50
e Secur ity Ajay Nawani AVP Presales Global Operations Presenter

Mobile security

Embed Size (px)

DESCRIPTION

Mobile Security

Citation preview

Page 1: Mobile security

Mobile

Security

Ajay NawaniAVP Presales

Global Operations

Presenter

Page 2: Mobile security

Mobile Revolution

Page 3: Mobile security

What is a Smartphone?

Mobile Broadband

BluetoothApps

Calling

Camera

GPS

Messaging

Gaming

Touch Screen

NFCHotspot

Page 4: Mobile security

Mobile OSQ2 2014

Android iOS Windows Phone BlackBerry OS Others

Page 5: Mobile security

Mobile Broadband

4G3G2G237 kbps 0.4 -16 Mbps 21 – 100 Mbps

Infotainment (News, Songs, Videos, Games, Fun Apps)Social Networking + Free Texting

VOIP (free/subsidized calling)Emails

Mobile Payments (e-commerce)

Usage pattern

Page 6: Mobile security

Wi-Fi Hotspot

Page 7: Mobile security

GPS

Page 8: Mobile security

GPS

Page 9: Mobile security

Bluetooth

Page 10: Mobile security

Camera

Photographic Art

Major Impact

Citizen Journalism

Selfie Phenomenon

Page 11: Mobile security

Messaging

Page 12: Mobile security

Mobile Wallet

Page 13: Mobile security

Mobile Wallet

Page 14: Mobile security
Page 15: Mobile security

Apps

Have become a boon for marketers & business owners

Instrumental role in consumerization of IT

Transformed Internet Usage behavior

Major Impact

Page 16: Mobile security

MOBILE SECURITY

CHALLENGES

Page 17: Mobile security

How about your PRIVACY?

Page 18: Mobile security

How about your PRIVACY?

Page 19: Mobile security

How about your PRIVACY?

Page 20: Mobile security

What Google knows about a user?

Page 21: Mobile security

Social Engineering

Page 22: Mobile security

Social Media!

Page 23: Mobile security

Information gathering

Development of

relationship

Exploitation of

relationship

Execution to achieve the

objective

Social Engineering

Page 24: Mobile security

Privacy

Page 25: Mobile security

Company says third-party applications were responsible for the breach of as many as 200,000 user accounts

Snapchat Hack: 200,000 'Self-Destruct' Nude Images Set to Leak

Privacy

Page 26: Mobile security

iCloud Hacked: 100+ Celebrities Nude Picture Leaks

Privacy

Page 27: Mobile security

Use with care!Tons of Applications!

Page 28: Mobile security

Recognize this!

Page 29: Mobile security

Super-Bright vs Flashlight

Page 30: Mobile security

Flashlight Applications!

Page 31: Mobile security

Mobile Malwares

Page 32: Mobile security

Mobile Marketing

Push notificationsApp-based marketingIn-game mobile marketingMobile web marketingQR codesBluetoothProximity systemsLocation-based services

Mobile Spam

Personal Identification

Location Information

Wireless Security

CONCERNS!

Page 33: Mobile security

Security Tips!!!

Page 34: Mobile security

Use with caution!

All above applications need maximum rights to work!

SMS Manager, Dialer, Keyboard, Launcher, etc.

Page 35: Mobile security

Check application permissions!

Page 36: Mobile security

Encryption

Page 37: Mobile security

Application: Unknown Sources

Page 38: Mobile security

Use of Two Factor Authentication

Portals with 2FA:

All Google Applications

Microsoft

Facebook

Dropbox

iCloud

Many…..

Page 39: Mobile security

Mobile Device Management

Page 40: Mobile security

Sophos Mobile Security

Sophos Mobile Control

Sophos Mobile Encryption

Complete Mobile Security

SECURE PROTECT

CONTROL

Mobile Device Management

Page 41: Mobile security

Free: Mobile Security App

Page 42: Mobile security

Reconfigure Privacy Settings

Page 43: Mobile security

Reconfigure Privacy Settings

Page 44: Mobile security

Some more tips!

1. Turn off WiFi, Location Services and Bluetooth, when not in

use.

2. Don’t use a single password for all your online accounts.

3. Install Apps only from trusted sources.

4. Backup your data.

5. Keep your Apps and mobile OS updated.

6. Don’t tamper with phone settings you don’t know about.

7. Always log out of banking and shopping sites.

8. Avoid texting or emailing critical personal/account

information.

9. Don’t click on links or attachments in unsolicited emails or

text messages.

Page 45: Mobile security

Our Little InitiativeCyberoam Academy

Page 46: Mobile security

Cyberoam AcademyBridging the missing link of education, career, Industry

Page 47: Mobile security

•Module 1: Internetworking Technologies

•Module 2: Network Security's Nuts & Bolts

•Module 3: Building a Secure Network

•Module 4: Firewall

•Module 5: User Authentication

•Module 6: Web Filter

•Module 7: Application Firewall

•Module 8: Network Threat Protection

•Module 9: Virtual Private Network (VPN)

•Module 10: Bandwidth Management

•Module 11: Network High Availability

•Module 12: Managing Security Solution

•Module 13: Ethical Hacks & Penetration Test

•Module 14: Network Forensics

The program offers in-depth learning

Industry-focused Learning Modules

Page 48: Mobile security

EUROPE: Nescot, UK Northumberland College, UK Birmingham City University, UK Kaunas University of Technology, Lithuania Kazimieras Simonavičius University, Vilnius CESI Bordeaux, France La Rochelle University, France

LATIN AMERICA: UTC ( Technological University of Coahuila), Mexico

MIDDLE EAST: Muscat College, Oman Bartin University, Turkey Isra University, Jordan

Cyberoam Academies

Page 49: Mobile security

AFRICA: Institute for Information Technology, Tanzania Victoria University, Uganda Dominion University, Ghana International University of East Africa, Uganda Uganda Technology and Management University, Uganda Catholic University, Mozambique

ASIA: Universiti Teknologi Malaysia, Malaysia iSPACE College of IT Vocational Education, Vietnam Marwadi Education Foundation, India HTC Institute of Technology, India TAC Global, India Charotar University of Science and Technology, India L. J. Group of Institutes, India

Cyberoam Academies

Total: 30

Page 50: Mobile security

Thank [email protected]