1 / 11

Mobile Security

Mobile Security. George Bailey Information Security Ivy Tech Community College of Indiana. Tech Day 2006, Columbus, IN. Mobile Devices. Laptops Personal Digital Assistants Palm, Pocket PC, PSP, Gumsticks Cell Phones & Smart Phones Small Scale Digital Devices USB Flash Drives

sailor
Télécharger la présentation

Mobile Security

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Mobile Security George Bailey Information Security Ivy Tech Community College of Indiana Tech Day 2006, Columbus, IN

  2. Mobile Devices • Laptops • Personal Digital Assistants • Palm, Pocket PC, PSP, Gumsticks • Cell Phones & Smart Phones • Small Scale Digital Devices • USB Flash Drives • Flash Media (Cameras, Phones, Gumsticks) • Micro Hard Drives • MP3 & Video Players

  3. Statistics • More than 600,000 laptop thefts occur annually, totaling an estimated $720 million in hardware losses and $5.4 billion in theft of proprietary information • 97% of stolen computers are never recovered • Laptop theft has been attributed to 59% of computer attacks in government agencies, corporations, and universities during 2003 • Gartner estimates approximately 70% of all laptop thefts are internal • The average word doc is 3 pages in length (25k-30k), 20GB Mobile Device can contain +750,000 documents • 99% of users of mobile devices that transfer or store data use no encryption • One inch hard disks are expected to reach 100GB within 12 months

  4. Movie

  5. Risks to Mobile Devices • Viruses, Trojans, and Worms • Theft of the physical device itself • Data theft • Mobile code exploits • Authentication exploits • Wireless exploits • Denial of service attacks • TCP Session Hijacking

  6. Counter Measures • Install a firewall • Disable all HotSync and ActiveSync features when not in use • Ensure that password lock-out software is enabled to restrict the number of password guesses • Do not store PDA passwords on desktop PCs unencrypted • Install an anti-virus product • Use two-factor authentication if possible • Use a VPN when transmitting sensitive data • Use of data encryption • Do not use un-trusted Wi-Fi access points • Don’t store sensitive data if you don’t need it!

  7. Mobile Antivirus • McAfee • http://mobile.mcafee.com/ • F-Secure • http://www.f-secure.com/estore/avmobile.html • Trend Micro • http://www.trendmicro.com/en/products/mobile/tmms/evaluate/overview.htm • Symantec • http://www.symantec.com/small_business/products/overview.jsp?pcid=is&pvid=sms40symb

  8. Firewalls • ZoneAlarm (Win) • http://www.zonelabs.com/ • Airscanner (PPC) • http://airscanner.com/downloads/firewall/firewall.html • Bluefire Mobile Security (PPC, Palm, M5) • http://www.bluefiresecurity.com/products.html

  9. Encryption Tools • Keyring for PalmOS • http://gnukeyring.sourceforge.net/ • TrueCrypt (Win, Mac, Linux, removable media) • http://www.truecrypt.org/ • Private Disk (Win, removable media) • http://www.dekart.com/ • Pointsec (ALL) • http://www.pointsec.com/products/smartphonepda/

  10. Password Vaults • Strip (Palm) • http://www.identicentric.com/products/strip/ • Keepass (Win, removable media) • http://keepass.sourceforge.net/ • SplashID (Win, Palm, Mac, Symbian, RIM) • http://www.splashdata.com/splashid/

  11. Questions

More Related