SlideShare ist ein Scribd-Unternehmen logo
1 von 14
Mobile Security
Presented By
Himmat Purohit
Introduction
 This information is for people that have personal
smartphones
 For people that have company smartphones, contact your
companies mobile security policy
Mobile security
Why does a person need to
secure a smartphone?
 As cell phones are becoming more like pocket-sized
computers, they are also more vulnerable to different
forms of cyber attacks
 People want your data! This is a fact of life and it applies
to either if you have an Android, BlackBerry, or iPhone
smartphone
Password Protection
 By simply enabling a password or PIN number on a cell
phone, you can save yourself a tremendous amount of
hassle and headache because only you know that unique
password
 You may be able to set a security on the phone so that if
someone tries the wrong password a certain number of
times, the phone is automatically wiped
Anti-virus Software
 A person must treat a cell phone like they would a PC by
installing and keeping an up to date anti-virus software
 Lookout Mobile Security (Android)
 SmartGuard Mobile Security (BlackBerry)
 iPhones does not have an anti-virus software
 A security app safeguards your data, protect against
threats, and an up-to-date software protects the device
from new versions of viruses and new malware
Up-to-date operating system
 Smartphones need to be patched often to eliminate
vulnerabilities found since the phone was first
released
 Updates gets rid of security holes or vulnerabilities
by maintaining the software on both your PC and
your smartphone
Get apps from a trusted source
 There are plenty of apps out there, stick to apps from the
phones market
 Android Play Market
 BlackBerry App World
 iPhone App Market
 If you’re downloading an app from a third party, do your
research to make sure the app is reputable and will do
what you want that app to do
Wi-Fi Network
 Avoid shopping or banking on a public network
 Keep in mind that the open Wi-Fi network that your
phone is connected to might not be secure
 Limit your activity to browsing and avoid committing
any transaction that involves your account
information
 Also, be wary about people looking over your shoulder
and seeing your password, e-mails, texts, and account
information
Bluetooth devices
 Although many people think of bluetooth as a better
alternative to a physical wire, in fact it creates a personal
area network, and like any network, it will recognize
appropriate devices within its range
 A phone's bluetooth setting is on by default, so it needs
to be turned off, or configured for a specific device or
headset
Backup your data
 If your phone gets taken or the data gets deleted, it’s a
lot easier to get your information back when it’s backup
regularly
 It can mean the difference between a slight phone
setback or living through your own phone nightmare
Conclusion
 Doing these simple tips with help keep your phone
protected from vulnerabilities that might happen to you
 Password Protection
 Anti-virus Software
 Up-to-date operating system
 Get apps from a trusted source
 Wi-Fi Network
 Bluetooth devices
 Backup your data
Thank You

Weitere ähnliche Inhalte

Was ist angesagt?

Mobile security in Cyber Security
Mobile security in Cyber SecurityMobile security in Cyber Security
Mobile security in Cyber SecurityGeo Marian
 
Mobile protection
Mobile protection Mobile protection
Mobile protection preetpatel72
 
Mobile security
Mobile securityMobile security
Mobile securityMphasis
 
Wireless and mobile security
Wireless and mobile securityWireless and mobile security
Wireless and mobile securityPushkar Pashupat
 
Smartphone security
Smartphone  securitySmartphone  security
Smartphone securityManish Gupta
 
Mobile Device Security
Mobile Device SecurityMobile Device Security
Mobile Device SecurityNemwos
 
Mobile device security
Mobile device securityMobile device security
Mobile device securityLisa Herrera
 
Mobile Application Security
Mobile Application SecurityMobile Application Security
Mobile Application SecurityIshan Girdhar
 
Smart phone and mobile device security
Smart phone and mobile device securitySmart phone and mobile device security
Smart phone and mobile device securityCAS
 
Android Device Hardening
Android Device HardeningAndroid Device Hardening
Android Device Hardeninganupriti
 
Network security
Network securityNetwork security
Network securityfatimasaham
 
Threats of Public Wi-Fi
Threats of Public Wi-Fi Threats of Public Wi-Fi
Threats of Public Wi-Fi The TNS Group
 
Pegasus Spyware - What You Need to Know
Pegasus Spyware - What You Need to KnowPegasus Spyware - What You Need to Know
Pegasus Spyware - What You Need to KnowSkycure
 
Mobile device privacy and security
Mobile device privacy and securityMobile device privacy and security
Mobile device privacy and securityImran Khan
 
Network Security Presentation
Network Security PresentationNetwork Security Presentation
Network Security PresentationAllan Pratt MBA
 
Cell Phone Viruses & Security
Cell Phone Viruses & SecurityCell Phone Viruses & Security
Cell Phone Viruses & Securityguestc03f28
 

Was ist angesagt? (20)

Mobile security in Cyber Security
Mobile security in Cyber SecurityMobile security in Cyber Security
Mobile security in Cyber Security
 
Mobile protection
Mobile protection Mobile protection
Mobile protection
 
Ensuring Mobile Device Security
Ensuring Mobile Device SecurityEnsuring Mobile Device Security
Ensuring Mobile Device Security
 
Mobile security
Mobile securityMobile security
Mobile security
 
Wireless and mobile security
Wireless and mobile securityWireless and mobile security
Wireless and mobile security
 
Smartphone security
Smartphone  securitySmartphone  security
Smartphone security
 
Mobile Hacking
Mobile HackingMobile Hacking
Mobile Hacking
 
Mobile Device Security
Mobile Device SecurityMobile Device Security
Mobile Device Security
 
Mobile Security
Mobile SecurityMobile Security
Mobile Security
 
Mobile device security
Mobile device securityMobile device security
Mobile device security
 
Mobile Application Security
Mobile Application SecurityMobile Application Security
Mobile Application Security
 
Smart phone and mobile device security
Smart phone and mobile device securitySmart phone and mobile device security
Smart phone and mobile device security
 
Android Device Hardening
Android Device HardeningAndroid Device Hardening
Android Device Hardening
 
Network security
Network securityNetwork security
Network security
 
Threats of Public Wi-Fi
Threats of Public Wi-Fi Threats of Public Wi-Fi
Threats of Public Wi-Fi
 
Pegasus Spyware - What You Need to Know
Pegasus Spyware - What You Need to KnowPegasus Spyware - What You Need to Know
Pegasus Spyware - What You Need to Know
 
Juice Jacking
Juice Jacking Juice Jacking
Juice Jacking
 
Mobile device privacy and security
Mobile device privacy and securityMobile device privacy and security
Mobile device privacy and security
 
Network Security Presentation
Network Security PresentationNetwork Security Presentation
Network Security Presentation
 
Cell Phone Viruses & Security
Cell Phone Viruses & SecurityCell Phone Viruses & Security
Cell Phone Viruses & Security
 

Ähnlich wie Mobile security

Mobile Security
Mobile SecurityMobile Security
Mobile SecurityKevin Lee
 
How to Keep Your Phone Safe from Hackers (1).pptx
How to Keep Your Phone Safe from Hackers (1).pptxHow to Keep Your Phone Safe from Hackers (1).pptx
How to Keep Your Phone Safe from Hackers (1).pptx4Freedom Mobile
 
8 steps to smartphone security for android
8 steps to smartphone security for android8 steps to smartphone security for android
8 steps to smartphone security for androidiYogi
 
Tips of Mobile Application Security
Tips of Mobile Application SecurityTips of Mobile Application Security
Tips of Mobile Application SecurityMarie Weaver
 
Are Mobile Banking Apps Safe?
Are Mobile Banking Apps Safe?Are Mobile Banking Apps Safe?
Are Mobile Banking Apps Safe?VISTA InfoSec
 
Mobile security first round (1st rank)
Mobile security first round (1st rank)Mobile security first round (1st rank)
Mobile security first round (1st rank)Hîmãlåy Làdhä
 
Smartphone Security Guide: The Easiest Way to Keep Your Phone & Data Secure
Smartphone Security Guide: The Easiest Way to Keep Your Phone & Data SecureSmartphone Security Guide: The Easiest Way to Keep Your Phone & Data Secure
Smartphone Security Guide: The Easiest Way to Keep Your Phone & Data SecureHeimdal Security
 
Smartphone 7 aug14
Smartphone 7 aug14Smartphone 7 aug14
Smartphone 7 aug14Naval OPSEC
 
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?Do New Mobile Devices in Enterprises Pose A Serious Security Threat?
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?acijjournal
 
Running head mobile application security1mobile application se.docx
Running head mobile application security1mobile application se.docxRunning head mobile application security1mobile application se.docx
Running head mobile application security1mobile application se.docxtodd581
 
Running head mobile application security1mobile application se.docx
Running head mobile application security1mobile application se.docxRunning head mobile application security1mobile application se.docx
Running head mobile application security1mobile application se.docxglendar3
 
Article on Mobile Security
Article on Mobile SecurityArticle on Mobile Security
Article on Mobile SecurityTharaka Mahadewa
 
Safety of my biometric data
Safety of my biometric dataSafety of my biometric data
Safety of my biometric datanishiyath
 
Smartphone Security
Smartphone SecuritySmartphone Security
Smartphone SecurityMalasta Hill
 

Ähnlich wie Mobile security (20)

Mobile Security
Mobile SecurityMobile Security
Mobile Security
 
Smartphone Smart Card 061013
Smartphone Smart Card 061013Smartphone Smart Card 061013
Smartphone Smart Card 061013
 
How to Keep Your Phone Safe from Hackers (1).pptx
How to Keep Your Phone Safe from Hackers (1).pptxHow to Keep Your Phone Safe from Hackers (1).pptx
How to Keep Your Phone Safe from Hackers (1).pptx
 
8 steps to smartphone security for android
8 steps to smartphone security for android8 steps to smartphone security for android
8 steps to smartphone security for android
 
Tips of Mobile Application Security
Tips of Mobile Application SecurityTips of Mobile Application Security
Tips of Mobile Application Security
 
Are Mobile Banking Apps Safe?
Are Mobile Banking Apps Safe?Are Mobile Banking Apps Safe?
Are Mobile Banking Apps Safe?
 
Mobile security first round (1st rank)
Mobile security first round (1st rank)Mobile security first round (1st rank)
Mobile security first round (1st rank)
 
Mobile phone security
Mobile phone securityMobile phone security
Mobile phone security
 
Smartphone Security Guide: The Easiest Way to Keep Your Phone & Data Secure
Smartphone Security Guide: The Easiest Way to Keep Your Phone & Data SecureSmartphone Security Guide: The Easiest Way to Keep Your Phone & Data Secure
Smartphone Security Guide: The Easiest Way to Keep Your Phone & Data Secure
 
Smartphone Security Article
Smartphone Security ArticleSmartphone Security Article
Smartphone Security Article
 
Smartphone 7 aug14
Smartphone 7 aug14Smartphone 7 aug14
Smartphone 7 aug14
 
Mobile app security
Mobile app securityMobile app security
Mobile app security
 
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?Do New Mobile Devices in Enterprises Pose A Serious Security Threat?
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?
 
Running head mobile application security1mobile application se.docx
Running head mobile application security1mobile application se.docxRunning head mobile application security1mobile application se.docx
Running head mobile application security1mobile application se.docx
 
Running head mobile application security1mobile application se.docx
Running head mobile application security1mobile application se.docxRunning head mobile application security1mobile application se.docx
Running head mobile application security1mobile application se.docx
 
Smartphone apps
Smartphone appsSmartphone apps
Smartphone apps
 
Article on Mobile Security
Article on Mobile SecurityArticle on Mobile Security
Article on Mobile Security
 
Smartphones 2015
Smartphones 2015Smartphones 2015
Smartphones 2015
 
Safety of my biometric data
Safety of my biometric dataSafety of my biometric data
Safety of my biometric data
 
Smartphone Security
Smartphone SecuritySmartphone Security
Smartphone Security
 

Kürzlich hochgeladen

Powerful Love Spells in Arkansas, AR (310) 882-6330 Bring Back Lost Lover
Powerful Love Spells in Arkansas, AR (310) 882-6330 Bring Back Lost LoverPowerful Love Spells in Arkansas, AR (310) 882-6330 Bring Back Lost Lover
Powerful Love Spells in Arkansas, AR (310) 882-6330 Bring Back Lost LoverPsychicRuben LoveSpells
 
9892124323 | Book Call Girls in Juhu and escort services 24x7
9892124323 | Book Call Girls in Juhu and escort services 24x79892124323 | Book Call Girls in Juhu and escort services 24x7
9892124323 | Book Call Girls in Juhu and escort services 24x7Pooja Nehwal
 
BDSM⚡Call Girls in Sector 71 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 71 Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Sector 71 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 71 Noida Escorts >༒8448380779 Escort ServiceDelhi Call girls
 
CALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best Night Fun service
CALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best Night Fun serviceCALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best Night Fun service
CALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best Night Fun serviceanilsa9823
 
Call US Pooja 9892124323 ✓Call Girls In Mira Road ( Mumbai ) secure service,
Call US Pooja 9892124323 ✓Call Girls In Mira Road ( Mumbai ) secure service,Call US Pooja 9892124323 ✓Call Girls In Mira Road ( Mumbai ) secure service,
Call US Pooja 9892124323 ✓Call Girls In Mira Road ( Mumbai ) secure service,Pooja Nehwal
 
FULL ENJOY - 9999218229 Call Girls in {Mahipalpur}| Delhi NCR
FULL ENJOY - 9999218229 Call Girls in {Mahipalpur}| Delhi NCRFULL ENJOY - 9999218229 Call Girls in {Mahipalpur}| Delhi NCR
FULL ENJOY - 9999218229 Call Girls in {Mahipalpur}| Delhi NCRnishacall1
 
CALL ON ➥8923113531 🔝Call Girls Saharaganj Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Saharaganj Lucknow best sexual serviceCALL ON ➥8923113531 🔝Call Girls Saharaganj Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Saharaganj Lucknow best sexual serviceanilsa9823
 

Kürzlich hochgeladen (7)

Powerful Love Spells in Arkansas, AR (310) 882-6330 Bring Back Lost Lover
Powerful Love Spells in Arkansas, AR (310) 882-6330 Bring Back Lost LoverPowerful Love Spells in Arkansas, AR (310) 882-6330 Bring Back Lost Lover
Powerful Love Spells in Arkansas, AR (310) 882-6330 Bring Back Lost Lover
 
9892124323 | Book Call Girls in Juhu and escort services 24x7
9892124323 | Book Call Girls in Juhu and escort services 24x79892124323 | Book Call Girls in Juhu and escort services 24x7
9892124323 | Book Call Girls in Juhu and escort services 24x7
 
BDSM⚡Call Girls in Sector 71 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 71 Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Sector 71 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 71 Noida Escorts >༒8448380779 Escort Service
 
CALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best Night Fun service
CALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best Night Fun serviceCALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best Night Fun service
CALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best Night Fun service
 
Call US Pooja 9892124323 ✓Call Girls In Mira Road ( Mumbai ) secure service,
Call US Pooja 9892124323 ✓Call Girls In Mira Road ( Mumbai ) secure service,Call US Pooja 9892124323 ✓Call Girls In Mira Road ( Mumbai ) secure service,
Call US Pooja 9892124323 ✓Call Girls In Mira Road ( Mumbai ) secure service,
 
FULL ENJOY - 9999218229 Call Girls in {Mahipalpur}| Delhi NCR
FULL ENJOY - 9999218229 Call Girls in {Mahipalpur}| Delhi NCRFULL ENJOY - 9999218229 Call Girls in {Mahipalpur}| Delhi NCR
FULL ENJOY - 9999218229 Call Girls in {Mahipalpur}| Delhi NCR
 
CALL ON ➥8923113531 🔝Call Girls Saharaganj Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Saharaganj Lucknow best sexual serviceCALL ON ➥8923113531 🔝Call Girls Saharaganj Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Saharaganj Lucknow best sexual service
 

Mobile security

  • 2.
  • 3. Introduction  This information is for people that have personal smartphones  For people that have company smartphones, contact your companies mobile security policy
  • 5. Why does a person need to secure a smartphone?  As cell phones are becoming more like pocket-sized computers, they are also more vulnerable to different forms of cyber attacks  People want your data! This is a fact of life and it applies to either if you have an Android, BlackBerry, or iPhone smartphone
  • 6. Password Protection  By simply enabling a password or PIN number on a cell phone, you can save yourself a tremendous amount of hassle and headache because only you know that unique password  You may be able to set a security on the phone so that if someone tries the wrong password a certain number of times, the phone is automatically wiped
  • 7. Anti-virus Software  A person must treat a cell phone like they would a PC by installing and keeping an up to date anti-virus software  Lookout Mobile Security (Android)  SmartGuard Mobile Security (BlackBerry)  iPhones does not have an anti-virus software  A security app safeguards your data, protect against threats, and an up-to-date software protects the device from new versions of viruses and new malware
  • 8. Up-to-date operating system  Smartphones need to be patched often to eliminate vulnerabilities found since the phone was first released  Updates gets rid of security holes or vulnerabilities by maintaining the software on both your PC and your smartphone
  • 9. Get apps from a trusted source  There are plenty of apps out there, stick to apps from the phones market  Android Play Market  BlackBerry App World  iPhone App Market  If you’re downloading an app from a third party, do your research to make sure the app is reputable and will do what you want that app to do
  • 10. Wi-Fi Network  Avoid shopping or banking on a public network  Keep in mind that the open Wi-Fi network that your phone is connected to might not be secure  Limit your activity to browsing and avoid committing any transaction that involves your account information  Also, be wary about people looking over your shoulder and seeing your password, e-mails, texts, and account information
  • 11. Bluetooth devices  Although many people think of bluetooth as a better alternative to a physical wire, in fact it creates a personal area network, and like any network, it will recognize appropriate devices within its range  A phone's bluetooth setting is on by default, so it needs to be turned off, or configured for a specific device or headset
  • 12. Backup your data  If your phone gets taken or the data gets deleted, it’s a lot easier to get your information back when it’s backup regularly  It can mean the difference between a slight phone setback or living through your own phone nightmare
  • 13. Conclusion  Doing these simple tips with help keep your phone protected from vulnerabilities that might happen to you  Password Protection  Anti-virus Software  Up-to-date operating system  Get apps from a trusted source  Wi-Fi Network  Bluetooth devices  Backup your data