cell phone security n.
Download
Skip this Video
Loading SlideShow in 5 Seconds..
Cell Phone Security PowerPoint Presentation
Download Presentation
Cell Phone Security

Loading in 2 Seconds...

play fullscreen
1 / 12
beatrix

Cell Phone Security - PowerPoint PPT Presentation

98 Views
Download Presentation
Cell Phone Security
An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.

- - - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript

  1. Cell Phone Security • a little computer in your pocket • an easy target for malcontents CS691 Robin Kimzey

  2. Presentation Topics • history • functionality • usage • security issues • attack prevention • attack recovery • enterprise • future CS691 Robin Kimzey

  3. History • the brick • analog networks • limited users • limited availability CS691 Robin Kimzey

  4. Typical Functionality • voice calls • text messaging • web surfing • bluetooth connectivity • wi-fi connectivity • email CS691 Robin Kimzey

  5. Typical Usage • verbal communication • electronic communication • storage of information like contacts and possibly business or personal security data • personal/business photos • business presentations or confidential files CS691 Robin Kimzey

  6. Security Issues • physical theft • signal interception • malware infection • cloning • tracking • textspamming • DoS (bluetooth) • enterprise access CS691 Robin Kimzey

  7. Attack Prevention • physically secure device • use security tools available to you • only enable features that are used • look for 3rd party software for additional security • be aware of security issues and avoid them when possible • trusted software from trusted sources CS691 Robin Kimzey

  8. Attack Recovery • report stolen/lost hardware immediately • disable account • wipe device contents remotely • reset device and re-install authorized apps CS691 Robin Kimzey

  9. Enterprise • setup solid security policy for all devices • enforce the security policy in place • train users to understand and mitigate security issues CS691 Robin Kimzey

  10. Future Trends/Issues • standardized/open OSes like Android • increased functionality • zombie/botnet threat • current computer risks are future cell phone risks CS691 Robin Kimzey

  11. References • NIST SP800-124, http://csrc.nist.gov/publications/drafts/800-82/draft_sp800-82-fpd.pdf • Emerging Cyber Threats Report for 2009, Georgia Tech http://www.gtiscsecuritysummit.com/pdf/CyberThreatsReport2009.pdf CS691 Robin Kimzey

  12. Questions? CS691 Robin Kimzey