11
MOBILE DEVICE SECURITY MUHAMMAD SALMAN ZAHID

Mobile device security informative v2

Embed Size (px)

Citation preview

Page 1: Mobile device security   informative v2

MOBILE DEVICE SECURITY

MUHAMMAD SALMAN ZAHID

Page 2: Mobile device security   informative v2

AGENDA

Overview

Execution Model

• iOS

• Android

Risks

GPS

Attacks

Securing your Device

1/7

/20

15

2

MS

Z

Page 3: Mobile device security   informative v2

OVERVIEW

Mainly focused on

• iOS

• Android

Same concepts also apply on other OSes

• Windows

• Blackberry

Smart Phones are simple computers

• Mobile devices don’t come with the tools required to analyze what’s happening

• Root level access required

1/7

/20

15

3

MS

Z

Page 4: Mobile device security   informative v2

EXECUTION MODEL

Android & iOS

• Sandbox concept

• Each process runs it a partitioned environment

• No direct access to OS resources

• Not allowed to interact directly with other Applications or their data

iOS

• Strict API

• SDK enforces restrictions

• Applications must be signed and can only be deployed from a single trusted source

Android

• Dalvik VM

• Multiple/Unknown sources

1/7

/20

15

4

MS

Z

Page 5: Mobile device security   informative v2

RISKS

• Virus

• Malware

• Buffer Overflow

• Password theft

• Key logging

Smart phones are computers

• FB

• E-mails

• Other applications

Multiple -Login Applications

1/7

/20

15

5

MS

Z

Page 6: Mobile device security   informative v2

GPS

Global Positioning System

• Every smart phone has GPS

• Must aware the use of GPS

• GPS information passed on via third parties without your knowledge.

• For example: Face book, Maps etc.

1/7

/20

15

6

MS

Z

Page 7: Mobile device security   informative v2

ATTACKS

• Most common among devices

• Avoid unnecessary pairingBluetooth

• Don’t use untrsuted Wi-Fi

Wireless Access Points

1/7

/20

15

7

MS

Z

Page 8: Mobile device security   informative v2

SECURING YOUR DEVICE

• Graphic pattern is commonly usedUse password

• Automatic on in iOS

• Android: we can turn it on

• Hardware must be supported else slow responseUse Encryption

• Clouds are helpfulUse backup &

Sync.

• Supported in iOS

• Need an Application in Android

Lock device on multiple failed

attempts

1/7

/20

15

8

MS

Z

Page 9: Mobile device security   informative v2

SECURING YOUR DEVICE CONT...

• Security cameras Be aware of Surrounding

• Applications Installation

• iOS & Google have certificates & CodesLevel of Trust

• Regular update itAntivirus

Ignore/Delete unknown prompted

messages/links

• Any abnormality can effect the BatteryMonitor Battery Life

1/7

/20

15

9

MS

Z

Page 10: Mobile device security   informative v2

SECURING YOUR DEVICE CONT...

1/7

/20

15

10

MS

Z

Page 11: Mobile device security   informative v2

1/7

/20

15

MS

Z

11