66
SECURING SMART PHONES AND OTHER PORTABLE ELECTRONIC DEVICES Effective Compliance Systems in Higher Education Paul J. Millis 06/13/2011 - Austin, TX

SECURING SMART PHONESAND OTHER PORTABLE …...AVG Community Powered Threat Report - Q1 2011. INTRODUCTION As smart phones become more ubiquitous, attackers ... Degradation of security

  • Upload
    others

  • View
    0

  • Download
    0

Embed Size (px)

Citation preview

Page 1: SECURING SMART PHONESAND OTHER PORTABLE …...AVG Community Powered Threat Report - Q1 2011. INTRODUCTION As smart phones become more ubiquitous, attackers ... Degradation of security

SECURING SMART PHONES AND

OTHER PORTABLE ELECTRONIC

DEVICES

Effective Compliance Systems in Higher Education

Paul J. Millis

06/13/2011 - Austin, TX

Page 2: SECURING SMART PHONESAND OTHER PORTABLE …...AVG Community Powered Threat Report - Q1 2011. INTRODUCTION As smart phones become more ubiquitous, attackers ... Degradation of security

‘Enterprises must now

support more devices than

ever before, in effect extending

their corporate firewalls and their corporate firewalls and

services to places they may

not be prepared for.’-- MacAfee Q4 2010 Report

Page 3: SECURING SMART PHONESAND OTHER PORTABLE …...AVG Community Powered Threat Report - Q1 2011. INTRODUCTION As smart phones become more ubiquitous, attackers ... Degradation of security

IS THERE A POINT?

The objective of this discussion is to

encourage the best controlled

implementation of smart phone

technology possible in a business technology possible in a business

context given that smart phones are

a valid business tool that will

become a normal part of the

business landscape.

Page 4: SECURING SMART PHONESAND OTHER PORTABLE …...AVG Community Powered Threat Report - Q1 2011. INTRODUCTION As smart phones become more ubiquitous, attackers ... Degradation of security

HIGHLIGHTS

� Crafting Proper Use Policy for Portable

Electronic Devices

� Configuring Portable Electronic Devices

for Securityfor Security

� Examining device encryption and other

tools

Page 5: SECURING SMART PHONESAND OTHER PORTABLE …...AVG Community Powered Threat Report - Q1 2011. INTRODUCTION As smart phones become more ubiquitous, attackers ... Degradation of security

WHY DO YOU ROB BANKS, WILLY?

“CAUSE THAT'S WHERE THE MONEY IS”. WILLY SUTTON

� Over 4.5 billion people use a cell phone every day,

creating an attractive target for cyber criminals

� 3 times as many people as use the Internet on

a daily basisa daily basis

�“… hackers will be where people are, and as

more …it is not surprising to find the

number of malware soaring …”

AVG Community Powered Threat Report - Q1 2011

Page 6: SECURING SMART PHONESAND OTHER PORTABLE …...AVG Community Powered Threat Report - Q1 2011. INTRODUCTION As smart phones become more ubiquitous, attackers ... Degradation of security

INTRODUCTION

� As smart phones become more ubiquitous, attackers

are beginning to target them both:

� As a means to access data stored on the phones themselves

� As a vector for gaining access to the business network

and/or introducing viruses and malware onto it.

� The phones must be protected from both over-the-� The phones must be protected from both over-the-

network intrusion (which can include over the 3G/4G

network, over wi-fi networks, and even over short

range Bluetooth connections) and from direct access

to data on the device if it is lost or stolen or otherwise

falls into the wrong hands.

-- Windows Security.com; ‘Windows Phone7 Security Implications’

Page 7: SECURING SMART PHONESAND OTHER PORTABLE …...AVG Community Powered Threat Report - Q1 2011. INTRODUCTION As smart phones become more ubiquitous, attackers ... Degradation of security

SECURING SMART PHONES: SOME ISSUES

� Mobile devices are:

� Constantly connected

� Substantially less protected than a personal

computer

� USERS IGNORE MOBILE SECURITY solutions and broadcast

both sensitive and personal data (such as their exact

location while on the go)

� One third of smart phone USERS ARE NOT AWARE OF THE

INCREASING SECURITY RISKS associated with using their

phones for financial purposes and to store personal data

(AVG and Ponemon Institute)

� Vulnerable to multiple attack vectors

� Email, Internet applications, Internet surfing, and text

messaging

Page 8: SECURING SMART PHONESAND OTHER PORTABLE …...AVG Community Powered Threat Report - Q1 2011. INTRODUCTION As smart phones become more ubiquitous, attackers ... Degradation of security

SECURING A SMART PHONE: SOME

SECURITY CONCEPTS

� The SANDBOX CONCEPT is used to provide an environment where applications have limited privileges and don’t have access to the file system, other applications and system resources that could be exploited.

� DATA ISOLATION occurs when each app also has its � DATA ISOLATION occurs when each app also has its very own local storage area on the phone that’s fully isolated from the data stored by other apps.

� Another way to implement DATA PROTECTION is to store information not on the phone itself but on a secure server that you can access from the phone. However, this exposes the data to security threats while it’s in transit. Thus it’s also important to secure data while it’s in transit.

Page 9: SECURING SMART PHONESAND OTHER PORTABLE …...AVG Community Powered Threat Report - Q1 2011. INTRODUCTION As smart phones become more ubiquitous, attackers ... Degradation of security

SPENDING A $1,000 TO SAFEGUARD $100

The trick is knowing what

your company needs—and

doesn’t—on the security frontdoesn’t—on the security front

�Response depends upon your

organization’s need for security

Page 10: SECURING SMART PHONESAND OTHER PORTABLE …...AVG Community Powered Threat Report - Q1 2011. INTRODUCTION As smart phones become more ubiquitous, attackers ... Degradation of security

SECURITY ESSENTIALS

• email message encryption

• Passcode locks

• Autolock

• Device wipes

• Automatic autowipes• Automatic autowipes

• Protected configuration profiles

• Continuous refresh

• Hardware encryption

Page 11: SECURING SMART PHONESAND OTHER PORTABLE …...AVG Community Powered Threat Report - Q1 2011. INTRODUCTION As smart phones become more ubiquitous, attackers ... Degradation of security

DEVICES OF CONCERN

� Blackberry

� iOS 1 devices

� Android

� Windows Phone 7� Windows Phone 7

1 Includes iPhone, iPod Touch and iPad

Page 12: SECURING SMART PHONESAND OTHER PORTABLE …...AVG Community Powered Threat Report - Q1 2011. INTRODUCTION As smart phones become more ubiquitous, attackers ... Degradation of security

SECURITY PROFILE: BLACKBERRY

RIM’s BlackBerry platform allows

more fine-grained application

controls for enterprises and remains

the go-to choice for many companiesthe go-to choice for many companies

Page 13: SECURING SMART PHONESAND OTHER PORTABLE …...AVG Community Powered Threat Report - Q1 2011. INTRODUCTION As smart phones become more ubiquitous, attackers ... Degradation of security

SECURITY PROFILE: IOS DEVICES1

The iPhone (and iPad) gives

enterprises enough security options

to enable them to say "yes" instead of

"no" to Apple in a business context

Apple chief operating officer Tim Cook said almost 20 � Apple chief operating officer Tim Cook said almost 20

percent of Fortune 100 companies have purchased

10,000 or more iPhones apiece; multiple corporations

and government organizations have purchased 25,000

iPhones each; and the iPhone has been approved in

more than 300 higher education institutions. -- Brian X.

Chen

1 Includes iPhone, iPod Touch and iPad

Page 14: SECURING SMART PHONESAND OTHER PORTABLE …...AVG Community Powered Threat Report - Q1 2011. INTRODUCTION As smart phones become more ubiquitous, attackers ... Degradation of security

SECURITY PROFILE: ANDROID

The Android operating system

allows for broader multitasking than

other popular smart phone OS’s,

� Android devices are able to support a wide range of

mobile security functionality that runs in the mobile security functionality that runs in the

background on an ongoing basis, such as automated

backups and virus scanning.

Page 15: SECURING SMART PHONESAND OTHER PORTABLE …...AVG Community Powered Threat Report - Q1 2011. INTRODUCTION As smart phones become more ubiquitous, attackers ... Degradation of security

SECURITY PROFILE: WINDOWS PHONE 7

Windows Phone 7 is targeted at

businesses:

� WP7 needs to mature and allow time for the

development of a third party security ecosystem

for the platformfor the platform

Page 16: SECURING SMART PHONESAND OTHER PORTABLE …...AVG Community Powered Threat Report - Q1 2011. INTRODUCTION As smart phones become more ubiquitous, attackers ... Degradation of security

THREATS

� Malware

� Hackers

� Thieves

Industrial espionage� Industrial espionage

� Untrained users

� Careless users

Page 17: SECURING SMART PHONESAND OTHER PORTABLE …...AVG Community Powered Threat Report - Q1 2011. INTRODUCTION As smart phones become more ubiquitous, attackers ... Degradation of security

VULNERABILITIES

� Loss of physical control

� Phone Hacks

� Weak encryption

� Weak authorization� Weak authorization

� Insecure configuration

� Unprotected system data

� Shoulder Surfing

� Social Engineering

� Mobile Malware

Page 18: SECURING SMART PHONESAND OTHER PORTABLE …...AVG Community Powered Threat Report - Q1 2011. INTRODUCTION As smart phones become more ubiquitous, attackers ... Degradation of security

LOSS OF PHYSICAL CONTROL

Losing the phone is the top concern

about any mobile device� Smartphones are small and that makes them easy to

lose or steal. Many mobile devices are left on tables

in restaurants and cafes, in taxis and on aircraft, or in restaurants and cafes, in taxis and on aircraft, or

are stolen from busy places. Each of these devices

may store sensitive corporate emails, customer

contact details and financial reports and analyses, as

well as personal data like mobile banking details and

more. – Kapersky Lab

Page 19: SECURING SMART PHONESAND OTHER PORTABLE …...AVG Community Powered Threat Report - Q1 2011. INTRODUCTION As smart phones become more ubiquitous, attackers ... Degradation of security

PHONE HACKS

� Hacking the apps�Forrester sees application control as the next

"battleground" for enterprises adopting iOS and

Android devices--How to Secure the iPhone and iPad for the Enterprise by Klint

Finley / August 2, 2010Finley / August 2, 2010

� Hacking the system� iPhone encryption hack

Page 20: SECURING SMART PHONESAND OTHER PORTABLE …...AVG Community Powered Threat Report - Q1 2011. INTRODUCTION As smart phones become more ubiquitous, attackers ... Degradation of security

WEAK ENCRYPTION

� “It is kind of like storing all your secret messages

right next to the secret decoder ring,” said

Jonathan Zdziarski, an iPhone developer and a

hacker who teaches forensics courses on

recovering data from iPhones. recovering data from iPhones.

� “I don’t think any of us [developers] have ever

seen encryption implemented so poorly before,

which is why it’s hard to describe why it’s such a

big threat to security.” -- Brian X. Chen

Page 21: SECURING SMART PHONESAND OTHER PORTABLE …...AVG Community Powered Threat Report - Q1 2011. INTRODUCTION As smart phones become more ubiquitous, attackers ... Degradation of security

WEAK AUTHORIZATION

�The first thing you should do with a

smartphone is enable password-

protection. This is the most important

aspect of smartphone security.� Employing a password that's easy to guess defeats the purpose � Employing a password that's easy to guess defeats the purpose

of password-protecting the device; use a passphrase of pick a

random password that isn't the word "password" or something

readily identifiable to the user like a birthday or a spouse’s

name

� Don't store that password anywhere on the phone, unless it's in

a secure password keeper app

�PINs vs. Passwords vs. Patterns� Are 4 numeric digits enough?

Page 22: SECURING SMART PHONESAND OTHER PORTABLE …...AVG Community Powered Threat Report - Q1 2011. INTRODUCTION As smart phones become more ubiquitous, attackers ... Degradation of security

INSECURE CONFIGURATION

Relying upon user configuration is always risky; you may also want to consider basic processes that let administrators enable smart phone PINs and passwords.PINs and passwords.

� Where possible, enforce compliance by blocking devices that you didn't configure

Page 23: SECURING SMART PHONESAND OTHER PORTABLE …...AVG Community Powered Threat Report - Q1 2011. INTRODUCTION As smart phones become more ubiquitous, attackers ... Degradation of security

WHAT MAKES AN INSECURE

CONFIGURATION?

� No security software

� Passwords not in use� Power-up

� No timeout configured

� Lack of anti-malware� Lack of anti-malware

� Inability to wipe remotely

Page 24: SECURING SMART PHONESAND OTHER PORTABLE …...AVG Community Powered Threat Report - Q1 2011. INTRODUCTION As smart phones become more ubiquitous, attackers ... Degradation of security

UNPROTECTED SYSTEM DATA

�Keystroke cache�Passwords, PINs, SSN’s and Credit

Card numbers

They are all typed sometime�They are all typed sometime

Page 25: SECURING SMART PHONESAND OTHER PORTABLE …...AVG Community Powered Threat Report - Q1 2011. INTRODUCTION As smart phones become more ubiquitous, attackers ... Degradation of security

SHOULDER SURFING

� Wikipedia defines shoulder surfing as ,using

direct observation techniques, such as looking

over someone’s shoulder, to get information’.

Shoulder surfing is particularly effective in

crowded places because it is relatively easy to crowded places because it is relatively easy to

observe someone as they:

� fill out a form

� enter their PIN at an automated teller machine or a

POS terminal

� use a calling card at a public pay phone

� enter passwords at a cybercafe, public and university

libraries, or airport kiosks

� enter a code in a public place

Page 26: SECURING SMART PHONESAND OTHER PORTABLE …...AVG Community Powered Threat Report - Q1 2011. INTRODUCTION As smart phones become more ubiquitous, attackers ... Degradation of security

SOCIAL ENGINEERING

� The key to getting sensitive information,

passwords, etc is to sound authoritative and to

ask them nicely

Page 27: SECURING SMART PHONESAND OTHER PORTABLE …...AVG Community Powered Threat Report - Q1 2011. INTRODUCTION As smart phones become more ubiquitous, attackers ... Degradation of security

MOBILE MALWARE

� An increase of mobile malware by 46%

compared 2009 to 2010:

� Only recently Google removed applications from the

Android market and remotely uninstalled malicious

application from infected Smart Phones. Some of these

applications tend to steal financial informationapplications tend to steal financial information

� During the first quarter of 2011 we have seen a major increase

in malware targeting Android smart phones.

� As the number of Internet-enabled handheld mobile

devices continues to grow (including smartphones and

tablets), web-based threats will continue to grow in

number and sophistication. Not just viruses and

botnets, but also phishing from malicious domains

and social networks, identity theft and spam

Page 28: SECURING SMART PHONESAND OTHER PORTABLE …...AVG Community Powered Threat Report - Q1 2011. INTRODUCTION As smart phones become more ubiquitous, attackers ... Degradation of security

MALWARE -- WHAT IS OUT THERE

�Some of these malware are legitimate

pieces of software that were reversed

engineered and malicious code was

injected prior to a re-publishing of the

binary on non-Google markets around the binary on non-Google markets around the

globe.

Page 29: SECURING SMART PHONESAND OTHER PORTABLE …...AVG Community Powered Threat Report - Q1 2011. INTRODUCTION As smart phones become more ubiquitous, attackers ... Degradation of security

MALWARE – WHY IT WORKS

� Malware takes advantage of users’ interest in

popular applications for distribution

� Hackers prey on user emotions like fear – don't

assume that security apps are legitimate. Check

out sellers and read reviewsout sellers and read reviews

Page 30: SECURING SMART PHONESAND OTHER PORTABLE …...AVG Community Powered Threat Report - Q1 2011. INTRODUCTION As smart phones become more ubiquitous, attackers ... Degradation of security

RISKS

� Lack of adequate policy

� Lack of security training

� Degradation of security through personalization

of settings

Not physically securing devices� Not physically securing devices

� Insecure configuration

� Rights not consistent with user job requirements

� Inappropriate data stored on the device

� Failure to encrypt sensitive data

� Users connecting to the network in insecure ways

� Other risks

Page 31: SECURING SMART PHONESAND OTHER PORTABLE …...AVG Community Powered Threat Report - Q1 2011. INTRODUCTION As smart phones become more ubiquitous, attackers ... Degradation of security

LACK OF SECURITY POLICY

�A baseline is needed to ensure users

know what your expectations are

and what standard their conduct will

be judged againstbe judged against

Page 32: SECURING SMART PHONESAND OTHER PORTABLE …...AVG Community Powered Threat Report - Q1 2011. INTRODUCTION As smart phones become more ubiquitous, attackers ... Degradation of security

LACK OF SECURITY TRAINING

�If you don’t tell your users what you

want them to do they aren’t going to

do it

� E.g., Just what types of � E.g., Just what types of

organizational data can I store on

this smartphone?

�Personal use of smartphones may be

‘learn as you go’ but can you afford

that approach in a business context

Page 33: SECURING SMART PHONESAND OTHER PORTABLE …...AVG Community Powered Threat Report - Q1 2011. INTRODUCTION As smart phones become more ubiquitous, attackers ... Degradation of security

DEGRADATION OF SECURITY THROUGH

PERSONALIZATION OF SETTINGS

�Can the user change security

settings?

� Just how cumbersome is that

password?password?

�Who controls what apps are

downloaded?

Page 34: SECURING SMART PHONESAND OTHER PORTABLE …...AVG Community Powered Threat Report - Q1 2011. INTRODUCTION As smart phones become more ubiquitous, attackers ... Degradation of security

FAILURE TO PHYSICALLY SECURE THE

DEVICE

�You probably can’t bolt it down, but

you do need to get it back (or get it

reset) when someone transfers or

terminates.terminates.

� What does your policy say about this?

Page 35: SECURING SMART PHONESAND OTHER PORTABLE …...AVG Community Powered Threat Report - Q1 2011. INTRODUCTION As smart phones become more ubiquitous, attackers ... Degradation of security

INSECURE CONFIGURATION

�Without security software

�Lack of passwords

�Power-up�Power-up

�No timeout configured

�Lack of anti-malware

�Inability to wipe remotely

Page 36: SECURING SMART PHONESAND OTHER PORTABLE …...AVG Community Powered Threat Report - Q1 2011. INTRODUCTION As smart phones become more ubiquitous, attackers ... Degradation of security

RIGHTS NOT CONSISTENT WITH USER JOB

REQUIREMENTS

�Use of business devices, in this case

smartphones, need to be consistent

with capabilities a user needs to do

their jobtheir job

Page 37: SECURING SMART PHONESAND OTHER PORTABLE …...AVG Community Powered Threat Report - Q1 2011. INTRODUCTION As smart phones become more ubiquitous, attackers ... Degradation of security

INAPPROPRIATE DATA STORED ON THE

DEVICE

� For now, however, most organizations are more

worried about protecting the data on their

devices than about the devices themselves, says

Derek Brink, vice president and research fellow

in the IT security practice at market research in the IT security practice at market research

firm Aberdeen.

� The risks associated with leaving corporate

smartphones unprotected include:

� Corporate data leakage if the smartphone is lost or

stolen

� Corporate data misuse in the event of unauthorized

smartphone access – Kapersky Lab

Page 38: SECURING SMART PHONESAND OTHER PORTABLE …...AVG Community Powered Threat Report - Q1 2011. INTRODUCTION As smart phones become more ubiquitous, attackers ... Degradation of security

FAILURE TO ENCRYPT SENSITIVE DATA

� Encrypting message is something every

organization relies on in-case the mobile

equipment accidentally falls into the wrong

hands to prevent trade secrets from being stolen

� Use of weak encryption is security through obscurity and may � Use of weak encryption is security through obscurity and may

not be adequate when what is being encrypted is sensitive data

Page 39: SECURING SMART PHONESAND OTHER PORTABLE …...AVG Community Powered Threat Report - Q1 2011. INTRODUCTION As smart phones become more ubiquitous, attackers ... Degradation of security

USERS CONNECTING TO THE NETWORK IN

INSECURE WAYS

� Insecure synch

� Unsecured wireless access

Page 40: SECURING SMART PHONESAND OTHER PORTABLE …...AVG Community Powered Threat Report - Q1 2011. INTRODUCTION As smart phones become more ubiquitous, attackers ... Degradation of security

INSECURE APPLICATIONS

� ‘Contrary to popular belief, smartphones are no better protected against denial-of-service attacks or malware infections than an unprotected PC. In fact, the applications that run on smartphonesare subject to all of the same vulnerabilities. Consider Web applications, which have been used Consider Web applications, which have been used to spread malware, spyware, phishing attempts, etc., via PCs. Users are downloading similar applications to their smartphones, the difference being that smartphones typically do not have antivirus protection, so these infected files can propagate onto an IP network.’

-- Smartphone security: Risks and protection measures by Shon Harris, November 8, 2010

Page 41: SECURING SMART PHONESAND OTHER PORTABLE …...AVG Community Powered Threat Report - Q1 2011. INTRODUCTION As smart phones become more ubiquitous, attackers ... Degradation of security

BASIC SECURITY

1. Require encryption.

2. Wipe devices if they are lost or stolen.

3. Protect devices with a passcode lock.

4. Autolock devices after periods of 4. Autolock devices after periods of

inactivity.

5. Autowipe devices after a specific

number of failed unlock attempts.

6. Use protected configuration profiles

7. Implement Continuous Refresh

policies

Page 42: SECURING SMART PHONESAND OTHER PORTABLE …...AVG Community Powered Threat Report - Q1 2011. INTRODUCTION As smart phones become more ubiquitous, attackers ... Degradation of security

Encryption.

�Encryption "scrambles" the information so

it can't be transferred and interpreted if

your device falls into the wrong hands or

gets hacked.

You can encrypt data stored on your device � You can encrypt data stored on your device

and/or your media card.

� ‘Think of e-mail encryption as protecting data

on the move and secure it as you would a

portable device in a data loss prevention

strategy.’-- Don’t ignore smart phone e-mail encryption, itWorldCanada.com

Page 43: SECURING SMART PHONESAND OTHER PORTABLE …...AVG Community Powered Threat Report - Q1 2011. INTRODUCTION As smart phones become more ubiquitous, attackers ... Degradation of security

Wipe devices if they are lost or stolen

�Device locks

� Lost or stolen smart phones pose

serious security risks to data, but

remote device lock technology and GPS remote device lock technology and GPS

tracking can help mitigate those risks.

Page 44: SECURING SMART PHONESAND OTHER PORTABLE …...AVG Community Powered Threat Report - Q1 2011. INTRODUCTION As smart phones become more ubiquitous, attackers ... Degradation of security

Protect devices with a passcode lock.

� Whenever a device's display locks, whether due to Auto-Lock or other actions the device requires a four-digit code (or similar) to be entered before the device can be used again.

� Access control is the simplest safeguard you can apply to any mobile device. All contemporary mobile apply to any mobile device. All contemporary mobile operating systems support power-on PINs or passwords -- but many users just don't bother to enable them. Yes, entering a PIN before checking email means a taking an extra step, several times a day. But doing so could inhibit unauthorized use of a lost or stolen smartphone without major productivity drain for many workers.

Page 45: SECURING SMART PHONESAND OTHER PORTABLE …...AVG Community Powered Threat Report - Q1 2011. INTRODUCTION As smart phones become more ubiquitous, attackers ... Degradation of security

Autolock devices after periods of inactivity.

� One of the most basic mobile security functions is

the Auto-Lock feature. Auto-Lock locks the device

after a preset time period of inactivity.

� Users can usually choose to set their devices to

lock after not being used for anywhere from one lock after not being used for anywhere from one

to five minutes.

� Though Auto-Lock is not a total security solution on

its own, it goes a long way to provide some essential

security to a mobile device and the data currently

displayed in it

Page 46: SECURING SMART PHONESAND OTHER PORTABLE …...AVG Community Powered Threat Report - Q1 2011. INTRODUCTION As smart phones become more ubiquitous, attackers ... Degradation of security

Autowipe devices after failed unlock attempts.

� Second easiest measure to deploy is often a "kill

pill" -- that is, the ability to invoke a hard reset

or data wipe on a lost or stolen mobile device,

thereby turning it into a high-tech brick

� On some devices, data wipe can be triggered � On some devices, data wipe can be triggered

asynchronously by authentication failure policies

("three strikes and you're out") or long periods of

inactivity

� In some cases, you can use server synchronization

after loss to invoke a remote wipe.

Page 47: SECURING SMART PHONESAND OTHER PORTABLE …...AVG Community Powered Threat Report - Q1 2011. INTRODUCTION As smart phones become more ubiquitous, attackers ... Degradation of security

Protected configuration profiles

�A protected configuration is a

collection of safety measures or

checks that guard the connection

and client system against various and client system against various

kinds of attacks or threats.

Page 48: SECURING SMART PHONESAND OTHER PORTABLE …...AVG Community Powered Threat Report - Q1 2011. INTRODUCTION As smart phones become more ubiquitous, attackers ... Degradation of security

IMPLEMENT CONTINUOUS REFRESH

POLICIES

�Updates and bug fixes

� System software

� Applications

Page 49: SECURING SMART PHONESAND OTHER PORTABLE …...AVG Community Powered Threat Report - Q1 2011. INTRODUCTION As smart phones become more ubiquitous, attackers ... Degradation of security

OTHER SECURITY TIPS

�Other Security Tips:

� Don't Auto-Save

Usernames/Passwords

Use Wi-Fi Safely on Mobile � Use Wi-Fi Safely on Mobile

Devices

� Manage Pop-ups and Cookies

� Take Action Quickly When Mobile

Devices are Lost

Page 50: SECURING SMART PHONESAND OTHER PORTABLE …...AVG Community Powered Threat Report - Q1 2011. INTRODUCTION As smart phones become more ubiquitous, attackers ... Degradation of security

COMPLICATIONS

�Personally Supplied Devices

�High-Profile Users

�Policy

Configuration�Configuration

�Security Technology

�Security Implementation

Page 51: SECURING SMART PHONESAND OTHER PORTABLE …...AVG Community Powered Threat Report - Q1 2011. INTRODUCTION As smart phones become more ubiquitous, attackers ... Degradation of security

PERSONALLY SUPPLIED DEVICES

�Who controls the device?

� Who has administrator rights?

�What happens if the device is lost

What happens when the owner gets �What happens when the owner gets

another job?

Page 52: SECURING SMART PHONESAND OTHER PORTABLE …...AVG Community Powered Threat Report - Q1 2011. INTRODUCTION As smart phones become more ubiquitous, attackers ... Degradation of security

IS ROOTING YOUR DROID LIKE

JAILBREAKING YOUR IPHONE ?

� At its core, jailbreaking a device gives access to its root file system, allowing modification and installing Third-party software components. This gives the user more control over the device and may allow features that were previously unavailable without jailbreaking which will make the user of this device liable for a void of warranty for their Apple product. (WikiPedia)� Jailbreaking is different from SIM unlocking, which, once completed, means � Jailbreaking is different from SIM unlocking, which, once completed, means

that the mobile phone will accept any SIM card without restriction, thus allowing the user access to alternative phone companies. (WikiPedia)

� As far as what you can do when your phone is rooted, rooting (and jailbreaking) DO NOT let you make free calls or free texts - those capabilities still go through your phone company (Verizon, AT&T, etc.) and it makes no difference if your phone is rooted or not, you still have to pay for those things. (Yahoo Answers)

� In Droid-land, the word is "rooting", not "jailbreaking", but it's basically the same thing - in either case you get the ability to install apps that do more than the usual ones.

--Yahoo Answers

� About the only thing rooting an Android phone does is let some apps get access to lower-level parts of the system - but none of those apps will give you get totally free calling or free Internet

Page 53: SECURING SMART PHONESAND OTHER PORTABLE …...AVG Community Powered Threat Report - Q1 2011. INTRODUCTION As smart phones become more ubiquitous, attackers ... Degradation of security

Jailbreaking: Legal Issues:

� Under the DMCA of 2010, jailbreaking is legal in the United States, although Apple has announced that the practice "can violate the warranty."It is also legal in many other countries including those of the EU. However, the jailbreaking process does not include any modification to the hardware, so it can be quickly and easily reversed simply by restoring the operating and easily reversed simply by restoring the operating system. -- Wikipedia

� The U.S. Copyright Office explicitly recognized an exemption to the DMCA to permit jailbreaking in order to allow iPhone owners to use their phones with applications that are not available from Apple's store, and to unlock their iPhones for use with unapproved carriers. -- WikiPedia

� These exemptions also allow phone users to unlock their phone in order to switch carriers. -- WikiPedia

Page 54: SECURING SMART PHONESAND OTHER PORTABLE …...AVG Community Powered Threat Report - Q1 2011. INTRODUCTION As smart phones become more ubiquitous, attackers ... Degradation of security

OPERATIONAL ISSUES:

� Another issue is the lack of a means to

separate private and business use. For

example, sensitive information could be

copied from a business e-mail account into a

personal account, and uses could have all personal account, and uses could have all

their personal data remote-wiped as well.

Page 55: SECURING SMART PHONESAND OTHER PORTABLE …...AVG Community Powered Threat Report - Q1 2011. INTRODUCTION As smart phones become more ubiquitous, attackers ... Degradation of security

PAINTING A BULL’S EYE

�High-Profile Users

� Make sure enterprise security

extends to those people with the

most to losemost to lose

Page 56: SECURING SMART PHONESAND OTHER PORTABLE …...AVG Community Powered Threat Report - Q1 2011. INTRODUCTION As smart phones become more ubiquitous, attackers ... Degradation of security

POLICY

�Proper Use Policy

� Address personally supplied

hardware

Security Policy�Security Policy

� Address wiping at termination or

transfer

� Reinitializing and reissuing

Page 57: SECURING SMART PHONESAND OTHER PORTABLE …...AVG Community Powered Threat Report - Q1 2011. INTRODUCTION As smart phones become more ubiquitous, attackers ... Degradation of security

SPECIFIC PORTABLE ELECTRONIC DEVICE

POLICY

� Portable Electronic Device Policy requires appropriate protection of sensitive information when it is stored, transferred to, or accessed from portable electronic devices or removable media. This policy requires:� Password, biometric, or similar protection, is necessary in all

settings.

� Sensitive information stored on portable electronic devices or removable media shall be encrypted with the strongest removable media shall be encrypted with the strongest encryption method practicable.

� Approval is required to store unencrypted sensitive information on portable electronic devices or removable media.

� Where encryption is not practicable, measures shall be taken to physically secure the device or media.

� Loss or theft of portable electronic devices or removable media containing sensitive information shall be reported immediately as an information security incident.

� Exceptions for systems or devices not meeting the standards of this policy require approval by management.

Page 58: SECURING SMART PHONESAND OTHER PORTABLE …...AVG Community Powered Threat Report - Q1 2011. INTRODUCTION As smart phones become more ubiquitous, attackers ... Degradation of security

CONFIGURATION

�Protecting user identity

� To protect users, trust and confidence in the

mobile platform, it is essential to protect user

privacy and security of applications.-- Mobile cloud computing and smartphone security by Olafur Ingthorsson on April 18, 2011 in Cloud

Computing and Mobile Cloud Computing. Computing and Mobile Cloud Computing.

Page 59: SECURING SMART PHONESAND OTHER PORTABLE …...AVG Community Powered Threat Report - Q1 2011. INTRODUCTION As smart phones become more ubiquitous, attackers ... Degradation of security

SECURITY TECHNOLOGY

�Encryption

� Encrypting credentials

� Full disk encryption

Remote Wiping�Remote Wiping

�LoJack (for laptops)

� Where’s My iPhone?

�New Technologies

Page 60: SECURING SMART PHONESAND OTHER PORTABLE …...AVG Community Powered Threat Report - Q1 2011. INTRODUCTION As smart phones become more ubiquitous, attackers ... Degradation of security

SECURITY IMPLEMENTATION

�Not allowing connections from

SmartPhones to sensitive data

repositories

�How do you allow people to connect �How do you allow people to connect

to the network?

� Remote access

�Security Access is not an all-or-

nothing proposition

Page 61: SECURING SMART PHONESAND OTHER PORTABLE …...AVG Community Powered Threat Report - Q1 2011. INTRODUCTION As smart phones become more ubiquitous, attackers ... Degradation of security

CONTROLLING APPLICATIONS

�Of particular note is the lack of the

ability to control applications on

smartphones, tablets and other

portable electronic devices. portable electronic devices.

�IT managers can either turn off the

ability to install apps, or leave it on -

there's no means for creating white

lists.

Page 62: SECURING SMART PHONESAND OTHER PORTABLE …...AVG Community Powered Threat Report - Q1 2011. INTRODUCTION As smart phones become more ubiquitous, attackers ... Degradation of security

SECURING THE DEVICES

�View smartphones like unsecured

PCs

�When downloading applications,

check that they are coming from check that they are coming from

trustworthy source

� Unsure about the validity of an

application; don’t install it.

�Protect smart phones with security

software

Page 63: SECURING SMART PHONESAND OTHER PORTABLE …...AVG Community Powered Threat Report - Q1 2011. INTRODUCTION As smart phones become more ubiquitous, attackers ... Degradation of security

SMART PHONES AND TAXES

�Personally supplied devices can

be an issue

� Stipends for business use

Page 64: SECURING SMART PHONESAND OTHER PORTABLE …...AVG Community Powered Threat Report - Q1 2011. INTRODUCTION As smart phones become more ubiquitous, attackers ... Degradation of security

SUMMARY AND NEXT STEPS:

� Summary:

� … smart phone security levels are in its infancy,

people's attitude to mobile security has to change.

� In 2011, tablet computers and smart phones will

become a prime target for hackers/cyber criminals

since they do follow the same rule of targeting the since they do follow the same rule of targeting the

most popular platform used by the majority of the

people.

� Next Steps:

� Proper policy

� Proper training

� Secure configuration

� Making technology your friend

Page 65: SECURING SMART PHONESAND OTHER PORTABLE …...AVG Community Powered Threat Report - Q1 2011. INTRODUCTION As smart phones become more ubiquitous, attackers ... Degradation of security

BIBLIOGRAPHY

� Smartphone Security: How to Keep Your Handset Safe:� http://www.pcworld.com/businesscenter/article/216420/smartphon

e_security_how_to_keep_your_handset_safe.html

� McAfee Threats Report: Fourth Quarter 2010 By McAfee® Labs™� http://www.mcafee.com/us/resources/reports/rp-quarterly-� http://www.mcafee.com/us/resources/reports/rp-quarterly-

threat-q4-2010.pdf

� Google yanks over 50 infected apps from Android Market� http://www.computerworld.com/s/article/9212598/Google_y

anks_over_50_infected_apps_from_Android_Market?taxonomyId=85

� Windows Phone 7 Security Implications, Windows Security.com, Jan 12, 2011� http://www.windowsecurity.com/articles/Windows-Phone-7-

Security-Implications.html

Page 66: SECURING SMART PHONESAND OTHER PORTABLE …...AVG Community Powered Threat Report - Q1 2011. INTRODUCTION As smart phones become more ubiquitous, attackers ... Degradation of security

BIBLIOGRAPHY

� Top 20 Android Security Apps by Jeff

Goldman, September 3, 2010 � http://www.esecurityplanet.com/features/article.php/3901686/Top-

20-Android-Security-Apps.htm

� Mobile cloud computing and smartphone security by Olafur Ingthorsson on April 18, 2011 security by Olafur Ingthorsson on April 18, 2011 in Cloud Computing and Mobile Cloud Computing.� http://cloudcomputingtopics.com/2011/04/mobile-cloud-computing-

and-smartphone-security/

� BlackBerry Security Basics: Five Tips to Keep Your Smartphone Safe by Al Sacco Tue, March 02, 2010 � http://www.cio.com/article/561313/BlackBerry_Security_Basics_Fi

ve_Tips_to_Keep_Your_Smartphone_Safe