You are on page 1of 16

S.V.

COLLEGE OF ENGINEERING

DEPARTMENT OF E.C.E

Seminar

On

MOBILE SECURITY

Submitted by

SHEIK.SHARMILA

Roll no : 16BF1A04J7
MOBILE DEVICE SECURITY
CONTENTS

 INTRODUCTION
 SECURITY ISSUES WITH MOBILE PHONE
 TYPES OF MOBILE SECURITY
 MOBILE DAMAGES
 THREAT TECHNOLOGIES
 CONCLUSION
INTRODUCTION

 Used to call and send text messages.


 Have internet access, built in video cameras and ability to
install additional software.
 Contain a lot of private data and unfortunately a phone can be
lost easily.
 You don’t need to break a window to break into a house you
just need someone to let you in.
SECURITY ISSUE WITH MOBILE PHONE

PHYSICAL SECURITY:-
A phone can be confiscated or stolen. We should always enable some
kind of password protection on our phone.

VOICE:-
Although the voice on the mobile phone channel is encrypted, this
encryption was hacked sometimes ago and is not considered safe
anymore.
CONT…

SMS:-
Text messages are sent in plain text over the network, so they are
also not considered secure.

IMEI No:-
Beware that your phone also have a unique identifier, so switching SIM
cards will not guarantee to protect your privacy.
TYPES OF MOBILE SECURITY

1. MOBILE DEVICE SECURITY


a. screen locks
b. lock out settings
c. GPS
d. Remote wiping
e. Application controls
CONT…

2.MOBILE APPLICATION SECURITY


a. Encryption
b. Authentication
c. Geotagging
d. Application whitelisting
MOBILE DAMAGES

 Tracking location
 Stealing Emails
 Hijacking Messages
 Stealing passwords
 Microphone Recordings
 Taking photos
 Stealing contact lists
MOBILE SECURITY TECHNOLOGIES

1. MOBILE DEVICE MANAGEMENT


MDM is a security application that allows your IT team to
centrally monitor, manage, and secure employees’ mobile devices.

2. MOBILE DEVICE DEFENSE


MDT solutions protect mobile devices against threats using
techniques such as network protection, vulnerability management,
behavioral anomaly detection, application scanning, and risk management.

Using MTD solutions along with MDM software helps to improve threat detection and
remediation
CONT…

3. MOBILE APPLICATION MANGEMENT


MAM software solutions helps in managing and controlling access to
internal and commercial mobile apps. These solutions direct users can
secure app stores as well as provide administrators with granular controls
to manage the apps.

4.CONTAINERIZATION
Containerization is technology that helps create virtual pieces of a hardware
infrastructure and then splits these pieces from the rest of architecture. It helps to improve
mobile security by keeping personal information separate from business data , isolating
malicious mobile apps, storing apps, and storing sensitive information in an encrypted area.
CONT…

5. NETWORK PROTECTION
Network protection is a technology along with securing your mobile
devices, it is also important to secure the networks. Network tools help
identify malicious traffic, rouge access points, and fake SSL certificates.
Network protection tools also protect endpoints within your organization.

6. NETWORK ANOMALY DETECTION


WI-FI MAN–IN-THE-MIDDLE(MIM) attacks, risks can be controlled and
minimized.
Conclusion

Mobile devices do pose some threat to corporate world. But its is necessary
direction. There are steps that can be taken to secure the devices. Employees can be
trained and educated on corporate society to help understand risks involved. There are
steps company can take to secured the devices with employee compromise if they want
to use their own devices. IT installing security software on to devices for some
protection of intrusions and the fingerprint lock requirements are two examples our
world is run on mobile technology and it is impossible to not involve mobile devices in
business. It is a matter of how to make them safer to use for business and not cause a
breach of data in the process.
REFERRENCE

http://csrc.nist.gov/nissc/2019/proceedings
QUERIES ?
THANK YOU

You might also like