1 / 16

Mobile Device Security

Mobile Device Security. ZACH CURRY. Overview. Mobile Device Security. Introduction. 1. Mobile Device Use. 2. 3. Importance of Mobile Device Security. 4. Mobile Device Exploitation. 5. Securing Mobile Devices. 6. Conclusion. ZACH CURRY. Introduction. Mobile Device Security.

Télécharger la présentation

Mobile Device Security

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Mobile Device Security ZACHCURRY

  2. Overview Mobile Device Security Introduction 1 Mobile Device Use 2 3 Importance of Mobile Device Security 4 Mobile Device Exploitation 5 Securing Mobile Devices 6 Conclusion ZACHCURRY

  3. Introduction Mobile Device Security • Mobile Device Definition5 • Small, hand-held computing device • Built in display • Touch screen or mini-keyboard • Less than 2 pounds • Mobile Device Examples • iPhone/iPad • Android Smartphones/Tablets • Windows Smartphone • Blackberry ZACHCURRY

  4. Introduction Mobile Device Security • Mobile Device Sectors • Personal • Business • Government • Scope of Presentation • Business • Government • Overlapping • Business + Personal • Government + Personal ZACHCURRY

  5. Mobile Device Use Mobile Device Security • 81% Growth of cell phone usage in 20121 • 87% • American adults who own a cell phone2 • 84% Cell phone owners who could not go a single day w/o their device3 • 45% • American adults who own a smart phone2 ZACHCURRY

  6. Mobile Device Use Mobile Device Security • 4 ZACHCURRY

  7. Importance of Mobile Device Security Mobile Device Security • Business • Intellectual Properties • Financial Loss • Government • Operational Security • Mission Compromise • Footprint • Physical • Logical ZACHCURRY

  8. Importance of Mobile Device Security Mobile Device Security • Logic Footprint pre-Mobile Devices • Direct organizational control • Virtual Private Networks • Encrypted tunnels • Logical Footprint w/Mobile Devices • Increase in means of connecting • Less/No control of devices • Unsecure WiFi • Plaintext transmission ZACHCURRY

  9. Importance of Mobile Device Security Mobile Device Security ZACHCURRY

  10. Importance of Mobile Device Security Mobile Device Security ZACHCURRY

  11. Mobile Device Exploitation Mobile Device Security • Physical Theft • Loss of data • Loss of network credentials • Potential for erroneous emails, actions, etc • Kernel Modules • Hook low level functions under OS • Exfiltration of anything • Can completely hide itself • Potentially very difficult to remove ZACHCURRY

  12. Mobile Device Exploitation Mobile Device Security • Mobile App Exploitation • Malicious or accidental (ignorance) • Apps running with Root • Attacker can piggy back app • Femtocells • Mini-Cellular Tower • Sends cell traffic over TCP/IP • Can capture all data going over GSM/CDMA • Transparent to device user ZACHCURRY

  13. Securing Mobile Devices Mobile Device Security • What’s Being Done • Apple: App Verification Process6 • Android: ASLR7 • Address space layout randomization • What Can Be Done Moving Forward • More visibility of mobile device security • Approved devices • Mobile security policy • Required Android version • Random device review • Traffic analysis ZACHCURRY

  14. Conclusion Mobile Device Security • Mobile device use continues to grow • Mobile devices in use will exceed population this year8 • Mobile device use: Augmentation  Requirement • Mobile space becoming more advantageous to target • Mobile device security needs more visibility! • MOBILE DEVICES ARE HERE TO STAY ZACHCURRY

  15. References Mobile Device Security http://www.cisco.com/en/US/solutions/collateral/ns341/ns525/ns537/ns705/ns827/white_paper_c11-520862.html http://pewinternet.org/Commentary/2012/February/Pew-Internet-Mobile.aspx http://www.huffingtonpost.com/2012/08/16/smartphone-addiction-time-survey_n_1791790.html http://www.gcdtech.com/processed/images/upload/530-530-530-417-0-0-372-smartphone.png http://en.wikipedia.org/wiki/Mobile_device https://developer.apple.com/appstore/guidelines.html http://http://source.android.com/tech/security/ http://www.cisco.com/en/US/solutions/collateral/ns341/ns525/ns537/ns705/ns827/white_paper_c11-520862.html ZACHCURRY

  16. Questions ZACHCURRY

More Related