120 likes | 258 Vues
In this presentation, we explore the evolution of mobile phones from basic analog devices to powerful smartphones, which have become integral to our daily lives yet present significant security challenges. We cover key topics including typical functionalities such as voice calls and web browsing, common security issues like malware and physical theft, and practical strategies for attack prevention and recovery. We also look ahead to the future of mobile security, including trends such as open operating systems and emerging cyber threats, emphasizing the importance of a robust security policy in enterprises.
E N D
Cell Phone Security • a little computer in your pocket • an easy target for malcontents CS691 Robin Kimzey
Presentation Topics • history • functionality • usage • security issues • attack prevention • attack recovery • enterprise • future CS691 Robin Kimzey
History • the brick • analog networks • limited users • limited availability CS691 Robin Kimzey
Typical Functionality • voice calls • text messaging • web surfing • bluetooth connectivity • wi-fi connectivity • email CS691 Robin Kimzey
Typical Usage • verbal communication • electronic communication • storage of information like contacts and possibly business or personal security data • personal/business photos • business presentations or confidential files CS691 Robin Kimzey
Security Issues • physical theft • signal interception • malware infection • cloning • tracking • textspamming • DoS (bluetooth) • enterprise access CS691 Robin Kimzey
Attack Prevention • physically secure device • use security tools available to you • only enable features that are used • look for 3rd party software for additional security • be aware of security issues and avoid them when possible • trusted software from trusted sources CS691 Robin Kimzey
Attack Recovery • report stolen/lost hardware immediately • disable account • wipe device contents remotely • reset device and re-install authorized apps CS691 Robin Kimzey
Enterprise • setup solid security policy for all devices • enforce the security policy in place • train users to understand and mitigate security issues CS691 Robin Kimzey
Future Trends/Issues • standardized/open OSes like Android • increased functionality • zombie/botnet threat • current computer risks are future cell phone risks CS691 Robin Kimzey
References • NIST SP800-124, http://csrc.nist.gov/publications/drafts/800-82/draft_sp800-82-fpd.pdf • Emerging Cyber Threats Report for 2009, Georgia Tech http://www.gtiscsecuritysummit.com/pdf/CyberThreatsReport2009.pdf CS691 Robin Kimzey
Questions? CS691 Robin Kimzey