunking the "We Aren't THAT Connected" Myth
 
Top 5 Cloud Security Threats in Healthcare
Top 5 Cloud Security Threats in HealthcareTop 5 Cloud Security Threats in Healthcare
Top 5 Cloud Security Threats in Healthcare
 
Secure Android Mobile Device: SOTI MobiControl and Android Plus technology
Secure Android Mobile Device: SOTI MobiControl and Android Plus technology Secure Android Mobile Device: SOTI MobiControl and Android Plus technology
Secure Android Mobile Device: SOTI MobiControl and Android Plus technology
 
Pete Wassell (Augmate Corportation) Security in the Enterprise Smart Glasses
Pete Wassell (Augmate Corportation) Security in the Enterprise Smart GlassesPete Wassell (Augmate Corportation) Security in the Enterprise Smart Glasses
Pete Wassell (Augmate Corportation) Security in the Enterprise Smart Glasses
 
Byod security
Byod security Byod security
Byod security
 
The Accidental Cloud: Privacy and Security Issues in a BYOD World
The Accidental Cloud: Privacy and Security Issues in a BYOD WorldThe Accidental Cloud: Privacy and Security Issues in a BYOD World
The Accidental Cloud: Privacy and Security Issues in a BYOD World
 
Team black
Team blackTeam black
Team black
 
Chapter 13
Chapter 13Chapter 13
Chapter 13
 
Mitigating the Top 5 Cloud Security Threats
Mitigating the Top 5 Cloud Security ThreatsMitigating the Top 5 Cloud Security Threats
Mitigating the Top 5 Cloud Security Threats
 
Smarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst ServicesSmarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst Services
 

Mehr von Sina Manavi

Android Application Security Awareness Talk, OWASP MEETUP Q3, 2015
Android Application Security Awareness Talk, OWASP MEETUP Q3, 2015Android Application Security Awareness Talk, OWASP MEETUP Q3, 2015
Android Application Security Awareness Talk, OWASP MEETUP Q3, 2015Sina Manavi
 
EC-Council Hackway Workshop Presentation- Social Media Forensics
EC-Council Hackway Workshop Presentation- Social Media ForensicsEC-Council Hackway Workshop Presentation- Social Media Forensics
EC-Council Hackway Workshop Presentation- Social Media ForensicsSina Manavi
 
Password Attack
Password Attack Password Attack
Password Attack Sina Manavi
 
Android Hacking + Pentesting
Android Hacking + Pentesting Android Hacking + Pentesting
Android Hacking + Pentesting Sina Manavi
 
Password Cracking
Password Cracking Password Cracking
Password Cracking Sina Manavi
 
A Brief Introduction in SQL Injection
A Brief Introduction in SQL InjectionA Brief Introduction in SQL Injection
A Brief Introduction in SQL InjectionSina Manavi
 
Aes (advance encryption standard)
Aes (advance encryption standard) Aes (advance encryption standard)
Aes (advance encryption standard) Sina Manavi
 
Shannon and 5 good criteria of a good cipher
Shannon and 5 good criteria of a good cipher Shannon and 5 good criteria of a good cipher
Shannon and 5 good criteria of a good cipher Sina Manavi
 
Honeypot honeynet
Honeypot honeynetHoneypot honeynet
Honeypot honeynetSina Manavi
 
Mendeley resentation , Sina Manavi
Mendeley resentation  , Sina Manavi Mendeley resentation  , Sina Manavi
Mendeley resentation , Sina Manavi Sina Manavi
 

Mehr von Sina Manavi (10)

Android Application Security Awareness Talk, OWASP MEETUP Q3, 2015
Android Application Security Awareness Talk, OWASP MEETUP Q3, 2015Android Application Security Awareness Talk, OWASP MEETUP Q3, 2015
Android Application Security Awareness Talk, OWASP MEETUP Q3, 2015
 
EC-Council Hackway Workshop Presentation- Social Media Forensics
EC-Council Hackway Workshop Presentation- Social Media ForensicsEC-Council Hackway Workshop Presentation- Social Media Forensics
EC-Council Hackway Workshop Presentation- Social Media Forensics
 
Password Attack
Password Attack Password Attack
Password Attack
 
Android Hacking + Pentesting
Android Hacking + Pentesting Android Hacking + Pentesting
Android Hacking + Pentesting
 
Password Cracking
Password Cracking Password Cracking
Password Cracking
 
A Brief Introduction in SQL Injection
A Brief Introduction in SQL InjectionA Brief Introduction in SQL Injection
A Brief Introduction in SQL Injection
 
Aes (advance encryption standard)
Aes (advance encryption standard) Aes (advance encryption standard)
Aes (advance encryption standard)
 
Shannon and 5 good criteria of a good cipher
Shannon and 5 good criteria of a good cipher Shannon and 5 good criteria of a good cipher
Shannon and 5 good criteria of a good cipher
 
Honeypot honeynet
Honeypot honeynetHoneypot honeynet
Honeypot honeynet
 
Mendeley resentation , Sina Manavi
Mendeley resentation  , Sina Manavi Mendeley resentation  , Sina Manavi
Mendeley resentation , Sina Manavi
 

KĂźrzlich hochgeladen

Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel AraĂşjo
 

KĂźrzlich hochgeladen (20)

Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 

BYOD and Mobile Security

  • 1. BYOD AND MOBILE SECURITY Sina Manavi 13Feb 2014
  • 2. ABOUT ME My name is Sina Manavi , Master of Computer Security and Digital Forensics CEH and CHFI Certificate Holder Contact : Manavi.Sina@gmail.com
  • 3. AGENDA • • • • • • • 1. 2. 3. 4. What are mobile devices? Mobile device threads BYOD BYOD Pros and Cons 4 Steps to design BYOD: BYOD Strategy Mobile Hacking techniques demo: Android Phone Mobile Application Security Laptop Pendrives • BYOD or BYOA • How to Secure the data storages and transportation
  • 4. WHAT ARE MOBILE DEVICES?
  • 5. THREATS • • • • • • • • • Unauthorized Access Infected Machine Unreliable Application Camera ? ! Media Storages Mobile Phones Internet Surfing Network Access Cloud ? • • • • Malware Synchronization Phishing or SMiShing Malicious Links or Websites
  • 6. BYOD?!!! Using the personally owned mobile devices such as smart phones, IPad, Tablets , laptop, thumb drives to access organization network and corporate data such as databases, organizational software, emails…etc.
  • 7. BYOD PROS • Cost effective: • No need to buy lots of PC, Tablets • Technology familiarity: • Apple users are more comfortable with apples likewise windows user are more likely to use windows applications • Flexibility: • Employees don’t need to carry both their personal devices and their work needs, they can work whenever wherever they need while they have access to all data needed
  • 8. BYOD CONS Cost for employee: • Not everybody has such devices, • Increase usage and transportation may lead to quicker depreciation • Repairing, upgrading or any possible accident would be under employee responsibility which is not very pleasant
  • 9. BYOD CONS Different devices: different OS, application and quality level, which brings difficulties in managing them. Security: Normally companies spend a lot amount of money to buy firewalls, Anti-viruses, original application which as yearly supports and maintenance. Which employees cant afford such prices himself
  • 10. BYOD CONS (CONT…) Security: while PODs contain corporate data, it can bring security risk of data leackage Privacy issue for employee, PODs should be accessible on demand for the organization whenever they need to investigate, they might not be happy to surf internet or perform their routine daily life with that device (e.g instant messaging, calls, social networking, web browsing ,personal images….) • What happens if an employee leave?!!!!!!!!!!
  • 11. ICT AND POD • Information and Communication Techonology devices ( Owned by Organization) (ICT) • Personally Owned Device (POD)
  • 12. 4 STEPS TO DESIGN BYOD 1. 2. 3. 4. Know your businesses and regulatory Creating a protocol Foundation Legal Right and responsibility Security Concerns
  • 13. STEP 1: KNOW YOUR BUSINESSES AND REGULATORY • • • • • What does the company seek to gain from BYOD? What unique divisions does the organization have? What information and applications need to be accessed by each division? What level of security will be applied to this information? What are the data-usage requirements for each division?
  • 14. STEP 2: CREATING A PROTOCOL FOUNDATION Sourcing: Where did the device or softwares come from? Was it a preferred vendor or some random source? Supporting devices: what if one individual employee uses very unknown device ?should the IT team be able to support all type of devices and vendors ? Bandwidth: allocating bandwidth to employees based on their activity and requirement related to his responsibility at work. (high speed bandwidth for downloading?) Business support vs. personal support: supporting all type of application although they are not related to organization routines? For financial department is it necessary to support Photoshop or 3D MAX? or Does multimedia design team need to support specific hardware? Device Lost: what strategy do you need for a lost device? Wiping the device remotely? Detach it from network or known devices?
  • 15. STEP 3: LEGAL RIGHT AND RESPONSIBILITY • Responsibility The BYOD policy should determine who is responsible to protect data on the device? • Privacy: How much access can organization have to the private files of the employees • Regulation and rights Different countries and companies have their own regulation and rights
  • 16. STEP 4: SECURITY CONCERNS • Device: what kind of device , OS and hardware is accessible for organization. • Security: In what level security and risk are needed for each device and employee. • Application management: What application can be installed on the device, and assign proper level of control based on the employee requirement to perform her job • Data access Data access should be allocated based in a proper way, no need to give access of financial or human resource department to nonrelated departments.
  • 17. BYOD POLICY • Individual user can only use the POD, if it has configuration and software installed with the right privilege, otherwise they just can use guest internet or network which has no access to the corporation network. • Each POD has to have specific registered digital certificate, and it shouldn’t be copy from one POD to another POD, although devices blonge to one person
  • 18. BYOD STRATEGY • POD should be utilized with appropriate for of userID, Passwords and authentication devices. • Organization has the right to investigate and control its information and device functionality, backup, retrieve, modify and deleting the corporation data , without permission of owner or user POD
  • 19. BYOD STRATEGY • All PODs should have proper Antivirus according to the Administrator management policy • Synchronize the created or modified valuable corporate data on the POD using corporate network or using secure removable media • All the data should be transfer through the network or media storages in encrypted form for instance :  Network (SSl or VPN)  Storage Media ( using like TrueCrypt)
  • 20. BYOD STRATEGY As organization may need to investigate the POD on demand based on the reasonable expectation, the possibility of gaining access to the personal data is high, users should be advice to store their private data in different directory with a clear name such as “private” or “personal”
  • 21. BYOD STRATEGY Before any video/audio recording inside organization should be confirmed with management Installing application on PODs should be under control of the management (such as Email Client, social networks, web browser…etc.) Employees and administrators should be educated and aware of risks and vulnerabilities of the PODs
  • 22. BYOD STRATEGY Data that are not allowed to be stored, process, create on PODs: • Classified secret files or above • Highly valuable or sensitive information • Big data such as 1Gb of corporate data on POD
  • 23. BYOD STRATEGY These strategies and policy may be different in different organization due to organization nature and functionality
  • 24. BYOD SECURITY PLAN STEPS 1- Identify the risk elements that BYOD introduces with a research group 2- Decide how to enforce policies for devices connecting to your network 3- Build a project plan to include these capabilities:  Remote device management  Application control  Policy compliance and audit reports  Data and device encryption  Augmenting cloud storage security  Wiping devices when retired  Revoking access to devices when end-user relationship changes from employee to guest  Revoking access to devices when employees are terminated by the company
  • 25. BYOD SECURITY PLAN STEPS 4- Evaluation  from each department chose number of users to see the feedbacks
  • 26. MOBILE HACKING DEVICE HACKING TECHNIQUES DEMO: LAPTOP • • • • Using hacking tools such Cain and Able Wireshark for network sniffing Bruteforce tools for password cracking Sql injection or cookie injector tools for compromising the organization database or website authentication. • Virtualization application for Anti-Forensics activity • Demo Now 
  • 27. MOBILE HACKING DEVICE HACKING TECHNIQUES DEMO: MEDIA STORAGE • Using personal data storage for backuping or running personal application or data • Running USB live tools such as Backtrack , Helix, or • Live CD/DVD OS which has illegal tools such as Dropbox, google Drive,….for accessing the or stealing data. • Usually USB or live CD/DVD tools can be utilized for Anti-Forensics activity • Personal VPN to hide their activity • Demo …… now 
  • 28. BYOD OR BYOA • Bring Your Own Device = Bring Your Own Application • Downloading unknown applications or downloading application from untrusted appstores such as cracked tools can brings malwares as a gift to the organization. • Employees show be limited in downloading application which is beyond the BYOD policy list • Mobile phones should not be rooted or jailbreak • Application should be download from trusted app markets such as official Apple app-store or google Play or Microsoft app-store.
  • 29. HOW TO SECURE DATA ON BYOD • all the data storages must encrypt corporate data • Just legitimate user can leave organization with corporation data • All data transfer through network should be encrypted via SSL or VPN which belongs to organization
  • 31. MOBILE HACKING DEVICE HACKING TECHNIQUES DEMO: ANDROID PHONE • Network Spoofer / Dsicovery [Need root access] • Shark for root ( like Wireshark on PC) [Need root access] • • • • • • • TcpDump Ettercap dSploit dDoS tool for Mobile Devices Bluetooth Cloning DroidShip etc
  • 32. ANDROID HACKING Demo stealing file from android phone…
  • 33. NOW MY QUESTION? Whats your opinion about BYOD? • Do you think BYOD increase the IT and security cost • Brings more risk to organization • Data leakage • Data lost • Stealing data
  • 35. Thanks for your attention If you have any Question don’t hesitate to ask: Manavi.Sina@gmail.com

Hinweis der Redaktion

  1. Staff brings their Favorite device, complicate policy and data controlling in organizationAdvantage: happier user,Disadvantage: unknown device in network, data security, and ownership problem.
  2. http://www.youtube.com/watch?v=lzH7M9nkfhQ