SlideShare a Scribd company logo
1 of 4
SSGT FELICIANO
CYBER SURETY
(3)
Application
and Operating
System
Updates
“It used to be that we imagined
that our mobile phones would be
for us to talk to each other. Now
our mobile phones are there now
to talk to us”. Sherry Turkle.
(4)
Screen Lock
(9)
Remote Wipe
COUNTER
MEASURE
3
9
4
GOOD BAD
Fixes a flaw or
vulnerability in the
OS, App Design, and
allows extended life
of phone
It’s a hassle.
Wastes time, data,
etc. Can be used
as profit driven
avenue by dev
Blocks unauthorized
users from
accessing your
phone
Depending on
option selected
may give false
sense of security
Allows the owner to
do master reset of
his device if lost or
stolen
Cellphone must be
registered on DM,
harder to find if
done, may not
erase SD card
LOCATION OF IN-DEPTH GUIDE
How To Defend Your Cellphone from Hackers
– A Comprehensive Guide, 2nd Installment”
NOTE: JUST FOLLOW – “STEPS TO HARDEN YOUR SYSTEM”

More Related Content

What's hot

Camera Phone Security
Camera Phone SecurityCamera Phone Security
Camera Phone SecurityTrading Atlas
 
Mobile protection
Mobile protection Mobile protection
Mobile protection preetpatel72
 
The Invisible Future of Design
The Invisible Future of DesignThe Invisible Future of Design
The Invisible Future of DesignDerrick Fountain
 
Youtube videos might hijack your phone
Youtube videos might hijack your phoneYoutube videos might hijack your phone
Youtube videos might hijack your phoneniraj joshi
 
Tom Fun Mobile App
Tom Fun Mobile AppTom Fun Mobile App
Tom Fun Mobile AppDC Kumawat
 
Mobile security
Mobile securityMobile security
Mobile securityMphasis
 
Smartphone Ownage: The state of mobile botnets and rootkits
Smartphone Ownage: The state of mobile botnets and rootkitsSmartphone Ownage: The state of mobile botnets and rootkits
Smartphone Ownage: The state of mobile botnets and rootkitsJimmy Shah
 
Ambient Intelligence - Parham Beheshti
Ambient Intelligence - Parham BeheshtiAmbient Intelligence - Parham Beheshti
Ambient Intelligence - Parham BeheshtiWithTheBest
 
Holding slides
Holding slidesHolding slides
Holding slidesJmalaraiir
 
C0c0n 2011 mobile security presentation v1.2
C0c0n 2011 mobile  security presentation v1.2C0c0n 2011 mobile  security presentation v1.2
C0c0n 2011 mobile security presentation v1.2Santosh Satam
 
Orion Infosolutions Number Tracking Mobile App
Orion Infosolutions Number Tracking Mobile AppOrion Infosolutions Number Tracking Mobile App
Orion Infosolutions Number Tracking Mobile AppDC Kumawat
 
Mobile side effect on human body
Mobile side effect on human bodyMobile side effect on human body
Mobile side effect on human bodyEdress Oryakhail
 
Smart phone presentation
Smart phone presentationSmart phone presentation
Smart phone presentationATIF REHMAN
 

What's hot (20)

Camera Phone Security
Camera Phone SecurityCamera Phone Security
Camera Phone Security
 
Mobile protection
Mobile protection Mobile protection
Mobile protection
 
Desktop sms
Desktop smsDesktop sms
Desktop sms
 
The Invisible Future of Design
The Invisible Future of DesignThe Invisible Future of Design
The Invisible Future of Design
 
Youtube videos might hijack your phone
Youtube videos might hijack your phoneYoutube videos might hijack your phone
Youtube videos might hijack your phone
 
Tom Fun Mobile App
Tom Fun Mobile AppTom Fun Mobile App
Tom Fun Mobile App
 
MobiKUI
MobiKUIMobiKUI
MobiKUI
 
Mobile security
Mobile securityMobile security
Mobile security
 
Preso
PresoPreso
Preso
 
Smartphone Ownage: The state of mobile botnets and rootkits
Smartphone Ownage: The state of mobile botnets and rootkitsSmartphone Ownage: The state of mobile botnets and rootkits
Smartphone Ownage: The state of mobile botnets and rootkits
 
Mobile security - Intense overview
Mobile security - Intense overviewMobile security - Intense overview
Mobile security - Intense overview
 
Mobile ppt
Mobile pptMobile ppt
Mobile ppt
 
Ambient Intelligence - Parham Beheshti
Ambient Intelligence - Parham BeheshtiAmbient Intelligence - Parham Beheshti
Ambient Intelligence - Parham Beheshti
 
Holding slides
Holding slidesHolding slides
Holding slides
 
C0c0n 2011 mobile security presentation v1.2
C0c0n 2011 mobile  security presentation v1.2C0c0n 2011 mobile  security presentation v1.2
C0c0n 2011 mobile security presentation v1.2
 
The nfc technology
The nfc technologyThe nfc technology
The nfc technology
 
Orion Infosolutions Number Tracking Mobile App
Orion Infosolutions Number Tracking Mobile AppOrion Infosolutions Number Tracking Mobile App
Orion Infosolutions Number Tracking Mobile App
 
Smart phones
Smart phonesSmart phones
Smart phones
 
Mobile side effect on human body
Mobile side effect on human bodyMobile side effect on human body
Mobile side effect on human body
 
Smart phone presentation
Smart phone presentationSmart phone presentation
Smart phone presentation
 

Similar to 9. cellphone hardening (cyber awareness series)

Les 10 risques liés aux applications mobiles
Les 10 risques liés aux applications mobilesLes 10 risques liés aux applications mobiles
Les 10 risques liés aux applications mobilesBee_Ware
 
mobile jammer ppt.pptx
mobile jammer ppt.pptxmobile jammer ppt.pptx
mobile jammer ppt.pptxManojMudhiraj3
 
Mobile cloning modified with images and bettermented
Mobile cloning modified with images and bettermentedMobile cloning modified with images and bettermented
Mobile cloning modified with images and bettermentedSai Srinivas Mittapalli
 
Blackberry playbook – new challenges
Blackberry playbook – new challengesBlackberry playbook – new challenges
Blackberry playbook – new challengesSTO STRATEGY
 
Blackberry playbook – new challenges
Blackberry playbook – new challengesBlackberry playbook – new challenges
Blackberry playbook – new challengesYury Chemerkin
 
Shmoocon 2010 - The Monkey Steals the Berries
Shmoocon 2010 - The Monkey Steals the BerriesShmoocon 2010 - The Monkey Steals the Berries
Shmoocon 2010 - The Monkey Steals the BerriesTyler Shields
 
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?Do New Mobile Devices in Enterprises Pose A Serious Security Threat?
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?acijjournal
 
The Consumerisation of Corporate IT
The Consumerisation of Corporate ITThe Consumerisation of Corporate IT
The Consumerisation of Corporate ITPeter Wood
 
Desgn&imp authentctn.ppt by Jaseela
Desgn&imp authentctn.ppt by JaseelaDesgn&imp authentctn.ppt by Jaseela
Desgn&imp authentctn.ppt by JaseelaStudent
 
ContentsMobile Forensic3Introduction3What It Is3How I.docx
ContentsMobile Forensic3Introduction3What It Is3How I.docxContentsMobile Forensic3Introduction3What It Is3How I.docx
ContentsMobile Forensic3Introduction3What It Is3How I.docxrichardnorman90310
 
SOK:An overview of data extraction techniques from mobile phones
SOK:An overview of data extraction techniques from mobile phonesSOK:An overview of data extraction techniques from mobile phones
SOK:An overview of data extraction techniques from mobile phonesAshish Sutar
 
Resources for Lawyers Who Have Experienced Theft of Client Information
Resources for Lawyers Who Have Experienced Theft of Client InformationResources for Lawyers Who Have Experienced Theft of Client Information
Resources for Lawyers Who Have Experienced Theft of Client InformationOregon Law Practice Management
 
Security Application for Smart Phones and other Mobile Devices
Security Application for Smart Phones and other Mobile DevicesSecurity Application for Smart Phones and other Mobile Devices
Security Application for Smart Phones and other Mobile DevicesŃirjhor Ánjum
 
811719104102_Tamilmannavan S.pptx
811719104102_Tamilmannavan S.pptx811719104102_Tamilmannavan S.pptx
811719104102_Tamilmannavan S.pptxDEVIKAS92
 

Similar to 9. cellphone hardening (cyber awareness series) (20)

Clonning
ClonningClonning
Clonning
 
Les 10 risques liés aux applications mobiles
Les 10 risques liés aux applications mobilesLes 10 risques liés aux applications mobiles
Les 10 risques liés aux applications mobiles
 
mobile jammer ppt.pptx
mobile jammer ppt.pptxmobile jammer ppt.pptx
mobile jammer ppt.pptx
 
Mobile cloning modified with images and bettermented
Mobile cloning modified with images and bettermentedMobile cloning modified with images and bettermented
Mobile cloning modified with images and bettermented
 
Blackberry playbook – new challenges
Blackberry playbook – new challengesBlackberry playbook – new challenges
Blackberry playbook – new challenges
 
CS_UNIT 2(P3).pptx
CS_UNIT 2(P3).pptxCS_UNIT 2(P3).pptx
CS_UNIT 2(P3).pptx
 
Blackberry playbook – new challenges
Blackberry playbook – new challengesBlackberry playbook – new challenges
Blackberry playbook – new challenges
 
Cn35499502
Cn35499502Cn35499502
Cn35499502
 
Shmoocon 2010 - The Monkey Steals the Berries
Shmoocon 2010 - The Monkey Steals the BerriesShmoocon 2010 - The Monkey Steals the Berries
Shmoocon 2010 - The Monkey Steals the Berries
 
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?Do New Mobile Devices in Enterprises Pose A Serious Security Threat?
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?
 
The Consumerisation of Corporate IT
The Consumerisation of Corporate ITThe Consumerisation of Corporate IT
The Consumerisation of Corporate IT
 
Desgn&imp authentctn.ppt by Jaseela
Desgn&imp authentctn.ppt by JaseelaDesgn&imp authentctn.ppt by Jaseela
Desgn&imp authentctn.ppt by Jaseela
 
ContentsMobile Forensic3Introduction3What It Is3How I.docx
ContentsMobile Forensic3Introduction3What It Is3How I.docxContentsMobile Forensic3Introduction3What It Is3How I.docx
ContentsMobile Forensic3Introduction3What It Is3How I.docx
 
NWSLTR_Volume5_Issue2
NWSLTR_Volume5_Issue2NWSLTR_Volume5_Issue2
NWSLTR_Volume5_Issue2
 
Mobile cloning
Mobile cloningMobile cloning
Mobile cloning
 
SOK:An overview of data extraction techniques from mobile phones
SOK:An overview of data extraction techniques from mobile phonesSOK:An overview of data extraction techniques from mobile phones
SOK:An overview of data extraction techniques from mobile phones
 
Resources for Lawyers Who Have Experienced Theft of Client Information
Resources for Lawyers Who Have Experienced Theft of Client InformationResources for Lawyers Who Have Experienced Theft of Client Information
Resources for Lawyers Who Have Experienced Theft of Client Information
 
Security Application for Smart Phones and other Mobile Devices
Security Application for Smart Phones and other Mobile DevicesSecurity Application for Smart Phones and other Mobile Devices
Security Application for Smart Phones and other Mobile Devices
 
14A81A05B5
14A81A05B514A81A05B5
14A81A05B5
 
811719104102_Tamilmannavan S.pptx
811719104102_Tamilmannavan S.pptx811719104102_Tamilmannavan S.pptx
811719104102_Tamilmannavan S.pptx
 

More from Isaac Feliciano

2. crime prevention series mail phishing (fraud)
2. crime prevention series   mail phishing (fraud)2. crime prevention series   mail phishing (fraud)
2. crime prevention series mail phishing (fraud)Isaac Feliciano
 
2. cyber crime series - crypto currency theft
2. cyber crime series - crypto currency theft2. cyber crime series - crypto currency theft
2. cyber crime series - crypto currency theftIsaac Feliciano
 
1. cyber crime series - identity theft
1. cyber crime series  - identity theft1. cyber crime series  - identity theft
1. cyber crime series - identity theftIsaac Feliciano
 
3. Ransomware (cyber awareness series)
3. Ransomware (cyber awareness series)3. Ransomware (cyber awareness series)
3. Ransomware (cyber awareness series)Isaac Feliciano
 
7. medial infrastructure (cyber awareness series)
7. medial infrastructure (cyber awareness series)7. medial infrastructure (cyber awareness series)
7. medial infrastructure (cyber awareness series)Isaac Feliciano
 
6. mobile security (cyber awareness series)
6. mobile security (cyber awareness series)6. mobile security (cyber awareness series)
6. mobile security (cyber awareness series)Isaac Feliciano
 
2. rats (trojans) (cyber awareness series)
2. rats (trojans) (cyber awareness series)2. rats (trojans) (cyber awareness series)
2. rats (trojans) (cyber awareness series)Isaac Feliciano
 
1. spear phishing (cyber awareness series)
1. spear phishing (cyber awareness series)1. spear phishing (cyber awareness series)
1. spear phishing (cyber awareness series)Isaac Feliciano
 

More from Isaac Feliciano (8)

2. crime prevention series mail phishing (fraud)
2. crime prevention series   mail phishing (fraud)2. crime prevention series   mail phishing (fraud)
2. crime prevention series mail phishing (fraud)
 
2. cyber crime series - crypto currency theft
2. cyber crime series - crypto currency theft2. cyber crime series - crypto currency theft
2. cyber crime series - crypto currency theft
 
1. cyber crime series - identity theft
1. cyber crime series  - identity theft1. cyber crime series  - identity theft
1. cyber crime series - identity theft
 
3. Ransomware (cyber awareness series)
3. Ransomware (cyber awareness series)3. Ransomware (cyber awareness series)
3. Ransomware (cyber awareness series)
 
7. medial infrastructure (cyber awareness series)
7. medial infrastructure (cyber awareness series)7. medial infrastructure (cyber awareness series)
7. medial infrastructure (cyber awareness series)
 
6. mobile security (cyber awareness series)
6. mobile security (cyber awareness series)6. mobile security (cyber awareness series)
6. mobile security (cyber awareness series)
 
2. rats (trojans) (cyber awareness series)
2. rats (trojans) (cyber awareness series)2. rats (trojans) (cyber awareness series)
2. rats (trojans) (cyber awareness series)
 
1. spear phishing (cyber awareness series)
1. spear phishing (cyber awareness series)1. spear phishing (cyber awareness series)
1. spear phishing (cyber awareness series)
 

9. cellphone hardening (cyber awareness series)

  • 2. (3) Application and Operating System Updates “It used to be that we imagined that our mobile phones would be for us to talk to each other. Now our mobile phones are there now to talk to us”. Sherry Turkle. (4) Screen Lock (9) Remote Wipe
  • 3. COUNTER MEASURE 3 9 4 GOOD BAD Fixes a flaw or vulnerability in the OS, App Design, and allows extended life of phone It’s a hassle. Wastes time, data, etc. Can be used as profit driven avenue by dev Blocks unauthorized users from accessing your phone Depending on option selected may give false sense of security Allows the owner to do master reset of his device if lost or stolen Cellphone must be registered on DM, harder to find if done, may not erase SD card
  • 4. LOCATION OF IN-DEPTH GUIDE How To Defend Your Cellphone from Hackers – A Comprehensive Guide, 2nd Installment” NOTE: JUST FOLLOW – “STEPS TO HARDEN YOUR SYSTEM”