SlideShare ist ein Scribd-Unternehmen logo
1 von 43
A Way to Protect yours Personal Life
1. A smartphone is a mobile phone with
highly advanced feature and fully
customize.
Connectivity (Wi-Fi, Bluetooth )
Works as Personal Computer
Advance operating system
Three Major Operating System used in Smartphone –
A. Android Operating System
Developed by Android , Inc.
Google bought android in 2005
Use Linux Kernel , java and Freeware
B. iOS ( iPhone Operation System ) –
Created and Developed by Apple , Inc.
Based on OSX , A Variant of BSD Unix Kernel
Paid OS
C. Windows Operating System –
Created and Developed by Microsoft
First Launch in Oct 2010
Paid OS
2.1 Interesting Facts about smartphone –
Mobile Phone Users are increased day by day
Security Risk Associate with Mobile phone also increase
Now a day users moving toward feature phone to
smartphone.
1. No. of smartphone user world wide
2. Smartphone Users by Country
1. No. of smartphone user world wide
1. No. of smartphone user world wide
1. No. of smartphone user world wide
1. No. of smartphone user world wide
1. No. of smartphone user world wide
1. No. of smartphone user world wide
1. No. of smartphone user world wide
Mobile phone industry is the fastest
growing industry in the world.
70% of mobile phones are manufactured
in China.
Around 80% of the world’s population has
a mobile phone.
74 % of smartphone users use their mobile
phone to help with shopping
69% of Smartphone users use their mobile
phone to making a purchase.
49% Mobile phone users mostly spend their
time on games
99% of all mobile malware is targeted at
Android users.
Spy software found Preinstall on Lenovo ,
Huawei and Xiaomi smartphone (F-secure)
India Air Force suggests to it’s employes
not to use Xiaomi Smartphone.
Attacker can performed different task by
hacked a User Smartphone
Listening the telephone conversation
Access the internet
View and copy contacts
Installing unwanted apps
Asking for location data
Taking and Coping personal image
Recording conversation using microphone
Sending and Reading SMS/MMS
Disable Antivirus Software
Listening into the chat via messaging
services ( Whatsapp ,Facebook and
Google+)
Reading browser history
Stolen your personal information
In Today world there the uses for
smartphone are increase so risk associated
with smartphone also increase day by day
So there are major security risk or threats
and their prevention are also discuss in
this presentation.
Attack
This is physical attack.
Hacker can access or misuses your secrete
data physically
Can wipe your important information
Defense
Protect your smartphone by anti-theft
protection.
Use Disk Encryption to protect your data.
Always use lock screen feature by good
Password
Attack
Creating a Fake page that look like original
page and grab the information enter by
user.
Sending the link via text/email etc.
User think it’s a real website page.
Attack ( Facebook Phishing Page )
Defense
Check Web Address URL.
Check SSL key Pad lock.
Check SSL Certificate Details.
Defense ( Facebook Original Page )
Attack
1. Attacker call to users can ask his/her
card (Credit/Debit) details.
Perform Fraud by online Transaction .
User’s Financial loss
Attack (Way to ask card Details)
Attack
2. Attacker send spam Mail or SMS to users .
About Card block or Suspicious activity.
User call to number that is given in mail/sms
The number look like real phone banking
number.
Attack (Fake Mail)
Attack (Fake SMS)
Attack
Defense
Make a Call Only Authorize phone banking
number of that bank.
Never share your card detail like (CVV , Exp.
Date , OTP & Pin ) to anyone.
Bank Never call to it’s users for card details.
Attack
Attacker build Malicious app that look like
Real app.
This App can work as –
Trojan horse (Banking or Other )
Spyware
Defense
Always download app from trusted source .
Check Digital Signature for Third Party App.
Smartphone  security
Smartphone  security
Smartphone  security
Smartphone  security
Smartphone  security

Weitere ähnliche Inhalte

Was ist angesagt?

cellphone virus and security
cellphone virus and securitycellphone virus and security
cellphone virus and security
Akhil Kumar
 

Was ist angesagt? (20)

Mobile security
Mobile securityMobile security
Mobile security
 
Ensuring Mobile Device Security
Ensuring Mobile Device SecurityEnsuring Mobile Device Security
Ensuring Mobile Device Security
 
Wireless and mobile security
Wireless and mobile securityWireless and mobile security
Wireless and mobile security
 
Mobile security
Mobile securityMobile security
Mobile security
 
Android Device Hardening
Android Device HardeningAndroid Device Hardening
Android Device Hardening
 
Network Security Presentation
Network Security PresentationNetwork Security Presentation
Network Security Presentation
 
Mobile Security 101
Mobile Security 101Mobile Security 101
Mobile Security 101
 
Mobile device security
Mobile device securityMobile device security
Mobile device security
 
Mobile Device Security
Mobile Device SecurityMobile Device Security
Mobile Device Security
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
cellphone virus and security
cellphone virus and securitycellphone virus and security
cellphone virus and security
 
Mobile security
Mobile securityMobile security
Mobile security
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Mobile Application Security
Mobile Application SecurityMobile Application Security
Mobile Application Security
 
Cyber Security in Society
Cyber Security in SocietyCyber Security in Society
Cyber Security in Society
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
 
Cyber security
Cyber securityCyber security
Cyber security
 
Final cyber crime and security
Final cyber crime and securityFinal cyber crime and security
Final cyber crime and security
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 

Ähnlich wie Smartphone security

Running head mobile application security1mobile application se.docx
Running head mobile application security1mobile application se.docxRunning head mobile application security1mobile application se.docx
Running head mobile application security1mobile application se.docx
todd581
 
Running head mobile application security1mobile application se.docx
Running head mobile application security1mobile application se.docxRunning head mobile application security1mobile application se.docx
Running head mobile application security1mobile application se.docx
glendar3
 
Mobile security 8soft_final_summercamp2011
Mobile security 8soft_final_summercamp2011Mobile security 8soft_final_summercamp2011
Mobile security 8soft_final_summercamp2011
Zarafa
 
Smartphone Security
Smartphone SecuritySmartphone Security
Smartphone Security
Malasta Hill
 
Absolutely no plagiarism  Topic Mobile users and d.docx
Absolutely no plagiarism  Topic  Mobile users and d.docxAbsolutely no plagiarism  Topic  Mobile users and d.docx
Absolutely no plagiarism  Topic Mobile users and d.docx
adkinspaige22
 

Ähnlich wie Smartphone security (20)

Running head mobile application security1mobile application se.docx
Running head mobile application security1mobile application se.docxRunning head mobile application security1mobile application se.docx
Running head mobile application security1mobile application se.docx
 
Running head mobile application security1mobile application se.docx
Running head mobile application security1mobile application se.docxRunning head mobile application security1mobile application se.docx
Running head mobile application security1mobile application se.docx
 
Security models of modern mobile systems
Security models of modern mobile systemsSecurity models of modern mobile systems
Security models of modern mobile systems
 
Smartphone Smart Card 061013
Smartphone Smart Card 061013Smartphone Smart Card 061013
Smartphone Smart Card 061013
 
Smartphones 2015
Smartphones 2015Smartphones 2015
Smartphones 2015
 
Cybersecurity and Mobile Device Protection - Nakov at CareerShow (Sept 2019)
Cybersecurity and Mobile Device Protection - Nakov at CareerShow (Sept 2019)Cybersecurity and Mobile Device Protection - Nakov at CareerShow (Sept 2019)
Cybersecurity and Mobile Device Protection - Nakov at CareerShow (Sept 2019)
 
Tips and Tricks on Securing your Android Devices
Tips and Tricks on Securing your Android DevicesTips and Tricks on Securing your Android Devices
Tips and Tricks on Securing your Android Devices
 
Mobile security 8soft_final_summercamp2011
Mobile security 8soft_final_summercamp2011Mobile security 8soft_final_summercamp2011
Mobile security 8soft_final_summercamp2011
 
Cyber security for women using mobile devices
Cyber security for women using mobile devicesCyber security for women using mobile devices
Cyber security for women using mobile devices
 
The Consumerisation of Corporate IT
The Consumerisation of Corporate ITThe Consumerisation of Corporate IT
The Consumerisation of Corporate IT
 
Smartphone Security
Smartphone SecuritySmartphone Security
Smartphone Security
 
Smartphone 7 aug14
Smartphone 7 aug14Smartphone 7 aug14
Smartphone 7 aug14
 
Techvorm com-android-security-issues-solutions
Techvorm com-android-security-issues-solutionsTechvorm com-android-security-issues-solutions
Techvorm com-android-security-issues-solutions
 
CS_UNIT 2(P3).pptx
CS_UNIT 2(P3).pptxCS_UNIT 2(P3).pptx
CS_UNIT 2(P3).pptx
 
Cp3201 mobile security final
Cp3201 mobile security finalCp3201 mobile security final
Cp3201 mobile security final
 
Absolutely no plagiarism  Topic Mobile users and d.docx
Absolutely no plagiarism  Topic  Mobile users and d.docxAbsolutely no plagiarism  Topic  Mobile users and d.docx
Absolutely no plagiarism  Topic Mobile users and d.docx
 
NETC 2012_Mobile Security for Smartphones and Tablets (pptx)
NETC 2012_Mobile Security for Smartphones and Tablets (pptx)NETC 2012_Mobile Security for Smartphones and Tablets (pptx)
NETC 2012_Mobile Security for Smartphones and Tablets (pptx)
 
Mobile Security for Smartphones and Tablets
Mobile Security for Smartphones and TabletsMobile Security for Smartphones and Tablets
Mobile Security for Smartphones and Tablets
 
IRJET- Android Device Attacks and Threats
IRJET-  	  Android Device Attacks and ThreatsIRJET-  	  Android Device Attacks and Threats
IRJET- Android Device Attacks and Threats
 
2010: Mobile Security - WHYMCA Developer Conference
2010: Mobile Security - WHYMCA Developer Conference2010: Mobile Security - WHYMCA Developer Conference
2010: Mobile Security - WHYMCA Developer Conference
 

Kürzlich hochgeladen

Obat Penggugur Kandungan Di Apotik Kimia Farma (087776558899)
Obat Penggugur Kandungan Di Apotik Kimia Farma (087776558899)Obat Penggugur Kandungan Di Apotik Kimia Farma (087776558899)
Obat Penggugur Kandungan Di Apotik Kimia Farma (087776558899)
Cara Menggugurkan Kandungan 087776558899
 

Kürzlich hochgeladen (6)

Mobile App Penetration Testing Bsides312
Mobile App Penetration Testing Bsides312Mobile App Penetration Testing Bsides312
Mobile App Penetration Testing Bsides312
 
Mobile Application Development-Android and It’s Tools
Mobile Application Development-Android and It’s ToolsMobile Application Development-Android and It’s Tools
Mobile Application Development-Android and It’s Tools
 
Obat Penggugur Kandungan Di Apotik Kimia Farma (087776558899)
Obat Penggugur Kandungan Di Apotik Kimia Farma (087776558899)Obat Penggugur Kandungan Di Apotik Kimia Farma (087776558899)
Obat Penggugur Kandungan Di Apotik Kimia Farma (087776558899)
 
Satara Call girl escort *74796//13122* Call me punam call girls 24*7hour avai...
Satara Call girl escort *74796//13122* Call me punam call girls 24*7hour avai...Satara Call girl escort *74796//13122* Call me punam call girls 24*7hour avai...
Satara Call girl escort *74796//13122* Call me punam call girls 24*7hour avai...
 
Mobile Application Development-Components and Layouts
Mobile Application Development-Components and LayoutsMobile Application Development-Components and Layouts
Mobile Application Development-Components and Layouts
 
Android Application Components with Implementation & Examples
Android Application Components with Implementation & ExamplesAndroid Application Components with Implementation & Examples
Android Application Components with Implementation & Examples
 

Smartphone security

  • 1. A Way to Protect yours Personal Life
  • 2. 1. A smartphone is a mobile phone with highly advanced feature and fully customize. Connectivity (Wi-Fi, Bluetooth ) Works as Personal Computer Advance operating system
  • 3. Three Major Operating System used in Smartphone – A. Android Operating System Developed by Android , Inc. Google bought android in 2005 Use Linux Kernel , java and Freeware
  • 4. B. iOS ( iPhone Operation System ) – Created and Developed by Apple , Inc. Based on OSX , A Variant of BSD Unix Kernel Paid OS
  • 5. C. Windows Operating System – Created and Developed by Microsoft First Launch in Oct 2010 Paid OS
  • 6. 2.1 Interesting Facts about smartphone – Mobile Phone Users are increased day by day Security Risk Associate with Mobile phone also increase Now a day users moving toward feature phone to smartphone.
  • 7. 1. No. of smartphone user world wide
  • 8. 2. Smartphone Users by Country
  • 9. 1. No. of smartphone user world wide
  • 10. 1. No. of smartphone user world wide
  • 11. 1. No. of smartphone user world wide
  • 12. 1. No. of smartphone user world wide
  • 13. 1. No. of smartphone user world wide
  • 14. 1. No. of smartphone user world wide
  • 15. 1. No. of smartphone user world wide
  • 16. Mobile phone industry is the fastest growing industry in the world. 70% of mobile phones are manufactured in China. Around 80% of the world’s population has a mobile phone.
  • 17. 74 % of smartphone users use their mobile phone to help with shopping 69% of Smartphone users use their mobile phone to making a purchase. 49% Mobile phone users mostly spend their time on games
  • 18. 99% of all mobile malware is targeted at Android users. Spy software found Preinstall on Lenovo , Huawei and Xiaomi smartphone (F-secure) India Air Force suggests to it’s employes not to use Xiaomi Smartphone.
  • 19. Attacker can performed different task by hacked a User Smartphone Listening the telephone conversation Access the internet View and copy contacts
  • 20. Installing unwanted apps Asking for location data Taking and Coping personal image
  • 21. Recording conversation using microphone Sending and Reading SMS/MMS Disable Antivirus Software
  • 22. Listening into the chat via messaging services ( Whatsapp ,Facebook and Google+) Reading browser history Stolen your personal information
  • 23. In Today world there the uses for smartphone are increase so risk associated with smartphone also increase day by day So there are major security risk or threats and their prevention are also discuss in this presentation.
  • 24. Attack This is physical attack. Hacker can access or misuses your secrete data physically Can wipe your important information
  • 25. Defense Protect your smartphone by anti-theft protection. Use Disk Encryption to protect your data. Always use lock screen feature by good Password
  • 26. Attack Creating a Fake page that look like original page and grab the information enter by user. Sending the link via text/email etc. User think it’s a real website page.
  • 27. Attack ( Facebook Phishing Page )
  • 28. Defense Check Web Address URL. Check SSL key Pad lock. Check SSL Certificate Details.
  • 29. Defense ( Facebook Original Page )
  • 30. Attack 1. Attacker call to users can ask his/her card (Credit/Debit) details. Perform Fraud by online Transaction . User’s Financial loss
  • 31. Attack (Way to ask card Details)
  • 32. Attack 2. Attacker send spam Mail or SMS to users . About Card block or Suspicious activity. User call to number that is given in mail/sms The number look like real phone banking number.
  • 36. Defense Make a Call Only Authorize phone banking number of that bank. Never share your card detail like (CVV , Exp. Date , OTP & Pin ) to anyone. Bank Never call to it’s users for card details.
  • 37. Attack Attacker build Malicious app that look like Real app. This App can work as – Trojan horse (Banking or Other ) Spyware
  • 38. Defense Always download app from trusted source . Check Digital Signature for Third Party App.