35
Ensuring Mobile Device Security Quick Heal Technologies Private Limited

Ensuring Mobile Device Security

Embed Size (px)

Citation preview

Page 1: Ensuring Mobile Device Security

Ensuring Mobile Device Security

Quick Heal Technologies Private Limited

Page 2: Ensuring Mobile Device Security

• App stores and mobile apps are the greatest hostile code and malware delivery mechanism ever created.

— Winn Schwartau, chairman of MobileActiveDefense.com

• For most enterprises and consumers today, mobile and cloud security are viewed in a pretty straightforward way — don't assume there is any.

— Russ Dietz, CTO of SafeNet

Introduction

Page 3: Ensuring Mobile Device Security

What do we do with mobile devices?

Phone service and text messaging

Personal email

Scheduling appointments & reminders

Accessing social websites

Listening to music and watching videos

Playing online games

Online shopping, banking and bill paying

Document & other data storage

Page 4: Ensuring Mobile Device Security

Information stored in mobile devices

Usernames

Contacts

Passwords

Cookies

Location data

UDID/IMEI, Device name, Network connection name

Personal information: DoB, address, social, credit card data, photographs etc.

Application data

Confidential and official documents

Transaction history

Page 5: Ensuring Mobile Device Security

Number Crunching..

Page 6: Ensuring Mobile Device Security

Mobile device explosion

There are officially more mobile devices than people in the world

And they’re multiplying five times faster than we are

December 2014

7.1 Billion

People

7.7 Billion

Mobile Devices

14.1 Lac Apps

on Google Play

1.4+ million apps available

75+ billion apps downloaded

Page 7: Ensuring Mobile Device Security

Do you agree?

With the explosive growth of smartphones, tablets and other mobile devices, consumers must make

security of the mobile devices a priority & find means for securing their mobile devices seamlessly and

efficiently.

Page 8: Ensuring Mobile Device Security

Risks associated with mobile devices

Portable data storage

Wireless connections

3rd party applications

Data integrity

Data availability

Page 9: Ensuring Mobile Device Security

To ensure mobile device security

Ensure the security of the mobile device

Ensure the security of mobile data

Ensure the security of mobile applications

Page 10: Ensuring Mobile Device Security

Threats To Mobile Devices

Quick Heal Technologies Private Limited

Page 11: Ensuring Mobile Device Security

Threats to mobile devices

Mobile malware

Smartphones and tablets are susceptible to worms, viruses, Trojans and spyware similarly to desktops

Mobile malware can steal sensitive data, rack up long distance phone charges and

collect user data

Page 12: Ensuring Mobile Device Security

Threats to mobile devices

Eavesdropping

Wireless networks have good link-level security but lack end-to-end upper-layer security

Data sent from the device to the outside world is often unencrypted

Intruders eavesdrop on user’s sensitive communications

Page 13: Ensuring Mobile Device Security

Threats to mobile devices

Unauthorized access

Unauthorized access to mobile devices also means unauthorized access to emails, apps, social media profiles, multimedia files and more.

Page 14: Ensuring Mobile Device Security

Threats to mobile devices

Theft and loss

Mobile devices are easily susceptible to loss or theft

Leaving your phone in a taxi or getting your phone stolen during a bus commute

Data stored in such devices is at risk

The data could be corporate mails, passwords, bank statements & other crucial information

Page 15: Ensuring Mobile Device Security

Threats to mobile devices

Unlicensed and unmanaged applications

Even popular apps have vulnerabilities that are open for exploits

Needless to say, the security threats posed by unlicensed apps

Whether apps are licensed or not, they must be updated regularly to fix vulnerabilities that could be exploited to gain unauthorized access or steal data

Page 16: Ensuring Mobile Device Security

Threats to mobile devices

Unlicensed and unmanaged applications

Access to confidential data

In-app ads get the same permissions

Malicious and suspicious app activity

System instability

Page 17: Ensuring Mobile Device Security

Methods to handle mobile security

Authentication

Encryption

Filtering

Page 18: Ensuring Mobile Device Security

Authentication

Authentication is the process of determining whether someone or something is, in fact, who or what it is declared to be

User authentication is usually handled with username & password combinations, biometric identifications, PINs etc.

Ultimate aim is to ensure device access to authentic users only

Page 19: Ensuring Mobile Device Security

Authentication

Mobile devices by default are not password enabled

However, most of the devices have technical capability to support authentication - passwords, PINs, pattern screen locks, and biometric readers

It is up to the users to ensure these are enabled

Page 20: Ensuring Mobile Device Security

Encryption

Encryption is the conversion of data into a form, called a ‘ciphertext’, that cannot be easily understood by unauthorized people

In simple words, encryption is the method of converting plain text to encoded text which is unreadable by intruders

Page 21: Ensuring Mobile Device Security

Encryption

Encrypting mobile devices helps in securing data stored on a mobile device or transmitted from mobile devices

Most mobile devices have data encryption capabilities

Data encryption has little or no impact on the way users access the data

Page 22: Ensuring Mobile Device Security

Encryption

Encryption limits the ability of intruders to obtain readable and reckonable data from the mobile device

Encryption also makes it difficult to generate important data for authentication

Page 23: Ensuring Mobile Device Security

Filtering

Filtering is the process of removing threats arising due to web access, email and apps

Mobile devices by default do not have filtering capabilities

Web pages & email attachments are often used as carriers of viruses and malware attacks

Filtering can be done with the use of a mobile security software and it is not a default facility provided by mobile devices

Page 24: Ensuring Mobile Device Security

Ensuring Mobile Device Security

Quick Heal Technologies Private Limited

Page 25: Ensuring Mobile Device Security

To prevent damage from theft or loss

Set a PIN or password

Set to automatically lock screens

Backup your contact info

Install a security app

Turn on encryption

Turn on location settings

Enable remote wipe if available

Act immediately if lost - Report to the authorities

Ervins Strauhmanis / Foter / CC BY

https://www.flickr.com/photos/ervins_strauhmanis/14365412089/

Page 26: Ensuring Mobile Device Security

Review application permissions

Take time to read the small print

• What information does the app require access to?

Page 27: Ensuring Mobile Device Security

Encrypt your phone

Encrypt the device data to make it difficult for intruders to gain and understand sensitive information

Page 28: Ensuring Mobile Device Security

Apps from unknown sources - Take a call

Apps from unknown sources are necessary sometimes

Page 29: Ensuring Mobile Device Security

Mobile Device Management (MDM) - For enterprises

Mobile Device Management (MDM) apps allow enrollment of corporate devices over a seamless cloud-based solution for all mobile devices within the enterprise

Once a device is connected to the corporate network, an authorized administrator can manage and control the mobile fleet

MDM solutions secure, monitor and manage mobile devices within the enterprise

It also blocks phishing and malicious websites and filters web access

Page 30: Ensuring Mobile Device Security

How can Quick Heal help?

Quick Heal Technologies Private Limited

Page 31: Ensuring Mobile Device Security

How can Quick Heal help?

Page 32: Ensuring Mobile Device Security

Quick Heal Khareedo Gaadi Jeeto Contest

Page 33: Ensuring Mobile Device Security

Write to us at: [email protected] Follow us on: Facebook - www.facebook.com/quickhealav Twitter - www.twitter.com/quickheal G+ - http://bit.ly/QuickHealGooglePlus YouTube - www.youtube.com/quickheal SlideShare - http://www.slideshare.net/QuickHealPPTs Visit us: Website - www.quickheal.com Official Blog - http://blogs.quickheal.com

Page 34: Ensuring Mobile Device Security

Thank You!

Page 35: Ensuring Mobile Device Security

• http://www.itsecuritywatch.com/mobile-security/10-great-quotes-about-mobile-security/?mode=featured

• http://www.independent.co.uk/life-style/gadgets-and-tech/news/there-are-officially-more-mobile-devices-than-people-in-the-world-9780518.html

• blogs.quickheal.com

References