4. danbelaprefum@gmail.com / danrichsoul@yahoo.com
Program
ABOUT UR PHONE
DO U KNOW ABOUT PHONE
NOTE
Network security consists of the policies and
practices adopted to prevent and monitor
unauthorized access, misuse, modification, or
denial of a computer network and network-
accessible resources. ... Networks can be private,
such as within a company, and others which might
be open to public access. There is no security for
any Phones including “i-phone”
5. danbelaprefum@gmail.com / danrichsoul@yahoo.com
Program
ABOUT UR PHONE
DO U KNOW ABOUT PHONE
HISTORY OF
MOBILE PHONES
covers mobile communication devices that connect wirelessly to
the public switched telephone network.
While the transmission of speech by radio has a long history, the
first devices that were wireless, mobile, and also capable of
connecting to the standard telephone network are much more
recent. The fit such devices were barely portable compared to
today's compact hand-held devices, and their use was clumsy.
Along with the process of developing a more portable technology,
and a better interconnections system, drastic changes have taken
place in both the networking of wireless communication and the
prevalence of its use, with smartphones.
6. danbelaprefum@gmail.com / danrichsoul@yahoo.com
Program
ABOUT UR PHONE
DO U KNOW ABOUT PHONE
GLOBAL SYSTEM
FOR MOBILE
The Global System for Mobile Communications (GSM)
is a standard developed by the European
Telecommunications Standards Institute (ETSI) to
describe the protocols for second-generation (2G)
digital cellular networks used by mobile devices such as
mobile phones and tablets. It was first deployed in Finland
in December 1991. By the mid-2010s, it became a global
standard for mobile communications achieving over 90%
market share, and operating in over 193 countries and
territories. (now in the 5G) discuss
8. danbelaprefum@gmail.com / danrichsoul@yahoo.com
Program
ABOUT UR PHONE
DO U KNOW ABOUT PHONE
SUBSCRIBER
IDENTITY MODULE
• Subscriber Identity Module (SIM CARD)
• A nano sim used in mobile phones
• One of the key features of GSM is the Subscriber Identity
Module, commonly known as a SIM card. The SIM is a
detachable smart card containing the user's subscription
information and phone book. This allows the user to retain
his or her information after switching handsets.
Alternatively, the user can change operators while
retaining the handset simply by changing the SIM. Some
operators will block this by allowing the phone to use only
a single SIM, or only a SIM issued by them; this practice is
known as SIM locking.
9. danbelaprefum@gmail.com / danrichsoul@yahoo.com
Program
ABOUT UR PHONE
DO U KNOW ABOUT PHONE
SUBSCRIBER
IDENTITY MODULE
A SIM card contains its unique serial number (ICCID),
international mobile subscriber identity (IMSI) number,
security authentication and ciphering information, temporary
information related to the local network, a list of the services
the user has access to, and two passwords: a personal
identification number (PIN) for ordinary use, and a personal
unblocking code (PUC) for PIN unlocking.
10. danbelaprefum@gmail.com / danrichsoul@yahoo.com
Program
ABOUT UR PHONE
DO U KNOW ABOUT PHONE
INTERNATIONAL
MOBILE EQUIPMENT
IDENTITY
IMEI is short for International Mobile Equipment Identity
and is a unique number given to every single mobile phone,
typically found behind the battery. IMEI numbers of
cellular phones connected to a GSM network are stored in
a database (EIR - Equipment Identity Register) containing
all valid mobile phone equipment.
11. danbelaprefum@gmail.com / danrichsoul@yahoo.com
Program
ABOUT UR PHONE
DO U KNOW ABOUT PHONE
MOBILE PHONE
SERVER
ARCHITECTURE
ATTACKS
UNSECURED WI-FI
SPOOFING
PHISHING
SPYWARE
BROKEN -
CRYPTOGRAPHY
IMPROPER SESSION -
HANDLING
PREVENTION
INSTALL FIREWALL
PASS CODE
SOFTWARE UPDATE
USE OFFICIAL APP -
STORE
13. danbelaprefum@gmail.com / danrichsoul@yahoo.com
Program
ABOUT UR PHONE
DO U KNOW ABOUT PHONE
MAC
ADDRESS
A media access control address (MAC address) is a unique identifier
assigned to a network interface controller (NIC) for use as a network
address in communications within a network segment. This use is
common in most IEEE 802 networking technologies, including Ethernet,
Wi-Fi, and Bluetooth. Within the Open Systems Interconnection (OSI)
network model, MAC addresses are used in the medium access control
protocol sub-layer of the data link layer. As typically represented, MAC
addresses are recognizable as six groups of two hexadecimal digits,
separated by hyphens, colons, or without a separator.
MAC addresses are primarily assigned by device manufacturers, and
are therefore often referred to as the burned-in address,
15. danbelaprefum@gmail.com / danrichsoul@yahoo.com
Program
ABOUT UR PHONE
DO U KNOW ABOUT PHONE
IP
ADDRESS
An Internet Protocol address (IP address) is a numerical label
assigned to each device connected to a computer network that
uses the Internet Protocol for communication.An IP address
serves two main functions: host or network interface
identification and location addressing.
Internet Protocol version 4 (IPv4) defines an IP address as a 32-bit
number. However, because of the growth of the Internet and the
depletion of available IPv4 addresses, a new version of IP (IPv6),
using 128 bits for the IP address, was standardized in 1998. IPv6
deployment has been ongoing since the mid-2000s.