0% found this document useful (0 votes)
34 views17 pages

Mobile Security

The document discusses mobile security, highlighting the importance of protecting mobile devices from various threats such as malware, phishing, and unauthorized access. It outlines types of mobile security, tips for staying safe, advantages and disadvantages, and emphasizes the need for encryption and application control. The conclusion stresses the necessity of safeguarding sensitive data on mobile devices.

Uploaded by

paruldobariya172
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
34 views17 pages

Mobile Security

The document discusses mobile security, highlighting the importance of protecting mobile devices from various threats such as malware, phishing, and unauthorized access. It outlines types of mobile security, tips for staying safe, advantages and disadvantages, and emphasizes the need for encryption and application control. The conclusion stresses the necessity of safeguarding sensitive data on mobile devices.

Uploaded by

paruldobariya172
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 17

1

Mobile Security

GUIDED BY :- Dr. Krishna Jariwala

SUBMITTED BY:-Pandav Dhruvin


Pravinbhai
SEAT NO : 6151
2
Introduction
 About Mobile Security
 Security Issue With Mobile
 Types Of Mobile Security
 Application Control
 Geo-Tagging
 Mobile Threat
 Tips to Stay Safe
 Advantage of Mobile Security
 Disadvantages of Mobile Security
 Conclusion
3
About Mobile Security
 Used to call and send text message.
 Mobile phones are becoming ever more popular and are rapidly becoming attractive
targets for malicious attacks.
 Mobile phones face the same security challenges as traditional desktop computers,
but their mobility means they are also exposed to a set of risks quite different to
those of a computer in a fixed location.
 Mobile phones can be infected with worms, trojan horses or other virus families, which
can compromise your security and privacy or even gain complete control over the
device.
 This guide provides the necessary steps, do's, don'ts & tips to secure your mobile
devices Have Internet access, built-in video cameras and the ability to install
additional software.
4
Security Issue With Mobile
 Physical Security A phone can be Confiscated
or stolen.
 We should always enable some kind of
password protection on our phone.
 Voice Although the voice on a mobile phone
channel is encrypted, this encryption was
hacked some time ago and is not considered
safe anymore.
 Normal voice communications are very
insecure as they are not encrypted.
5
Types Of Mobile Security
1. Mobile Device Security
2. Mobile Application Security
Mobile Device Security 6
 All mobile devices(phone,tablets and laptop)
should have the screen lock set.
 After a specific no. of unsuccessful unlock attempts, the device will get locked which
can only be opened through user's ID.
 Normal voice communications are very insecure as they are not encrypted.
 GPS
 Many mobile devices have GPS capabilities, allowing the device to be located if it is
lost or stolen.
 Remote wiping
 Some mobile devices allow for the device to be wiped (all data and applications are
removed) remotely.
 This can be used if a device is unrecoverable.
Mobile Application Security 7

 Most mobile devices are bundled with a built-in encryption


feature.
 Ensure that mobile applications are encrypting sensitive
data that is stored on the device.
 Users need to locate this feature on their device and enter
a password to encrypt their device with this method, data
is converted into a code that can only be accessed by
authorized users.
 This is important in case of theft, and it prevents
unauthorized access
Mobile Application Security 8

 A best practice is for the mobile application to


authenticate the user and to base access to data on the
user's authentication level.Downloading apps only from
official app stores like Google Play Store or Apple App
Store.
 Verifying app permissions and being cautious of apps that
request excessive permissions.
 Keeping apps updated with the latest security patches and
versions.
9
Application Control

 Many mobile applications attempt to access


unnecessary user information (e.g., the location of
the device).

 Controls should be used to limit the data that


applications can access and to restrict the actions
that applications may undertake.
Geo-Tagging 10

 Geotagging is most commonly used for photographs


and can help people
 get a lot of specific information about where the
picture was taken or the exact location of friend who
logged on to service.
 Application whitelisting.
 It is a device administration practice used to prevent
unauthorized application from running.
 The purpose is primarily to protect device and
networks from harmful application.
11
Mobile Threat

1. Application Based Threats

2. Web Based Threats

3. Network Threats
 Application Based Threats.
12
• Downloadable applications present many security issues on mobile devices, including
both software specifically designed to be malicious as well as software that can be
exploited for malicious purposes.
• It contains (Malware, Spyware, Privacy Threats, Vulnerable application)
 Web-Based Threats.
• Because mobile devices are often constantly connected to the Internet and used to
access web-based services, web-based threats that have historically been a problem for
PCs also pose issues for mobile devices It contains (Phishing Scams, Drive-By Download,
Browser Exploits).
 Network Threats
• Mobile devices typically support cellular networks as well as local wireless networks.
It contains (Network Exploits, Wi-Fi Sniffing).
13
Tips to Stay Safe
 Only download apps form trusted source
 Set password on your device.
 Never ever click on unknown link on
websites or receive form mail or sms.
 Download a mobile security tool.
 Be alert for unusual behavior on your
phone(unusual text messages, strange
charges to phone to the phone bill,
deceased battery life)
Advantages of Mobile Security 14

 Better protection against identity theft

 Higher safety of banking information

 Enhanced privacy of personal media and messages

 Improved resistance to massive infrastructure breaches

 Increased protection against hardware hijacking


Disadvantages of Mobile Security 15

 Complexity and Usability

 Resource Intensiveness

 Compatibility Issues

 Cost and Investment

 User Resistance and Education


Conclusion 16

 Our mobile devices contains important and delicate

data which needs to be kept safe and secure.

 With the simple tips given in presentation, we can

keep our data safe and secure.


17

THANK YOU

You might also like