1 / 11

Mobile Device Security

Mobile Device Security. Presented by Team Alpha. Introduction (Ross). Beginning of mobility (why, who, where, when It began) DynaTAC handheld phone First mobile call made by Martin Cooper in 1973 Cooper called Bell labs rival in New York

leanna
Télécharger la présentation

Mobile Device Security

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Mobile Device Security Presented by Team Alpha

  2. Introduction (Ross) • Beginning of mobility (why, who, where, when It began) • DynaTAC handheld phone • First mobile call made by Martin Cooper in 1973 • Cooper called Bell labs rival in New York • Smartphone and Tablet devices (why, where, when, and who) • Simon from IBM • First introduced in 1990’s • What else about Simon??? • What about the first Tablet device???? • What, who, where, and when???

  3. Mobile security (Ross) • What is mobile security? • First know virus written for smartphones in 2004 • Virus called “Caribe” written for Symbian operating system • Classified by Kaspersky Lab as Worm.SymbOS.Cabir • Started the security concern for modern phones.

  4. Type of Device Operating System (Ross) • Windows • Built-in Windows Office documents and Adobe Flash support • Multi-tasking capability (Live tiles on Windows 8 Phones • Available for multiple phone device brands • iOS • Has good embedded mobile security • Includes full-block, file level hardware encryption • Phone device must be Apple

  5. Type of device operating system continued • Android • Google product • Community and user driven • No restrictions on applications • Unsecure • Blackberry • Very successful in government and corporate markets • Ranked top in security level • Excellent integration with corporate email systems

  6. Statistical Data (Ross) • According to the State of Mobility Survey 2012 by Symantec, 59 percent of the 6,275 respondents reported that their organizations are making line-of-business applications accessible from mobile devices, and 71 percent said their organization is looking at implementing a corporate "store" for mobile applications. • It's not hard to see why. Organizations believe embracing mobile computing increases the efficiency and effectiveness of their workforces. Symantec's survey found that 73 percent of respondents expected to increase efficiency through mobile computing, and all of them did realize that increased efficiency • See link for reference http://www.cio.com/article/711258/For_BYOD_Best_Practices_Secure_Data_Not_Devices • You may choose to use or not; up to you.

  7. The Need to Secure (John) • BYOD Policy • Mobile Commerce • Gateway to Corporate Networks • Personal Content • Unsecured Wireless Communications • Because the US President uses one

  8. Pros and Cons (John) • Personal work space • Apps and Games • Inconvenient (personal and work phone) • Secure communications • Access to corporate data • Access to business applications • Remote IT support (for IT personnel)

  9. Recommendation (Kevin) • Mobile device management (MDM) tools • BYOD security policy • Hire dedicated staff for MDM • Educate users through InfoSec classes • Encourage InfoSec staff to acquire certification

  10. Conclusion (Everyone)

  11. REFERENCE (EVERYONE)

More Related