Professional Documents
Culture Documents
COLLEGE OF ENGINEERING
DEPARTMENT OF E.C.E
Seminar
On
MOBILE SECURITY
Submitted by
SHEIK.SHARMILA
Roll no : 16BF1A04J7
MOBILE DEVICE SECURITY
CONTENTS
INTRODUCTION
SECURITY ISSUES WITH MOBILE PHONE
TYPES OF MOBILE SECURITY
MOBILE DAMAGES
THREAT TECHNOLOGIES
CONCLUSION
INTRODUCTION
PHYSICAL SECURITY:-
A phone can be confiscated or stolen. We should always enable some
kind of password protection on our phone.
VOICE:-
Although the voice on the mobile phone channel is encrypted, this
encryption was hacked sometimes ago and is not considered safe
anymore.
CONT…
SMS:-
Text messages are sent in plain text over the network, so they are
also not considered secure.
IMEI No:-
Beware that your phone also have a unique identifier, so switching SIM
cards will not guarantee to protect your privacy.
TYPES OF MOBILE SECURITY
Tracking location
Stealing Emails
Hijacking Messages
Stealing passwords
Microphone Recordings
Taking photos
Stealing contact lists
MOBILE SECURITY TECHNOLOGIES
Using MTD solutions along with MDM software helps to improve threat detection and
remediation
CONT…
4.CONTAINERIZATION
Containerization is technology that helps create virtual pieces of a hardware
infrastructure and then splits these pieces from the rest of architecture. It helps to improve
mobile security by keeping personal information separate from business data , isolating
malicious mobile apps, storing apps, and storing sensitive information in an encrypted area.
CONT…
5. NETWORK PROTECTION
Network protection is a technology along with securing your mobile
devices, it is also important to secure the networks. Network tools help
identify malicious traffic, rouge access points, and fake SSL certificates.
Network protection tools also protect endpoints within your organization.
Mobile devices do pose some threat to corporate world. But its is necessary
direction. There are steps that can be taken to secure the devices. Employees can be
trained and educated on corporate society to help understand risks involved. There are
steps company can take to secured the devices with employee compromise if they want
to use their own devices. IT installing security software on to devices for some
protection of intrusions and the fingerprint lock requirements are two examples our
world is run on mobile technology and it is impossible to not involve mobile devices in
business. It is a matter of how to make them safer to use for business and not cause a
breach of data in the process.
REFERRENCE
http://csrc.nist.gov/nissc/2019/proceedings
QUERIES ?
THANK YOU