1 / 9

Security in mobile technologies

Security in mobile technologies. By Leon Antony. Verizon asks the FCC. The 60 Day policy-  as part of an initiative to prevent identity theft and fraud.  Verizon asks the Federal Communications Commissions to lock new smartphones for their network for 60 days. Data Leakage.

bwillis
Download Presentation

Security in mobile technologies

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Security in mobile technologies By Leon Antony

  2. Verizon asks the FCC • The 60 Day policy-  as part of an initiative to prevent identity theft and fraud.  Verizon asks the Federal Communications Commissions to lock new smartphones for their network for 60 days.

  3. Data Leakage • The unauthorized transmission of data from within an organization to an external destination or recipient. • Mobile apps are often the cause of unintentional data leakage. Known as Riskware Apps

  4. Unsecured Wi-Fi(Basicly Free WIFI) • 1. Capture your account’s user ID and passwords. • 2. Log the data of online traffic accessed on your phone or computer. In this way, they can maintain a data of the websites you mostly visit, and plan attack from these websites. • 3. Gain access to your computer, its network and data. • 4. Launch a spam or malware attack on your device. • 5. Hijack the account you are logged into, and use it for unscrupulous purpose. • 6. Redirect you to a phishing webpage where you might give away your personal information.

  5. Network Spoofing • Setting up fake access points or hotspots in high traffic areas. • Attackers require users to create an “account” to access these free services, complete with a password. Many users employ the same email and password combination for multiple services, allowing the hackers to compromise their email, e-commerce, and other secure information.

  6. Phishing Attacks • The fraudulent attempt to obtain sensitive information such as usernames, passwords and credit card details by disguising as a trustworthy entity in an electronic communication

  7. Spyware • As the name implies, this is software that "spies" on your computer. ... Spyware can capture information like Web browsing habits, e-mail messages, usernames and passwords, and credit card information. If left unchecked, the software can transmit this data to another person's computer over the Internet.

  8. Security Management • Device Protection: Allowing remote data "wiping" if your device is ever lost or stolen • Data Protection: Preventing corporate data from being transferred to personal apps running on the same device or personal network • App-Management Security: Protecting your in-app information from becoming compromised. • Download a Antivirus

  9. Sources • https://www.kaspersky.com/resource-center/threats/top-seven-mobile-security-threats-smart-phones-tablets-and-mobile-internet-devices-what-the-future-has-in-store • https://www.finjanmobile.com/the-dangers-of-using-unsecured-wi-fi/ • https://www.theverge.com/2019/2/22/18236759/verizon-fcc-phone-locking-60-day-fraud-identity-theft-protection • https://www.information-age.com/security-vulnerabilities-mobile-devices-123464616/

More Related