1 / 12

Cell Phone Security

Cell Phone Security. a little computer in your pocket an easy target for malcontents. Presentation Topics. history functionality usage security issues. attack prevention attack recovery enterprise future. History. the brick analog networks limited users limited availability.

beatrix
Download Presentation

Cell Phone Security

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Cell Phone Security • a little computer in your pocket • an easy target for malcontents CS691 Robin Kimzey

  2. Presentation Topics • history • functionality • usage • security issues • attack prevention • attack recovery • enterprise • future CS691 Robin Kimzey

  3. History • the brick • analog networks • limited users • limited availability CS691 Robin Kimzey

  4. Typical Functionality • voice calls • text messaging • web surfing • bluetooth connectivity • wi-fi connectivity • email CS691 Robin Kimzey

  5. Typical Usage • verbal communication • electronic communication • storage of information like contacts and possibly business or personal security data • personal/business photos • business presentations or confidential files CS691 Robin Kimzey

  6. Security Issues • physical theft • signal interception • malware infection • cloning • tracking • textspamming • DoS (bluetooth) • enterprise access CS691 Robin Kimzey

  7. Attack Prevention • physically secure device • use security tools available to you • only enable features that are used • look for 3rd party software for additional security • be aware of security issues and avoid them when possible • trusted software from trusted sources CS691 Robin Kimzey

  8. Attack Recovery • report stolen/lost hardware immediately • disable account • wipe device contents remotely • reset device and re-install authorized apps CS691 Robin Kimzey

  9. Enterprise • setup solid security policy for all devices • enforce the security policy in place • train users to understand and mitigate security issues CS691 Robin Kimzey

  10. Future Trends/Issues • standardized/open OSes like Android • increased functionality • zombie/botnet threat • current computer risks are future cell phone risks CS691 Robin Kimzey

  11. References • NIST SP800-124, http://csrc.nist.gov/publications/drafts/800-82/draft_sp800-82-fpd.pdf • Emerging Cyber Threats Report for 2009, Georgia Tech http://www.gtiscsecuritysummit.com/pdf/CyberThreatsReport2009.pdf CS691 Robin Kimzey

  12. Questions? CS691 Robin Kimzey

More Related