SlideShare a Scribd company logo
1 of 40
Download to read offline
Mobile Devices
Kaushal desai
Index
Introduction
TheHistory of MobileDevices
Typesof MobileDevices
Typesof Mobile OperatingSystems
TheFuture of MobileDevices
VISUALIZING MOBILE SECURITY
ATTACKS MOVING TO MOBILE – WHY?
Wi-Fi
SMART PHONE & MOBILE DEVICE THREATS
HACKERS – TRADITIONAL
SECURITY CHALLENGE OF SMART PHONE & MOBIL
DEVICE
Introduction
Mobile Device?
 Apocket-sized computing device, typically having adisplay
screen with touch input or aminiaturekeyboard
history
It can be said thatthe mobile devices was born at
the same time the radio communication had been
invented.
The development of mobile devices starts fromthe
1920's, there are five stages.
Stage One
1920's-1940's
 Based on several wave bands of shortwave, the private mobile
communication system had been invented.
 The Detroit police car radio system is the representative one.
 The frequency of this system is 2MHz at thattime. In the 1940's the
frequency had been risen to 30~40MHz.
 Itis considered as the beginning of the modern mobile service.
Stage Two
1940's-1960's
 The public mobile service came out.
 1946 According to the plan of Federal Communications
Commission(FCC) the Bell system established the first public car
phone net inSt.Louis.
 There was three channles in thattime, the mode wassimplex.
Stage Three
1960's-1970's
America improved the mobile telephony
system(1MTS)
This period complete :
automatic channel choose
automatic dialing tothenet
Stage Four
1970's-1980's( the peak time)
The Bell Labs successfully developed the
advanced mobile phonesystem(AMPS)
The cellular network builtup, improved the
capacity of thesystem.
The cellular network becames the utility system,
used in theworldwide.
Stage Four
Achivements in thisstage:
 microelectronic technique got a significant development
which made the probability of miniaturization mobile devices
be true.
 The new system of mobile communication----cellular
network
 provide the technique for the manage and control of the large
size net
Stage Five
1980's-
The Digital Mobile Communication System(DMCS)
gets developed and mature in this period.
AMPS & TACS stand for the CellularNetworks
Ⅰ→analogsystem
Typesof Mobile Devices
Mobile Computers
 Notebook PC,MobilePC…
Handheld GameConsoles
Media Recorders
 Digital Camera, Digital Video Camera…
Contd…
Media Players/Displayers
 E-book Reader…
Communication Devices
 Mobile Phone,Pager…
Personal Navigation Devices
Different Sizes& Typesof
Mobile
• Computer size
• Micro computer
• Mobile
• Informationappliance
• Calculators
Largecomputer
super computer- Thefastest type of computer.
Minisuper computer - constituted a short-lived class of
computers that emerged in themid-1980s
Micro computer
 Personal computer - is any general-purpose computer whosesize,
capabilities, and original sales price make it useful forindividuals
 Home SFF(net top) - designed to minimize the spatial volume of a
desktop computer.
 Portable computer - designed to be moved from one place to another
and includes a display andkeyboard.
 Arcade system board - created for the purpose of runningvideo arcade
games.
 Video game console - is an interactive entertainment computeror
modified computer system
Mobile
Laptop - is a personal computer designed for mobile use.
Desktop replacement computer - provides most of the
capabilities of a desktop computer, with a similar level of performance.
Subnotebook(net book ,smart book) - designed andmarketed
with an emphasis onportability.
Tablet computer - calculator watch, wristop, virtual rentinaldisplay,
head-mounted display.
Information appliance
PDA (palm size PC,handheld PC,pocketcomputer)
- also known as a palmtop computer.
Mobile phone (smart phone, feature phone) -Amobile
phone (also called mobile, cellular telephone, or cell phone)
is an electronic device used to make mobile telephone calls
across a wide geographicarea.
P M P - A portable media player.
DAP-A digital audio player.
E-book reader - designed primarily for the purposeof
reading digital books andperiodicals.
Handheld gameconsole - allowing people to carry them
and play them at any time orplace.
Calculators
Scientific - designed to calculate problems in science(especiallyphysics),
engineering, and mathematics.
programmable- calculators capable of being programmed much like a
computer.
Graphing- capable of plotting graphs, solving simultaneous equations,
and performing numerous other tasks withvariables.
What is mobile operatingsystem?
Amobile operating system, also known asamobile OS, a
mobile platform, or ahandheld operating system, is the
operating system that controls amobile device or
information appliance
Smartphone Operating Systems
Themost common operating systems
o
SymbianOSSymbianFoundation
Android from GoogleInc.
iOSfrom Apple Inc.
RIMBlackBerry OS
Windows Mobile from Microsoft
Linux operating system
MeeGo from Nokia andIntel
 Android
Always displayed before you download from Google Play
store
 ie: “Why does this calorie counter need to access my camera
and phone calls?”
 iOS
 A little more secure
 Apps now default to no permissions outside of theirsandbox
 ie: “This app wants to use yourlocation."
 Windows
 App settings are viewable before install or through“Settings”
Similar toAndroid 9
Android
25.5%Market ShareSales
Q32010
Android is an opensource,
Linux-derived platform
backed by Google
along with majorhardware
and software developers
(such asIntel, HTC,ARM,
Samsung,Motorola and
eBay
iOS
16.7%Market ShareSales
Q32010
TheApple iPhone, iPod
Touch and iPad all usean
operating system
RIM BlackBerry OS
Originally designedfor
business
Recently hasbeen
improved to offerfull
multimedia support
Over 15,000
downloadable
applications
Windows phone
(2.8% Market ShareSales
Q32010)
Widely spread inAsia
Support both touch
screen and physical
keyboard configurations
Linux operating system
open source,GPL(2.1%
Market ShareSalesQ3
2010, non-Android
Linux-based OS'sonly)
Nokia and Intel both
unveiled 'MeeGo' abrand
new mobile operating
system which would
combine the best of
Moblin and the best of
Maemo to create atruly
open-sourced experience
for users acrossall
devices.
êUsageshare of web client
operating systems.(Source:
Median values from Usage
share of operating systems
for January2011.)
Windows XP(41.70%)
. Windows 7 (25.42%)
% Windows Vista (15.43%)
5 Mac OSX(6.92%)
5 iOS(iPhone) (2.05%)
0 Linux(1.64%)
6.2.4 AUTHENTICATION: PATTERN
LOCK
 Swipe path of length
4–9 on 3 x 3 grid
 Easy to use, suitable for mobile
devices
 Problems:
 389,112 possible patterns; (456,976
possible patterns for 4-char case-
insensitive alphabetic password!)
Attacker can see pattern from finger
oils on screen
SMARTPHONEANDMOBILEDEVICESECURITY
24
Future
The mobile devices plays an indispensable role in
nowaday's life, meanwhile this field is still rapidly
developing. More app is going tobe added into.
In 2004 July 16, Japanese telephone company NTT
DoCoMo announced the P605iC phone which carried the
FeliCa soft. This phone opened the curtain of No Cards
Generation.
Future
Nowadays the manufactures of mobile devices are
devoting on touching screen and 3D effect.
More and moreAPP will be added intothe mobile devices,
make people's life much more convenient and fun.
VISUALIZING MOBILE SECURITY
There are three points of control.
SMART PHONE AND MOBILE DEVICE SECURITY
•
•
•
On the left you have device security, protecting both the device and the data.
On the top right you have mobile application security which includes secure
application development and analyzing applications for security risk.
The bottom right highlights the need for to provide secure access to applications
•
and data.
They are all interlinked and interconnected.
4
ATTACKS MOVING TO MOBILE – WHY?
SMART PHONE AND MOBILE
DEVICE SECURITY
3.1 Mobile devices are connection-enabled
3G/LTE
Bluetooth
Camera – QR Code
Wi-Fi
NFC
GSM – SMS
3.2 Valuable data
Phone information - IMEI, Phone number, SMS history, etc.
Contact list - Social engineering, Spam database
Geo-location information - Spy, Track history
Images/Camera - Spy, Surrounding environment
3.3 Valuable resource
High speed CPU
Powerful computing
Always-On Internet connection
o
l
3.4 Smart OS eco-system
 App store market : Easy access / Simple
install
Awareness : Permission review / Security to s
flash, etc.
 PC threats in mobile: email, links,brows5
ers,
Wi-Fi
Carriers collect WIFI network names/BSSIDs and correlating
GPS data
Fine-tune location
 Can be usedindoors
Google got in trouble in 2010 for collecting data with their
StreetView cars
Decided it was simpler to use mobile devices
Enormous userbase
Constantly updated
8
5. SMART PHONE & MOBILE DEVICE THREATS
Four MajorActors
 Government agencies
 Carriers/Providers
 Hackers
 Thieves
11
HACKERS - TRADITIONAL
 Network-Based
Normal web-based rules apply
Beware public Wi-Finetworks
 App security is getting bettereveryday
 A lot of unencrypted sensitive traffic is still sent and
received
Major hole in iOS7 < 7.0.6 / iOS6 <6.1.6
 70% of Android devices in circulation
Affected by known, remote code execution vulnerability
 Beware QR Codes!
14
SECURITY CHALLENGE OF SMART PHONE & MOBILE DEVICE
•
•
•
•
•
•
1 in 20 Mobile devices stolen in 2010.
70% of Mobile device spam is fraudulent financial services.
350% by which Wi-Fi hotspots are set to increase by 2015, providing
more opportunities for “man-in-the middle” attacks.
155% by which mobile malware increased 2011.
77% growth in Google Android malware from Jun 2010 to Jan 2011.
10 Billion Android app downloads reached by the end of 2011 – over
90% of the top 100 have been hacked.
Source: Evans Data Mobile Developer Survey Mobile Development Report 2012 Volume
Source: Business Insider (September 2012)
3
a) GPS
 Most obvious
 Pretty accurate outdoors, but not so much indoors
 Very useful
 Third party applications use GPS for correlation
 Sometimes stored locally and accessible.
b) CELL-NETWORK
 Tower Triangulation
 Can be used alongside GPS
 Mandatory use in emergencies
 Law enforcement
 Carriers
 As long as you have a phone, this information is available
 Sometimes legalities or warrants involved
7
b) SOCIAL MEDIA
 The success of mobile devices and global rise of socialmedia
are unquestionably intertwined
Outside of the obvious personal data
Geo-tagged updates on Facebook andTwitter
Facebook Graph search makes hiding online much more
difficult
LinkedIn open by default
Useful tool for social engineers
 Site is scraped for names and corporate structure 10

More Related Content

What's hot

Mobile os upcoming tech
Mobile os upcoming techMobile os upcoming tech
Mobile os upcoming techAnuj Malhotra
 
Smartphone 110810195522-phpapp02
Smartphone 110810195522-phpapp02Smartphone 110810195522-phpapp02
Smartphone 110810195522-phpapp02Ramya Shet J
 
The Smartphone Snapshot Showdown (Global Smartphone and Mobile Video Stats)
The Smartphone Snapshot Showdown (Global Smartphone and Mobile Video Stats)The Smartphone Snapshot Showdown (Global Smartphone and Mobile Video Stats)
The Smartphone Snapshot Showdown (Global Smartphone and Mobile Video Stats)Jon Hoehler
 
Virtual Merchant Mobile Swipe Solution
Virtual Merchant Mobile Swipe SolutionVirtual Merchant Mobile Swipe Solution
Virtual Merchant Mobile Swipe Solutiongreatdaniel
 
Smartphone Component Trends and Outlook (Sept 2013)
Smartphone Component Trends and Outlook (Sept 2013)Smartphone Component Trends and Outlook (Sept 2013)
Smartphone Component Trends and Outlook (Sept 2013)JonCarvinzer
 
Are you Smart Phone savvy?
Are you Smart Phone savvy?Are you Smart Phone savvy?
Are you Smart Phone savvy?Simon Lock
 
L01 New Technology 2017 Course Description
L01 New Technology 2017 Course DescriptionL01 New Technology 2017 Course Description
L01 New Technology 2017 Course DescriptionÓlafur Andri Ragnarsson
 
Introduction to mobile technology
Introduction to mobile technologyIntroduction to mobile technology
Introduction to mobile technologyGautam Krishnan
 
Mobile testing
Mobile testingMobile testing
Mobile testingAlex Hung
 
Introduction to Mobile
Introduction to MobileIntroduction to Mobile
Introduction to MobileTayyab Tahir
 
The Smartphone Economy
The Smartphone EconomyThe Smartphone Economy
The Smartphone EconomyRed Magma
 
Mobile World Congress 2011 Overview
Mobile World Congress 2011 OverviewMobile World Congress 2011 Overview
Mobile World Congress 2011 OverviewBhavya Siddappa
 
Artist l1mobilecomputing
Artist l1mobilecomputingArtist l1mobilecomputing
Artist l1mobilecomputingMeg Riegel
 
Presentation on mobile phones
Presentation on mobile phonesPresentation on mobile phones
Presentation on mobile phonessirtwinkles
 
Mobile Ecosystem
Mobile EcosystemMobile Ecosystem
Mobile EcosystemPragati Rai
 
mobile hardware
mobile hardwaremobile hardware
mobile hardwareRahul S
 

What's hot (20)

Mobile os upcoming tech
Mobile os upcoming techMobile os upcoming tech
Mobile os upcoming tech
 
Smartphone 110810195522-phpapp02
Smartphone 110810195522-phpapp02Smartphone 110810195522-phpapp02
Smartphone 110810195522-phpapp02
 
The Smartphone Snapshot Showdown (Global Smartphone and Mobile Video Stats)
The Smartphone Snapshot Showdown (Global Smartphone and Mobile Video Stats)The Smartphone Snapshot Showdown (Global Smartphone and Mobile Video Stats)
The Smartphone Snapshot Showdown (Global Smartphone and Mobile Video Stats)
 
Smartphone and their market
Smartphone and their marketSmartphone and their market
Smartphone and their market
 
Virtual Merchant Mobile Swipe Solution
Virtual Merchant Mobile Swipe SolutionVirtual Merchant Mobile Swipe Solution
Virtual Merchant Mobile Swipe Solution
 
Smartphone Component Trends and Outlook (Sept 2013)
Smartphone Component Trends and Outlook (Sept 2013)Smartphone Component Trends and Outlook (Sept 2013)
Smartphone Component Trends and Outlook (Sept 2013)
 
Are you Smart Phone savvy?
Are you Smart Phone savvy?Are you Smart Phone savvy?
Are you Smart Phone savvy?
 
L01 New Technology 2017 Course Description
L01 New Technology 2017 Course DescriptionL01 New Technology 2017 Course Description
L01 New Technology 2017 Course Description
 
Introduction to mobile technology
Introduction to mobile technologyIntroduction to mobile technology
Introduction to mobile technology
 
Mobile testing
Mobile testingMobile testing
Mobile testing
 
Introduction to Mobile
Introduction to MobileIntroduction to Mobile
Introduction to Mobile
 
Hardware1n
Hardware1nHardware1n
Hardware1n
 
Network
Network Network
Network
 
Mobile phone
Mobile phoneMobile phone
Mobile phone
 
The Smartphone Economy
The Smartphone EconomyThe Smartphone Economy
The Smartphone Economy
 
Mobile World Congress 2011 Overview
Mobile World Congress 2011 OverviewMobile World Congress 2011 Overview
Mobile World Congress 2011 Overview
 
Artist l1mobilecomputing
Artist l1mobilecomputingArtist l1mobilecomputing
Artist l1mobilecomputing
 
Presentation on mobile phones
Presentation on mobile phonesPresentation on mobile phones
Presentation on mobile phones
 
Mobile Ecosystem
Mobile EcosystemMobile Ecosystem
Mobile Ecosystem
 
mobile hardware
mobile hardwaremobile hardware
mobile hardware
 

Similar to The Complete Guide to Mobile Devices, Operating Systems and Security

Mobile devices ppt
Mobile devices pptMobile devices ppt
Mobile devices pptim_mi
 
Chapter#01 Introduction, Basic Concepts, Mobile OS (1).pptx
Chapter#01 Introduction, Basic Concepts, Mobile OS (1).pptxChapter#01 Introduction, Basic Concepts, Mobile OS (1).pptx
Chapter#01 Introduction, Basic Concepts, Mobile OS (1).pptxTayyab AlEe
 
Operating Systems in Mobile Phones
Operating Systems in Mobile PhonesOperating Systems in Mobile Phones
Operating Systems in Mobile PhonesSasukeJUchiha
 
Mobile Operating Systems
Mobile Operating Systems Mobile Operating Systems
Mobile Operating Systems Anant Lodha
 
Securing hand held computing devices
Securing hand held computing devicesSecuring hand held computing devices
Securing hand held computing devicesjraja01
 
Mobile 111229042626-phpapp02
Mobile 111229042626-phpapp02Mobile 111229042626-phpapp02
Mobile 111229042626-phpapp02Rajasekar Sekaran
 
Freescale i.mx golden presentation for blogger july 2011
Freescale i.mx golden presentation for blogger july 2011Freescale i.mx golden presentation for blogger july 2011
Freescale i.mx golden presentation for blogger july 2011Dylan Ko
 
Mobile computing The brief explanation of mobile computing and how it used
Mobile computing The brief explanation of mobile computing and how it usedMobile computing The brief explanation of mobile computing and how it used
Mobile computing The brief explanation of mobile computing and how it usedAsyathShahina
 
Vulnerabilities in Mobile Devices
Vulnerabilities in Mobile DevicesVulnerabilities in Mobile Devices
Vulnerabilities in Mobile DevicesCSCJournals
 
Open-RnD Mobile Offer
Open-RnD Mobile OfferOpen-RnD Mobile Offer
Open-RnD Mobile OfferOpen-RnD
 
Welcome To The Mobile World
Welcome To The Mobile WorldWelcome To The Mobile World
Welcome To The Mobile WorldFrank La Vigne
 
551_MH_overview_handout.ppt
551_MH_overview_handout.ppt551_MH_overview_handout.ppt
551_MH_overview_handout.pptNiloyMondal10
 

Similar to The Complete Guide to Mobile Devices, Operating Systems and Security (20)

Mobile devices ppt
Mobile devices pptMobile devices ppt
Mobile devices ppt
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
 
Smartphones
SmartphonesSmartphones
Smartphones
 
Chapter#01 Introduction, Basic Concepts, Mobile OS (1).pptx
Chapter#01 Introduction, Basic Concepts, Mobile OS (1).pptxChapter#01 Introduction, Basic Concepts, Mobile OS (1).pptx
Chapter#01 Introduction, Basic Concepts, Mobile OS (1).pptx
 
smart phone
smart phonesmart phone
smart phone
 
Operating Systems in Mobile Phones
Operating Systems in Mobile PhonesOperating Systems in Mobile Phones
Operating Systems in Mobile Phones
 
Mobile Operating Systems
Mobile Operating Systems Mobile Operating Systems
Mobile Operating Systems
 
Securing hand held computing devices
Securing hand held computing devicesSecuring hand held computing devices
Securing hand held computing devices
 
Smart phone
Smart phoneSmart phone
Smart phone
 
onlineshoping.pptx
onlineshoping.pptxonlineshoping.pptx
onlineshoping.pptx
 
Mobile 111229042626-phpapp02
Mobile 111229042626-phpapp02Mobile 111229042626-phpapp02
Mobile 111229042626-phpapp02
 
Freescale i.mx golden presentation for blogger july 2011
Freescale i.mx golden presentation for blogger july 2011Freescale i.mx golden presentation for blogger july 2011
Freescale i.mx golden presentation for blogger july 2011
 
Mobile computing The brief explanation of mobile computing and how it used
Mobile computing The brief explanation of mobile computing and how it usedMobile computing The brief explanation of mobile computing and how it used
Mobile computing The brief explanation of mobile computing and how it used
 
Smart phone
Smart phoneSmart phone
Smart phone
 
Vulnerabilities in Mobile Devices
Vulnerabilities in Mobile DevicesVulnerabilities in Mobile Devices
Vulnerabilities in Mobile Devices
 
Smartphones 2015
Smartphones 2015Smartphones 2015
Smartphones 2015
 
Open-RnD Mobile Offer
Open-RnD Mobile OfferOpen-RnD Mobile Offer
Open-RnD Mobile Offer
 
Welcome To The Mobile World
Welcome To The Mobile WorldWelcome To The Mobile World
Welcome To The Mobile World
 
Prezentare 1 - LTM
Prezentare 1 - LTMPrezentare 1 - LTM
Prezentare 1 - LTM
 
551_MH_overview_handout.ppt
551_MH_overview_handout.ppt551_MH_overview_handout.ppt
551_MH_overview_handout.ppt
 

Recently uploaded

JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...amber724300
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Nikki Chapple
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
Landscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdfLandscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdfAarwolf Industries LLC
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...itnewsafrica
 
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...BookNet Canada
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditSkynet Technologies
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesManik S Magar
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integrationmarketing932765
 
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)Mark Simos
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
Accelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with PlatformlessAccelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with PlatformlessWSO2
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkPixlogix Infotech
 

Recently uploaded (20)

JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
Landscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdfLandscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdf
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
 
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance Audit
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
 
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
Accelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with PlatformlessAccelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with Platformless
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App Framework
 

The Complete Guide to Mobile Devices, Operating Systems and Security

  • 2. Index Introduction TheHistory of MobileDevices Typesof MobileDevices Typesof Mobile OperatingSystems TheFuture of MobileDevices VISUALIZING MOBILE SECURITY ATTACKS MOVING TO MOBILE – WHY? Wi-Fi SMART PHONE & MOBILE DEVICE THREATS HACKERS – TRADITIONAL SECURITY CHALLENGE OF SMART PHONE & MOBIL DEVICE
  • 3. Introduction Mobile Device?  Apocket-sized computing device, typically having adisplay screen with touch input or aminiaturekeyboard
  • 4. history It can be said thatthe mobile devices was born at the same time the radio communication had been invented. The development of mobile devices starts fromthe 1920's, there are five stages.
  • 5. Stage One 1920's-1940's  Based on several wave bands of shortwave, the private mobile communication system had been invented.  The Detroit police car radio system is the representative one.  The frequency of this system is 2MHz at thattime. In the 1940's the frequency had been risen to 30~40MHz.  Itis considered as the beginning of the modern mobile service.
  • 6. Stage Two 1940's-1960's  The public mobile service came out.  1946 According to the plan of Federal Communications Commission(FCC) the Bell system established the first public car phone net inSt.Louis.  There was three channles in thattime, the mode wassimplex.
  • 7. Stage Three 1960's-1970's America improved the mobile telephony system(1MTS) This period complete : automatic channel choose automatic dialing tothenet
  • 8. Stage Four 1970's-1980's( the peak time) The Bell Labs successfully developed the advanced mobile phonesystem(AMPS) The cellular network builtup, improved the capacity of thesystem. The cellular network becames the utility system, used in theworldwide.
  • 9. Stage Four Achivements in thisstage:  microelectronic technique got a significant development which made the probability of miniaturization mobile devices be true.  The new system of mobile communication----cellular network  provide the technique for the manage and control of the large size net
  • 10. Stage Five 1980's- The Digital Mobile Communication System(DMCS) gets developed and mature in this period. AMPS & TACS stand for the CellularNetworks Ⅰ→analogsystem
  • 11. Typesof Mobile Devices Mobile Computers  Notebook PC,MobilePC… Handheld GameConsoles Media Recorders  Digital Camera, Digital Video Camera…
  • 12. Contd… Media Players/Displayers  E-book Reader… Communication Devices  Mobile Phone,Pager… Personal Navigation Devices
  • 13. Different Sizes& Typesof Mobile • Computer size • Micro computer • Mobile • Informationappliance • Calculators
  • 14. Largecomputer super computer- Thefastest type of computer. Minisuper computer - constituted a short-lived class of computers that emerged in themid-1980s
  • 15. Micro computer  Personal computer - is any general-purpose computer whosesize, capabilities, and original sales price make it useful forindividuals  Home SFF(net top) - designed to minimize the spatial volume of a desktop computer.  Portable computer - designed to be moved from one place to another and includes a display andkeyboard.  Arcade system board - created for the purpose of runningvideo arcade games.  Video game console - is an interactive entertainment computeror modified computer system
  • 16. Mobile Laptop - is a personal computer designed for mobile use. Desktop replacement computer - provides most of the capabilities of a desktop computer, with a similar level of performance. Subnotebook(net book ,smart book) - designed andmarketed with an emphasis onportability. Tablet computer - calculator watch, wristop, virtual rentinaldisplay, head-mounted display.
  • 17. Information appliance PDA (palm size PC,handheld PC,pocketcomputer) - also known as a palmtop computer. Mobile phone (smart phone, feature phone) -Amobile phone (also called mobile, cellular telephone, or cell phone) is an electronic device used to make mobile telephone calls across a wide geographicarea. P M P - A portable media player. DAP-A digital audio player. E-book reader - designed primarily for the purposeof reading digital books andperiodicals. Handheld gameconsole - allowing people to carry them and play them at any time orplace.
  • 18. Calculators Scientific - designed to calculate problems in science(especiallyphysics), engineering, and mathematics. programmable- calculators capable of being programmed much like a computer. Graphing- capable of plotting graphs, solving simultaneous equations, and performing numerous other tasks withvariables.
  • 19. What is mobile operatingsystem? Amobile operating system, also known asamobile OS, a mobile platform, or ahandheld operating system, is the operating system that controls amobile device or information appliance
  • 21. Themost common operating systems o SymbianOSSymbianFoundation Android from GoogleInc. iOSfrom Apple Inc. RIMBlackBerry OS Windows Mobile from Microsoft Linux operating system MeeGo from Nokia andIntel
  • 22.  Android Always displayed before you download from Google Play store  ie: “Why does this calorie counter need to access my camera and phone calls?”  iOS  A little more secure  Apps now default to no permissions outside of theirsandbox  ie: “This app wants to use yourlocation."  Windows  App settings are viewable before install or through“Settings” Similar toAndroid 9
  • 23. Android 25.5%Market ShareSales Q32010 Android is an opensource, Linux-derived platform backed by Google along with majorhardware and software developers (such asIntel, HTC,ARM, Samsung,Motorola and eBay
  • 24. iOS 16.7%Market ShareSales Q32010 TheApple iPhone, iPod Touch and iPad all usean operating system
  • 25. RIM BlackBerry OS Originally designedfor business Recently hasbeen improved to offerfull multimedia support Over 15,000 downloadable applications
  • 26. Windows phone (2.8% Market ShareSales Q32010) Widely spread inAsia Support both touch screen and physical keyboard configurations
  • 27. Linux operating system open source,GPL(2.1% Market ShareSalesQ3 2010, non-Android Linux-based OS'sonly)
  • 28. Nokia and Intel both unveiled 'MeeGo' abrand new mobile operating system which would combine the best of Moblin and the best of Maemo to create atruly open-sourced experience for users acrossall devices.
  • 29. êUsageshare of web client operating systems.(Source: Median values from Usage share of operating systems for January2011.) Windows XP(41.70%) . Windows 7 (25.42%) % Windows Vista (15.43%) 5 Mac OSX(6.92%) 5 iOS(iPhone) (2.05%) 0 Linux(1.64%)
  • 30. 6.2.4 AUTHENTICATION: PATTERN LOCK  Swipe path of length 4–9 on 3 x 3 grid  Easy to use, suitable for mobile devices  Problems:  389,112 possible patterns; (456,976 possible patterns for 4-char case- insensitive alphabetic password!) Attacker can see pattern from finger oils on screen SMARTPHONEANDMOBILEDEVICESECURITY 24
  • 31. Future The mobile devices plays an indispensable role in nowaday's life, meanwhile this field is still rapidly developing. More app is going tobe added into. In 2004 July 16, Japanese telephone company NTT DoCoMo announced the P605iC phone which carried the FeliCa soft. This phone opened the curtain of No Cards Generation.
  • 32. Future Nowadays the manufactures of mobile devices are devoting on touching screen and 3D effect. More and moreAPP will be added intothe mobile devices, make people's life much more convenient and fun.
  • 33. VISUALIZING MOBILE SECURITY There are three points of control. SMART PHONE AND MOBILE DEVICE SECURITY • • • On the left you have device security, protecting both the device and the data. On the top right you have mobile application security which includes secure application development and analyzing applications for security risk. The bottom right highlights the need for to provide secure access to applications • and data. They are all interlinked and interconnected. 4
  • 34. ATTACKS MOVING TO MOBILE – WHY? SMART PHONE AND MOBILE DEVICE SECURITY 3.1 Mobile devices are connection-enabled 3G/LTE Bluetooth Camera – QR Code Wi-Fi NFC GSM – SMS 3.2 Valuable data Phone information - IMEI, Phone number, SMS history, etc. Contact list - Social engineering, Spam database Geo-location information - Spy, Track history Images/Camera - Spy, Surrounding environment 3.3 Valuable resource High speed CPU Powerful computing Always-On Internet connection o l 3.4 Smart OS eco-system  App store market : Easy access / Simple install Awareness : Permission review / Security to s flash, etc.  PC threats in mobile: email, links,brows5 ers,
  • 35. Wi-Fi Carriers collect WIFI network names/BSSIDs and correlating GPS data Fine-tune location  Can be usedindoors Google got in trouble in 2010 for collecting data with their StreetView cars Decided it was simpler to use mobile devices Enormous userbase Constantly updated 8
  • 36. 5. SMART PHONE & MOBILE DEVICE THREATS Four MajorActors  Government agencies  Carriers/Providers  Hackers  Thieves 11
  • 37. HACKERS - TRADITIONAL  Network-Based Normal web-based rules apply Beware public Wi-Finetworks  App security is getting bettereveryday  A lot of unencrypted sensitive traffic is still sent and received Major hole in iOS7 < 7.0.6 / iOS6 <6.1.6  70% of Android devices in circulation Affected by known, remote code execution vulnerability  Beware QR Codes! 14
  • 38. SECURITY CHALLENGE OF SMART PHONE & MOBILE DEVICE • • • • • • 1 in 20 Mobile devices stolen in 2010. 70% of Mobile device spam is fraudulent financial services. 350% by which Wi-Fi hotspots are set to increase by 2015, providing more opportunities for “man-in-the middle” attacks. 155% by which mobile malware increased 2011. 77% growth in Google Android malware from Jun 2010 to Jan 2011. 10 Billion Android app downloads reached by the end of 2011 – over 90% of the top 100 have been hacked. Source: Evans Data Mobile Developer Survey Mobile Development Report 2012 Volume Source: Business Insider (September 2012) 3
  • 39. a) GPS  Most obvious  Pretty accurate outdoors, but not so much indoors  Very useful  Third party applications use GPS for correlation  Sometimes stored locally and accessible. b) CELL-NETWORK  Tower Triangulation  Can be used alongside GPS  Mandatory use in emergencies  Law enforcement  Carriers  As long as you have a phone, this information is available  Sometimes legalities or warrants involved 7
  • 40. b) SOCIAL MEDIA  The success of mobile devices and global rise of socialmedia are unquestionably intertwined Outside of the obvious personal data Geo-tagged updates on Facebook andTwitter Facebook Graph search makes hiding online much more difficult LinkedIn open by default Useful tool for social engineers  Site is scraped for names and corporate structure 10