Professional Documents
Culture Documents
MOBILE
COMPUTING
SECURITY
MOBILE COMPUTING
SECURITY
The protection of smartphones, tablets, and
laptops from threats associated with wireless
computing.
It has become increasingly important in mobile
computing.
Global System for Mobile
Communication (GSM)
The Global System for Mobile Communications is a
standard developed by the European Telecommunications
Standards Institute to describe the protocols for second-
generation digital cellular networks used by mobile devices
such as mobile phones and tablets.
GSM Architecture
The Mobile Station (MS)
The MS consists of the physical
equipment, such as the radio
transceiver, display and digital
signal processors, and the SIM
card.
It provides the air interface to the
user in GSM networks. As such,
other services are also provided.
What is SIM? use padlet-link
The Base Station Subsystem (BSS)
It is protected database
It maintained authentication keys
and algorithms.
It contain a register called
Equipment Identity Register.
Network System (NS)
D. Mobile switching center (MSC)
Risk Areas
Risk Area 1
Physical Risks
Risk Area 2
Service Risks
Risk Area 3
App Risks
Mobile Risk Model
Illustration of attack surfaces specific to mobile devices:
Mobile Hacking
The attackers are easily able to compromise the mobile network
because of various vulnerabilities, the majority of the attacks are
because of the untrusted apps.
Mobile Hacking:
Basic Cellular Network
Functionality
Manage everything else about the mobile Contains information that allows the
device’s association, usage, handoff, and mobile device to synchronize and
disconnection from the cellular network. understand which network it is attaching
to, along with features (like neighboring
cell identities and channel information) of
the network.
Mobile Hacking:
Basic Cellular Network
Functionality
Mobile device is letting the GSM network A mechanism for connecting a phone call
know which area it’s in to a recording device, saving that
digitized file somewhere, and helpfully
replaying that sound file during another
call
Mobile Hacking:
Basic Cellular Network
Functionality
Unauthorized device
They exist for the sole purpose of
stealing sensitive information like credit
card numbers, passwords, and more.
Rogue Mobile
Devices
Countermeasure
Unauthorized device
They exist for the sole purpose of
stealing sensitive information like credit
card numbers, passwords, and more.
Rogue
station
Attack