0% found this document useful (0 votes)
18 views10 pages

Cyber Security U-2

The document discusses various aspects of mobile computing security, including authentication methods, potential attacks on mobile devices, and the importance of securing data transmission. It highlights different types of attacks such as push, pull, and crash attacks, as well as the risks associated with mobile device theft and phishing. Additionally, it emphasizes the need for robust security measures to protect sensitive information in mobile environments.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
18 views10 pages

Cyber Security U-2

The document discusses various aspects of mobile computing security, including authentication methods, potential attacks on mobile devices, and the importance of securing data transmission. It highlights different types of attacks such as push, pull, and crash attacks, as well as the risks associated with mobile device theft and phishing. Additionally, it emphasizes the need for robust security measures to protect sensitive information in mobile environments.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 10

Urit-2

Mobile and ulcse tyices

dece at in
Mol Dentce:
enable e o l e acelss
the ntornot whr h eoales
1etootki an

quick
bhzltus Comnuicc'on!- the tonste9 ok
witlees distance
ithed th

cluchornagrile
acuatien as hein

demano iicweity
and netuGk
date
erLkee cuuie.

cnd wueles deicel.


molie
Poleati
Hearkable aowaneint
dewce

Aairg a alerg

tod tyseluced
49903
) Patae computeu they eaontially alops dho
deaignd
built-n yboaid ord diagp lay

ALclhaeneen nteya
fncios % phons
eatue ruciuens

Thende
Mo&le comgutg endering a new fhaue

ihallsrge
data sinchoni zatibr
Sans Cennecfvt
H mechanism
Senvtco (QoS)
-Seamlead handoVey
pAotocol Sppot

seusie mty plalfs cemgiabi


tleud baud sate
Soliton
.) VAe MoBvty
to the

uil maindairirg
meve thyatally wwicet 1 nucve
u
lecatioy
and accele to fem

thom vabu Locattow


Auoicu
uhich inclasew

6) thallngui managg
te the Lame data ond
hae
hois
Kagahdlzw
dlesices
ceces retwce
mwe btuen
- wntntespted cenncetiuîbey
totls maintain ing

Seamles Cennectiiy tt enelu that


a) epeience centinuipu etoee
when movfng
cerVecthiby
plechanin:mechansm
inplienng
fient handst
eentiol o ne sjnoste hanstien
betwien diffourd oces roid
dice e
hes uthut nesuplion

suwitoh
i) seamless handeve- Wsel cave

heil actiue A4iiort. video Cordesarcg

Sesde
Iniiain frotbcsl)
iO Resouae mlanagemend!- managing retueu
duing sesst on bondovel cruclod Ao
he wsel epeufence

4) Seuoes mebity
0) nuowes the abiiky b aca(ces
the
deice r locatien.
Tmplicatim
)

dewices k platfomi
platfon to
to enwwe seAUile
i) 0ata teestbiiy. ehau/r4 a)

based solution1 f 6i0ideo censiant

fuvctioobiy dfeunt

lepulas attacks aagcainat 35 moaile mowot


Malwae
ínuse and wO: theot
that ingecl
maliciou pioga
deice th in 36 ndootk. hey
dlugnd to cemmuel dew
steal enl tve cata
Denial op Sece (Dos): (wwwesoy taty
Q)
An attacher hiocks the
39 Bvexbiling atck :
adde
cYsh. After-thet takt t may lead
to roral Lse te
hen hackes ietendi
ingiinat syskm
Lnatling mel'io
Eund ecuiiby measwe
get
3) siqnoling - ewel attacks they daxget3; netweh
onmuicaio

Cemmunotion.
AL ulees Aomputing
) tmeaing trend in cybea chi elatod ton
nobile cemputing netude M-rommercet M- banding

then acCOnto nd setit ko monito


hagh- husk maia
taud.
A' os:

Ashoe hem aceuuely to etai he


card O. & Caa

change PIN (Postnal Irlentfcation Nuhe)


Meceived hom bunk bio inifating
y ans action.

peviding yewr casc detai.


to kothe

B. Abnt 's:

you fohen.
a blark-ep?

phone
Technique and tytes o Catdit tard ud

1) TxadHionel Techriue
faper bsed rad
o)

stolrn fileu
tatimunts

t) ApAtoatien nand
b-)
) ID The7t: whUe a
'endsto
iminal ua
cedit card mausn
stolen
do make unatheied
pwehoe
2) Maden TechniqMe:
e dit ceud qenenatoe: ceati 4dke
) teolu hat
pogeam umbus hat my bacs
nyaidat en cheeks. chininqlo
nitial numbes to atempt
this Rcunsactient.
Unauhored.
cernt frouud: s a kind oq
) Skimming to
Cnme obdch diaheniat empletee
cimrnes.
A simme
CapteA (oedit Cad mumbeu and
0he nyovmatign.
Seety Challenges Posed Mebile euts
1) Managg the auwthentcation sewitp
Eulaing seely cuthontiation
seies
mebiir deuice i owial. Authentication
mechanism uch as biometru PINg

to the deice On
adsocioatid

Aluing data en mobiu deice.


date tron2miei
oiaully duing
Ond

3) Light woight diciery aeew frotosl (LoAe)

the sicity COAP ciectoes yiteu


C

to siec uLo! dertiies and ac(e

4) Femote Access Sewer (RAS) sewnity enable


Secwíng RAS
colpicte netoek.
Cucial is im pgitant to
pouuent wn authoihed access, data bye aches
Gnd attuchy
6) Meota playe Control Secuity: Secuyng media
vneab LéHes tht ceult be epleiled to
masciew puipese.
Attack
Mobile deuices aue Lubfeet to the
attoch '

a) PUSH ATTAcK: the


entHes ov applraient
iniHated ky eceunal
in meble devere
neabi ee
to eploit unwolue nusized dasio tio
Jheoe attack

deice tuithet wers Cen


Condent
dosie
nvpwe the mabil
b) PULL ATTACK :
actively king and deuwrllading
unknoingy initses
ihen
Dtiond hat ead e

deuuce.
aimy tp
destabilze a
c CRAsH ATTACK: t Sogto e vulreahh
by eploiing
mcbilu oele dend onaisw data eUen to
ttockeu dellbeuateiH agplationd, seiufces oy
cauing stem to Crash.
the deofce,
entime
mobile/ CellPhones
Attacks aganst
? Mobie Phore Thept: omobile oleerce
rw whn a

(pickqe.ketng). a
notching' pockst piikirg
ae the maliou
MAkleVesi- thee
to u4ect t
woe proqram de'omed

cempsemiee dece ecity, steal usonal


can
Unformotion and nd

ybx atta ck
nheu
te thuck discle enfve
nematen Auc Loq'n 9todentials,
cceñ nhou ete- Ihs ctto ch con
lead to kheft ond ffraniat
identily thegt
99 Viahingi (Vsice Phishing) inuolue atocteU
atockou ui
plhene colls to umpestral Jegitiote
banks qevesnYmid
e manipulale vichimi nte
Keutalng conidenti al intosmatitn
5) Smiing: (sMS Phshdng):
whee ttackey snd
deeeptive sms
mesages centaning malieu nks o

usenol ingematien o

You might also like