SlideShare ist ein Scribd-Unternehmen logo
1 von 24
MOBILE DEVICE SECURITY
CREATED AND PRESENTED BY LISA HERRERA
WHAT ARE MOBILE DEVICES?
• A mobile device is a handheld tablet or
other device that is made for portability,
and is therefore both compact and
lightweight. New data storage, processing
and display technologies have allowed
these small devices to do nearly anything
that had previously been traditionally done
with larger personal computers.
("What Is A Mobile Device? - Definition From Techopedia")
ACTIVITY 1: TYPES OF MOBILE DEVICES (3
MINS)
• What Types of Mobile devices do you have?
• How Often Do you use them? (i.e. every day,
hourly, every min)
• List mobile device uses/activity? (i.e social
media, email, banking)
• Brand? Operating System?
ACTIVITY 2: DATA STORED ON MOBILE
DEVICES
(3 MINS)
• What is Data?
-Data is the information stored or used by a computer or device.
• What are some examples of Data that is on a mobile device?
SOME EXAMPLE ARE…….
• Photos
• Music
• Contacts (which may include phone numbers, names,
addresses)
• Email (which can contain information such as D.O.B., address,
numbers, etc)
• GPS/Location
• Banking Apps
BRAINTEASER 1: TEST YOU KNOWLEDGE
MOBILE OPERATING SYSTEMS
ANDRIOD
Cupcake – Android 1.5 (2008)
Eclair – Android 2.0/2.1
FroYo – Android 2.2
Donut – Android 1.6
Gingerbread – The update after
FroYoHoneycomb (For android tablets) -
3.0, 3.1, 3.2
Ice Cream Sandwich - 4.0
Lollipop - 5.0, 5.0.1, 5.0.2
Android 6.X: Marshmallow
Jelly Bean - 4.1, 4.2, 4.3
KitKat - 4.4 (2015)
Lollipop 5.0
Marshmallow 6.0 (2016)
APPLE
• IOS 1.0, 1.1, 1.1.3, (IPhone 2G(2007))
• IOS 2.0,2.1,2.2 (IPhone 2G & 3G, IPod Touch
(2008))
• IOS 3.0, 3.1, (IPhone 3Gs, 3G, 2G , IPod Touch
(2009))
• IOS 3.2 (Ipad 2010)
• IOS 4.0, 4.1,4.21,4.25,4.3 (IPhone 4,(2010-2011))
• All the way up to IOS 9
WINDOWS
• Windows Phone 7 (2010)
• Windows Phone 7.5 Mango
(2011)
• Windows Phone 7.5 Tango
(2012)
• Windows Phone 7.8
• Windows Phone 8
MOBILE NETWORK CONNECTION
TYPES, HISTORY, AND FACTS
• 1G: First Generation Cellular Phones (1970s to 1990s)
Advanced Mobile Phone System (AMPS), Total Access
Communication Systems (TACS) and Nordic Mobile Telephone
(NMT).
• 2G: GSM, CDMA, GPRS Networks (1990s)- IMEI a 15 or 17 digit
code used to identify a mobile station to a GSM network
• 3G Networks- Phone speeds deliver up to 2 Mpbs, but only
under the best conditions and in stationary mode.
• High-Speed 4G LTE- Phone speeds deliver up to 20 Mpbs
VULNERABILITIES & THREATS
• What is the definition of a vulnerability?
-A vulnerability is a weakness which allows an attacker to reduce
a system's information assurance. Vulnerability is the
intersection of three elements: a system susceptibility or flaw,
attacker access to the flaw, and attacker capability to exploit the
flaw.
• What is a threat?
-A threat is a possible danger that might exploit a
vulnerability to breach security and therefore cause
possible harm
ACTIVITY 3: MOBILE SYSTEM
VULNERABILITIES
(3 MINS)
How many system vulnerabilities
can you list?
MOBILE SYSTEM VULNERABILITIES
• Mobile Networks
• Internet
• SMS/MMS
• USB
• Wireless Network
• Bluetooth
• HotSpots
• Tethering
• NFC
• Location (GPS)
THREATS
• Software threats:
-Downloading 3rd party Apps or Apps not in the App or Play
Store
-Downloading and opening files in email but an unknown sender
-Jailbreaking or Rooting mobile device
-Accessing unsecure HotSpots
-These are just a few examples of things that can pose a threat
to your mobile device. How? The apps, software, files, or
accesspoints can contain Malware, such as: viruses, worms,
adware, and spyware to name a few.
MALWARE
• Malware- is Malicious software that infects computer or mobile
systems and then performs some type of evil action, such as
stealing information, damaging data, and/or disrupting normal
use of the computer or mobile system.
ACTIVITY 4: MOBILE DEVICE
SECURITY SOLUTIONS
(3 MINS)
Can you name some solutions to
help secure a mobile device?
EXAMPLE OF SOME MOBILE DEVICE
SECURITY SOLUTIONS
• Passwords
• Screen lock
• Privacy settings
• Encryption
• Remote Device
Wipe
• Back Up
• Anti-Malware
Android
Apple
ACTIVITY 5: ANDROID (LOCK SCREEN AND
SECURITY)
Android has many different screen lock
options. Do you know what they are?
ANDROID
CURRENTLY HAS 6 SCREEN LOCK OPTIONS
IN CONCLUSION
Protecting your mobile device is very
important and will safeguard your
personal information. There is so
much information regarding mobile
device security in which everything was
not fully covered. I have a few
handouts on Mobile Device Security,
QUESTIONS?
REFERENCES
• "Android - History". Android.com. N.p., 2016. Web. 14 June
2016.
• "History Of Cellular Technology: The Evolution Of 1G, 2G, 3G,
And 4G Phone Networks". Bright Hub. N.p., 2016. Web. 14 June
2016.
• "Mobile Devices For Today's Banking Environment".
Slideshare.net. N.p., 2012. Web. 14 June 2016.
• Staff, Verge. "Ios: A Visual History". The Verge. N.p., 2013. Web.
14 June 2016.
• "What Is A Mobile Device? - Definition From Techopedia".
The End!

Weitere ähnliche Inhalte

Was ist angesagt?

Was ist angesagt? (20)

Ensuring Mobile Device Security
Ensuring Mobile Device SecurityEnsuring Mobile Device Security
Ensuring Mobile Device Security
 
Mobile Device Security
Mobile Device SecurityMobile Device Security
Mobile Device Security
 
Mobile security
Mobile securityMobile security
Mobile security
 
Android Security
Android SecurityAndroid Security
Android Security
 
Mobile security in Cyber Security
Mobile security in Cyber SecurityMobile security in Cyber Security
Mobile security in Cyber Security
 
Mobile security
Mobile securityMobile security
Mobile security
 
mobile application security
mobile application securitymobile application security
mobile application security
 
Mobile Application Security
Mobile Application SecurityMobile Application Security
Mobile Application Security
 
Smartphone security
Smartphone  securitySmartphone  security
Smartphone security
 
Mobile Security
Mobile SecurityMobile Security
Mobile Security
 
spyware
spywarespyware
spyware
 
Mobile phone Data Hacking
Mobile phone Data HackingMobile phone Data Hacking
Mobile phone Data Hacking
 
Mobile Application Security
Mobile Application SecurityMobile Application Security
Mobile Application Security
 
Android security
Android securityAndroid security
Android security
 
Android security
Android securityAndroid security
Android security
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Android Security
Android SecurityAndroid Security
Android Security
 
Presentation on Blackberry
Presentation on Blackberry Presentation on Blackberry
Presentation on Blackberry
 
Security models of modern mobile systems
Security models of modern mobile systemsSecurity models of modern mobile systems
Security models of modern mobile systems
 
malware
malware malware
malware
 

Andere mochten auch

Symantec Mobile Security Whitepaper June 2011
Symantec Mobile Security Whitepaper June 2011Symantec Mobile Security Whitepaper June 2011
Symantec Mobile Security Whitepaper June 2011Symantec
 
Mobile Device Management & Data Protection
Mobile Device Management & Data ProtectionMobile Device Management & Data Protection
Mobile Device Management & Data ProtectionGeekTek IT Services
 
Ps4 vs xbox one | àlex Gómez i Arnau Marín
Ps4 vs xbox one | àlex Gómez i Arnau MarínPs4 vs xbox one | àlex Gómez i Arnau Marín
Ps4 vs xbox one | àlex Gómez i Arnau MarínTheFirecraker
 
iPhone Cost Components
iPhone Cost ComponentsiPhone Cost Components
iPhone Cost ComponentsMekko Graphics
 
44Con 2014: GreedyBTS - Hacking Adventures in GSM
44Con 2014: GreedyBTS - Hacking Adventures in GSM44Con 2014: GreedyBTS - Hacking Adventures in GSM
44Con 2014: GreedyBTS - Hacking Adventures in GSMiphonepentest
 
2010: Mobile Security - Intense overview
2010: Mobile Security - Intense overview2010: Mobile Security - Intense overview
2010: Mobile Security - Intense overviewFabio Pietrosanti
 
Smartphone security
Smartphone securitySmartphone security
Smartphone securityMuthu Kumar
 
Information security[277]
Information security[277]Information security[277]
Information security[277]Timothy Warren
 
Big data - What is It?
Big data - What is It?Big data - What is It?
Big data - What is It?Nicole Aidney
 
Guide to big data analytics
Guide to big data analyticsGuide to big data analytics
Guide to big data analyticsGahya Pandian
 
Security in Computer System
Security in Computer SystemSecurity in Computer System
Security in Computer SystemManesh T
 
Introduction To Information Security
Introduction To Information SecurityIntroduction To Information Security
Introduction To Information Securitybelsis
 

Andere mochten auch (20)

Symantec Mobile Security Whitepaper June 2011
Symantec Mobile Security Whitepaper June 2011Symantec Mobile Security Whitepaper June 2011
Symantec Mobile Security Whitepaper June 2011
 
Mobile Device Management & Data Protection
Mobile Device Management & Data ProtectionMobile Device Management & Data Protection
Mobile Device Management & Data Protection
 
Ps4 vs xbox one | àlex Gómez i Arnau Marín
Ps4 vs xbox one | àlex Gómez i Arnau MarínPs4 vs xbox one | àlex Gómez i Arnau Marín
Ps4 vs xbox one | àlex Gómez i Arnau Marín
 
Call of Duty
Call of DutyCall of Duty
Call of Duty
 
iPhone Cost Components
iPhone Cost ComponentsiPhone Cost Components
iPhone Cost Components
 
Stagefright (1)
Stagefright (1)Stagefright (1)
Stagefright (1)
 
44Con 2014: GreedyBTS - Hacking Adventures in GSM
44Con 2014: GreedyBTS - Hacking Adventures in GSM44Con 2014: GreedyBTS - Hacking Adventures in GSM
44Con 2014: GreedyBTS - Hacking Adventures in GSM
 
2010: Mobile Security - Intense overview
2010: Mobile Security - Intense overview2010: Mobile Security - Intense overview
2010: Mobile Security - Intense overview
 
Smartphone security
Smartphone securitySmartphone security
Smartphone security
 
Information security[277]
Information security[277]Information security[277]
Information security[277]
 
Big data
Big dataBig data
Big data
 
Big data - What is It?
Big data - What is It?Big data - What is It?
Big data - What is It?
 
Computer Network
Computer NetworkComputer Network
Computer Network
 
Guide to big data analytics
Guide to big data analyticsGuide to big data analytics
Guide to big data analytics
 
Security in Computer System
Security in Computer SystemSecurity in Computer System
Security in Computer System
 
Xbox v/s Ps4
Xbox v/s Ps4Xbox v/s Ps4
Xbox v/s Ps4
 
The iPhone Evolution
The iPhone EvolutionThe iPhone Evolution
The iPhone Evolution
 
6G Technology
6G Technology6G Technology
6G Technology
 
Introduction To Information Security
Introduction To Information SecurityIntroduction To Information Security
Introduction To Information Security
 
Mobile security - Intense overview
Mobile security - Intense overviewMobile security - Intense overview
Mobile security - Intense overview
 

Ähnlich wie Mobile device security

NETC 2012_Mobile Security for Smartphones and Tablets (pptx)
NETC 2012_Mobile Security for Smartphones and Tablets (pptx)NETC 2012_Mobile Security for Smartphones and Tablets (pptx)
NETC 2012_Mobile Security for Smartphones and Tablets (pptx)Vince Verbeke
 
Mobile Security for Smartphones and Tablets
Mobile Security for Smartphones and TabletsMobile Security for Smartphones and Tablets
Mobile Security for Smartphones and TabletsVince Verbeke
 
551_MH_overview_handout.ppt
551_MH_overview_handout.ppt551_MH_overview_handout.ppt
551_MH_overview_handout.pptNiloyMondal10
 
Can You Steal From Me Now? Mobile and BYOD Security Risks
Can You Steal From Me Now? Mobile and BYOD Security RisksCan You Steal From Me Now? Mobile and BYOD Security Risks
Can You Steal From Me Now? Mobile and BYOD Security RisksMichael Davis
 
Cyber Security: A Hands on review
Cyber Security: A Hands on reviewCyber Security: A Hands on review
Cyber Security: A Hands on reviewMiltonBiswas8
 
A tale of mobile threats
A tale of mobile threatsA tale of mobile threats
A tale of mobile threatsVincenzo Iozzo
 
Securing hand held computing devices
Securing hand held computing devicesSecuring hand held computing devices
Securing hand held computing devicesjraja01
 
Sniffer for detecting lost mobiles
Sniffer for detecting lost mobilesSniffer for detecting lost mobiles
Sniffer for detecting lost mobileshome
 
Mobiquant Japan ITpro Expo Tokyo/ Mobile and IOT Security Conference - REDA Z...
Mobiquant Japan ITpro Expo Tokyo/ Mobile and IOT Security Conference - REDA Z...Mobiquant Japan ITpro Expo Tokyo/ Mobile and IOT Security Conference - REDA Z...
Mobiquant Japan ITpro Expo Tokyo/ Mobile and IOT Security Conference - REDA Z...MOBIQUANT TECHNOLOGIES
 
2014CyberSecurityProject
2014CyberSecurityProject2014CyberSecurityProject
2014CyberSecurityProjectKaley Hair
 
Information security
 Information security Information security
Information securityJin Castor
 
Confraria Security & IT - Mobile Security
Confraria Security & IT - Mobile SecurityConfraria Security & IT - Mobile Security
Confraria Security & IT - Mobile SecurityVitor Domingos
 
NMI15 Filip Chytrý – Internet věcí a jeho potenciální bezpečnostní rizika
NMI15 Filip Chytrý – Internet věcí a jeho potenciální bezpečnostní rizikaNMI15 Filip Chytrý – Internet věcí a jeho potenciální bezpečnostní rizika
NMI15 Filip Chytrý – Internet věcí a jeho potenciální bezpečnostní rizikaNew Media Inspiration
 
Blackberry playbook – new challenges
Blackberry playbook – new challengesBlackberry playbook – new challenges
Blackberry playbook – new challengesSTO STRATEGY
 
IoT Devices Expanding Your Digital Footprint
IoT Devices Expanding Your Digital FootprintIoT Devices Expanding Your Digital Footprint
IoT Devices Expanding Your Digital FootprintSurfWatch Labs
 
2014: Mid-Year Threat Review
2014: Mid-Year Threat Review2014: Mid-Year Threat Review
2014: Mid-Year Threat ReviewESET
 
Research on Comparative Study of Different Mobile Operating System_Part-1
Research on Comparative Study of Different Mobile Operating System_Part-1Research on Comparative Study of Different Mobile Operating System_Part-1
Research on Comparative Study of Different Mobile Operating System_Part-1Zulkar Naim
 
Mobile Devices Securely Accessing SharePoint
Mobile Devices Securely Accessing SharePointMobile Devices Securely Accessing SharePoint
Mobile Devices Securely Accessing SharePointMike Brannon
 

Ähnlich wie Mobile device security (20)

NETC 2012_Mobile Security for Smartphones and Tablets (pptx)
NETC 2012_Mobile Security for Smartphones and Tablets (pptx)NETC 2012_Mobile Security for Smartphones and Tablets (pptx)
NETC 2012_Mobile Security for Smartphones and Tablets (pptx)
 
Mobile Security for Smartphones and Tablets
Mobile Security for Smartphones and TabletsMobile Security for Smartphones and Tablets
Mobile Security for Smartphones and Tablets
 
551_MH_overview_handout.ppt
551_MH_overview_handout.ppt551_MH_overview_handout.ppt
551_MH_overview_handout.ppt
 
Can You Steal From Me Now? Mobile and BYOD Security Risks
Can You Steal From Me Now? Mobile and BYOD Security RisksCan You Steal From Me Now? Mobile and BYOD Security Risks
Can You Steal From Me Now? Mobile and BYOD Security Risks
 
SMART PHONE
SMART PHONE SMART PHONE
SMART PHONE
 
Cyber Security: A Hands on review
Cyber Security: A Hands on reviewCyber Security: A Hands on review
Cyber Security: A Hands on review
 
CS_UNIT 2(P3).pptx
CS_UNIT 2(P3).pptxCS_UNIT 2(P3).pptx
CS_UNIT 2(P3).pptx
 
A tale of mobile threats
A tale of mobile threatsA tale of mobile threats
A tale of mobile threats
 
Securing hand held computing devices
Securing hand held computing devicesSecuring hand held computing devices
Securing hand held computing devices
 
Sniffer for detecting lost mobiles
Sniffer for detecting lost mobilesSniffer for detecting lost mobiles
Sniffer for detecting lost mobiles
 
Mobiquant Japan ITpro Expo Tokyo/ Mobile and IOT Security Conference - REDA Z...
Mobiquant Japan ITpro Expo Tokyo/ Mobile and IOT Security Conference - REDA Z...Mobiquant Japan ITpro Expo Tokyo/ Mobile and IOT Security Conference - REDA Z...
Mobiquant Japan ITpro Expo Tokyo/ Mobile and IOT Security Conference - REDA Z...
 
2014CyberSecurityProject
2014CyberSecurityProject2014CyberSecurityProject
2014CyberSecurityProject
 
Information security
 Information security Information security
Information security
 
Confraria Security & IT - Mobile Security
Confraria Security & IT - Mobile SecurityConfraria Security & IT - Mobile Security
Confraria Security & IT - Mobile Security
 
NMI15 Filip Chytrý – Internet věcí a jeho potenciální bezpečnostní rizika
NMI15 Filip Chytrý – Internet věcí a jeho potenciální bezpečnostní rizikaNMI15 Filip Chytrý – Internet věcí a jeho potenciální bezpečnostní rizika
NMI15 Filip Chytrý – Internet věcí a jeho potenciální bezpečnostní rizika
 
Blackberry playbook – new challenges
Blackberry playbook – new challengesBlackberry playbook – new challenges
Blackberry playbook – new challenges
 
IoT Devices Expanding Your Digital Footprint
IoT Devices Expanding Your Digital FootprintIoT Devices Expanding Your Digital Footprint
IoT Devices Expanding Your Digital Footprint
 
2014: Mid-Year Threat Review
2014: Mid-Year Threat Review2014: Mid-Year Threat Review
2014: Mid-Year Threat Review
 
Research on Comparative Study of Different Mobile Operating System_Part-1
Research on Comparative Study of Different Mobile Operating System_Part-1Research on Comparative Study of Different Mobile Operating System_Part-1
Research on Comparative Study of Different Mobile Operating System_Part-1
 
Mobile Devices Securely Accessing SharePoint
Mobile Devices Securely Accessing SharePointMobile Devices Securely Accessing SharePoint
Mobile Devices Securely Accessing SharePoint
 

Kürzlich hochgeladen

Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesBoston Institute of Analytics
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024The Digital Insurer
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 

Kürzlich hochgeladen (20)

Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 

Mobile device security

  • 1. MOBILE DEVICE SECURITY CREATED AND PRESENTED BY LISA HERRERA
  • 2. WHAT ARE MOBILE DEVICES? • A mobile device is a handheld tablet or other device that is made for portability, and is therefore both compact and lightweight. New data storage, processing and display technologies have allowed these small devices to do nearly anything that had previously been traditionally done with larger personal computers. ("What Is A Mobile Device? - Definition From Techopedia")
  • 3. ACTIVITY 1: TYPES OF MOBILE DEVICES (3 MINS) • What Types of Mobile devices do you have? • How Often Do you use them? (i.e. every day, hourly, every min) • List mobile device uses/activity? (i.e social media, email, banking) • Brand? Operating System?
  • 4.
  • 5. ACTIVITY 2: DATA STORED ON MOBILE DEVICES (3 MINS) • What is Data? -Data is the information stored or used by a computer or device. • What are some examples of Data that is on a mobile device?
  • 6. SOME EXAMPLE ARE……. • Photos • Music • Contacts (which may include phone numbers, names, addresses) • Email (which can contain information such as D.O.B., address, numbers, etc) • GPS/Location • Banking Apps
  • 7.
  • 8. BRAINTEASER 1: TEST YOU KNOWLEDGE MOBILE OPERATING SYSTEMS ANDRIOD Cupcake – Android 1.5 (2008) Eclair – Android 2.0/2.1 FroYo – Android 2.2 Donut – Android 1.6 Gingerbread – The update after FroYoHoneycomb (For android tablets) - 3.0, 3.1, 3.2 Ice Cream Sandwich - 4.0 Lollipop - 5.0, 5.0.1, 5.0.2 Android 6.X: Marshmallow Jelly Bean - 4.1, 4.2, 4.3 KitKat - 4.4 (2015) Lollipop 5.0 Marshmallow 6.0 (2016) APPLE • IOS 1.0, 1.1, 1.1.3, (IPhone 2G(2007)) • IOS 2.0,2.1,2.2 (IPhone 2G & 3G, IPod Touch (2008)) • IOS 3.0, 3.1, (IPhone 3Gs, 3G, 2G , IPod Touch (2009)) • IOS 3.2 (Ipad 2010) • IOS 4.0, 4.1,4.21,4.25,4.3 (IPhone 4,(2010-2011)) • All the way up to IOS 9 WINDOWS • Windows Phone 7 (2010) • Windows Phone 7.5 Mango (2011) • Windows Phone 7.5 Tango (2012) • Windows Phone 7.8 • Windows Phone 8
  • 9. MOBILE NETWORK CONNECTION TYPES, HISTORY, AND FACTS • 1G: First Generation Cellular Phones (1970s to 1990s) Advanced Mobile Phone System (AMPS), Total Access Communication Systems (TACS) and Nordic Mobile Telephone (NMT). • 2G: GSM, CDMA, GPRS Networks (1990s)- IMEI a 15 or 17 digit code used to identify a mobile station to a GSM network • 3G Networks- Phone speeds deliver up to 2 Mpbs, but only under the best conditions and in stationary mode. • High-Speed 4G LTE- Phone speeds deliver up to 20 Mpbs
  • 10. VULNERABILITIES & THREATS • What is the definition of a vulnerability? -A vulnerability is a weakness which allows an attacker to reduce a system's information assurance. Vulnerability is the intersection of three elements: a system susceptibility or flaw, attacker access to the flaw, and attacker capability to exploit the flaw. • What is a threat? -A threat is a possible danger that might exploit a vulnerability to breach security and therefore cause possible harm
  • 11. ACTIVITY 3: MOBILE SYSTEM VULNERABILITIES (3 MINS) How many system vulnerabilities can you list?
  • 12. MOBILE SYSTEM VULNERABILITIES • Mobile Networks • Internet • SMS/MMS • USB • Wireless Network • Bluetooth • HotSpots • Tethering • NFC • Location (GPS)
  • 13. THREATS • Software threats: -Downloading 3rd party Apps or Apps not in the App or Play Store -Downloading and opening files in email but an unknown sender -Jailbreaking or Rooting mobile device -Accessing unsecure HotSpots -These are just a few examples of things that can pose a threat to your mobile device. How? The apps, software, files, or accesspoints can contain Malware, such as: viruses, worms, adware, and spyware to name a few.
  • 14. MALWARE • Malware- is Malicious software that infects computer or mobile systems and then performs some type of evil action, such as stealing information, damaging data, and/or disrupting normal use of the computer or mobile system.
  • 15. ACTIVITY 4: MOBILE DEVICE SECURITY SOLUTIONS (3 MINS) Can you name some solutions to help secure a mobile device?
  • 16. EXAMPLE OF SOME MOBILE DEVICE SECURITY SOLUTIONS • Passwords • Screen lock • Privacy settings • Encryption • Remote Device Wipe • Back Up • Anti-Malware
  • 18. Apple
  • 19. ACTIVITY 5: ANDROID (LOCK SCREEN AND SECURITY) Android has many different screen lock options. Do you know what they are?
  • 20. ANDROID CURRENTLY HAS 6 SCREEN LOCK OPTIONS
  • 21. IN CONCLUSION Protecting your mobile device is very important and will safeguard your personal information. There is so much information regarding mobile device security in which everything was not fully covered. I have a few handouts on Mobile Device Security,
  • 23. REFERENCES • "Android - History". Android.com. N.p., 2016. Web. 14 June 2016. • "History Of Cellular Technology: The Evolution Of 1G, 2G, 3G, And 4G Phone Networks". Bright Hub. N.p., 2016. Web. 14 June 2016. • "Mobile Devices For Today's Banking Environment". Slideshare.net. N.p., 2012. Web. 14 June 2016. • Staff, Verge. "Ios: A Visual History". The Verge. N.p., 2013. Web. 14 June 2016. • "What Is A Mobile Device? - Definition From Techopedia".

Hinweis der Redaktion

  1. Why do you think there are so many different operating systems updates and they keep updating them? -Keep up with Technology (I.e., new features and capabilities, improve battery life, system usability improvements, connectivity, increase storage capabilities, increase runtime, and most importantly to improve privacy and security. When new updates come available there may have been a flaw or something that allow the integrity of security to be lowered. Once these flaws are found, new updates are made to fix these flaws or bugs.)
  2. Ask if they know what SMS/MMS is. Explain if they don’t. Ask them if they know what NFC is. Provide an example. Ask if they know what Tethering is. Provide Example.
  3. How many people uses passwords on their mobile devices? How many back up their phones? Why would you back up your phone? What system or software do you use to back up your phone? (I. E., Itunes, Samsung Account, Google Account, etc.) Does anyone use any anti-malware, or anti-virus apps on their phone or mobile device? If yes, what do you use? Why do you use it? What other privacy setting do you use and why? Who knows what remote device wipe is? Get an example or give an example.