14
Mobile Security Guide Matt Scofield, Eric Samson, Cong Le

Mobile Security Guide Matt Scofield, Eric Samson, Cong Le

Embed Size (px)

Citation preview

Page 1: Mobile Security Guide Matt Scofield, Eric Samson, Cong Le

Mobile Security Guide

Matt Scofield, Eric Samson, Cong Le

Page 2: Mobile Security Guide Matt Scofield, Eric Samson, Cong Le

Overview

I. Introduction

II. Background

III.Related Works I

IV.Related Works II

V. Survey

VI.Results

VII.Conclusion

VIII.Questions and Comments

Page 3: Mobile Security Guide Matt Scofield, Eric Samson, Cong Le

Introduction

Goal: Create a simple Best Practice Guidelines

for Mobile Device Security

Methodology: Two Pronged Approach

a. Research topics related to mobile security and

existing and conduct a survey to obtain user

behavior patterns.

b. Use gathered information to create a simpler and

easier to follow guideline.

Page 4: Mobile Security Guide Matt Scofield, Eric Samson, Cong Le

Background

There are currently 1.2 billion mobile web users

according to mobithinking.comhttp://mobithinking.com/mobile-marketing-tools/latest-mobile-stats

The threat of malicious attacks to mobile devices is likely to increase according to a paper on malicious software in mobile devices.

http://lyle.smu.edu/~tchen/papers/mobile-malware.pd

Existing guidelines are often overly specific, highly specialized, or obscure.

Page 5: Mobile Security Guide Matt Scofield, Eric Samson, Cong Le

Research I

Guidelines exampleshttps://wiki.internet2.edu/confluence/display/itsg2/Mobile+Device+Security

http://www.cmu.edu/iso/governance/guidelines/mobile-device.html

http://www.stanford.edu/group/security/securecomputing/mobile_devices.html

Common suggestions

• Enable Password

• Keep Software Updated

• Back up data

• Install anti-virus

Page 6: Mobile Security Guide Matt Scofield, Eric Samson, Cong Le

Research II

MMS and bluetooth• MMS vulnerabilities bypassed through use of CAPTCHAs

• BlueTooth vulnerabilities bypassed through a number of means

• Possibly eliminated entirely at the Telecom level

Cloud based antivirus• Advantages: Power consumption, Computing power, Larger databaseDisadvantages: Requires internet connection, Reactive protection

Manufacturer Enabled Security• Radio control parameters are stored during the manufacturing process

• Secure booting

Page 7: Mobile Security Guide Matt Scofield, Eric Samson, Cong Le

Survey

Target Audience: General Mobile Device users

Total Number of Participants:38

Objective: Obtain data on mobile device usage patterns

Distribution Model: Online Survey (Google Docs - Forms)

Page 8: Mobile Security Guide Matt Scofield, Eric Samson, Cong Le

Results I

Page 9: Mobile Security Guide Matt Scofield, Eric Samson, Cong Le

Results II

Page 10: Mobile Security Guide Matt Scofield, Eric Samson, Cong Le

Results III

Page 11: Mobile Security Guide Matt Scofield, Eric Samson, Cong Le

Results IV

Page 12: Mobile Security Guide Matt Scofield, Eric Samson, Cong Le

Conclusion / Proposed Guideline

Enable password lock

Keep software up-to-date

Read reviews and comments of applications

Install anti-virus software

Back up data regularly

Turn off bluetooth discovery

Page 13: Mobile Security Guide Matt Scofield, Eric Samson, Cong Le

Extended Guideline

Read permission requests before accepting

Enable remote lock and wipe

Keep up to date on information about

security

Do not join unknown access points

Only download from trusted sources

Do not leave device unattended

Use our guideline!

Page 14: Mobile Security Guide Matt Scofield, Eric Samson, Cong Le

Comments and Questions ?

All your questions are belong to us!