2. WHAT ARE MOBILE DEVICES?
• A mobile device is a handheld tablet or
other device that is made for portability,
and is therefore both compact and
lightweight. New data storage, processing
and display technologies have allowed
these small devices to do nearly anything
that had previously been traditionally done
with larger personal computers.
("What Is A Mobile Device? - Definition From Techopedia")
3. ACTIVITY 1: TYPES OF MOBILE DEVICES (3
MINS)
• What Types of Mobile devices do you have?
• How Often Do you use them? (i.e. every day,
hourly, every min)
• List mobile device uses/activity? (i.e social
media, email, banking)
• Brand? Operating System?
4.
5. ACTIVITY 2: DATA STORED ON MOBILE
DEVICES
(3 MINS)
• What is Data?
-Data is the information stored or used by a computer or device.
• What are some examples of Data that is on a mobile device?
6. SOME EXAMPLE ARE…….
• Photos
• Music
• Contacts (which may include phone numbers, names,
addresses)
• Email (which can contain information such as D.O.B., address,
numbers, etc)
• GPS/Location
• Banking Apps
7.
8. BRAINTEASER 1: TEST YOU KNOWLEDGE
MOBILE OPERATING SYSTEMS
ANDRIOD
Cupcake – Android 1.5 (2008)
Eclair – Android 2.0/2.1
FroYo – Android 2.2
Donut – Android 1.6
Gingerbread – The update after
FroYoHoneycomb (For android tablets) -
3.0, 3.1, 3.2
Ice Cream Sandwich - 4.0
Lollipop - 5.0, 5.0.1, 5.0.2
Android 6.X: Marshmallow
Jelly Bean - 4.1, 4.2, 4.3
KitKat - 4.4 (2015)
Lollipop 5.0
Marshmallow 6.0 (2016)
APPLE
• IOS 1.0, 1.1, 1.1.3, (IPhone 2G(2007))
• IOS 2.0,2.1,2.2 (IPhone 2G & 3G, IPod Touch
(2008))
• IOS 3.0, 3.1, (IPhone 3Gs, 3G, 2G , IPod Touch
(2009))
• IOS 3.2 (Ipad 2010)
• IOS 4.0, 4.1,4.21,4.25,4.3 (IPhone 4,(2010-2011))
• All the way up to IOS 9
WINDOWS
• Windows Phone 7 (2010)
• Windows Phone 7.5 Mango
(2011)
• Windows Phone 7.5 Tango
(2012)
• Windows Phone 7.8
• Windows Phone 8
9. MOBILE NETWORK CONNECTION
TYPES, HISTORY, AND FACTS
• 1G: First Generation Cellular Phones (1970s to 1990s)
Advanced Mobile Phone System (AMPS), Total Access
Communication Systems (TACS) and Nordic Mobile Telephone
(NMT).
• 2G: GSM, CDMA, GPRS Networks (1990s)- IMEI a 15 or 17 digit
code used to identify a mobile station to a GSM network
• 3G Networks- Phone speeds deliver up to 2 Mpbs, but only
under the best conditions and in stationary mode.
• High-Speed 4G LTE- Phone speeds deliver up to 20 Mpbs
10. VULNERABILITIES & THREATS
• What is the definition of a vulnerability?
-A vulnerability is a weakness which allows an attacker to reduce
a system's information assurance. Vulnerability is the
intersection of three elements: a system susceptibility or flaw,
attacker access to the flaw, and attacker capability to exploit the
flaw.
• What is a threat?
-A threat is a possible danger that might exploit a
vulnerability to breach security and therefore cause
possible harm
11. ACTIVITY 3: MOBILE SYSTEM
VULNERABILITIES
(3 MINS)
How many system vulnerabilities
can you list?
12. MOBILE SYSTEM VULNERABILITIES
• Mobile Networks
• Internet
• SMS/MMS
• USB
• Wireless Network
• Bluetooth
• HotSpots
• Tethering
• NFC
• Location (GPS)
13. THREATS
• Software threats:
-Downloading 3rd party Apps or Apps not in the App or Play
Store
-Downloading and opening files in email but an unknown sender
-Jailbreaking or Rooting mobile device
-Accessing unsecure HotSpots
-These are just a few examples of things that can pose a threat
to your mobile device. How? The apps, software, files, or
accesspoints can contain Malware, such as: viruses, worms,
adware, and spyware to name a few.
14. MALWARE
• Malware- is Malicious software that infects computer or mobile
systems and then performs some type of evil action, such as
stealing information, damaging data, and/or disrupting normal
use of the computer or mobile system.
15. ACTIVITY 4: MOBILE DEVICE
SECURITY SOLUTIONS
(3 MINS)
Can you name some solutions to
help secure a mobile device?
16. EXAMPLE OF SOME MOBILE DEVICE
SECURITY SOLUTIONS
• Passwords
• Screen lock
• Privacy settings
• Encryption
• Remote Device
Wipe
• Back Up
• Anti-Malware
21. IN CONCLUSION
Protecting your mobile device is very
important and will safeguard your
personal information. There is so
much information regarding mobile
device security in which everything was
not fully covered. I have a few
handouts on Mobile Device Security,
23. REFERENCES
• "Android - History". Android.com. N.p., 2016. Web. 14 June
2016.
• "History Of Cellular Technology: The Evolution Of 1G, 2G, 3G,
And 4G Phone Networks". Bright Hub. N.p., 2016. Web. 14 June
2016.
• "Mobile Devices For Today's Banking Environment".
Slideshare.net. N.p., 2012. Web. 14 June 2016.
• Staff, Verge. "Ios: A Visual History". The Verge. N.p., 2013. Web.
14 June 2016.
• "What Is A Mobile Device? - Definition From Techopedia".
Why do you think there are so many different operating systems updates and they keep updating them?
-Keep up with Technology (I.e., new features and capabilities, improve battery life, system usability improvements, connectivity, increase storage capabilities, increase runtime, and most importantly to improve privacy and security. When new updates come available there may have been a flaw or something that allow the integrity of security to be lowered. Once these flaws are found, new updates are made to fix these flaws or bugs.)
Ask if they know what SMS/MMS is. Explain if they don’t. Ask them if they know what NFC is. Provide an example. Ask if they know what Tethering is. Provide Example.
How many people uses passwords on their mobile devices? How many back up their phones? Why would you back up your phone? What system or software do you use to back up your phone? (I. E., Itunes, Samsung Account, Google Account, etc.) Does anyone use any anti-malware, or anti-virus apps on their phone or mobile device? If yes, what do you use? Why do you use it? What other privacy setting do you use and why? Who knows what remote device wipe is? Get an example or give an example.