3. INTRODUCTION
IMPORTANCE OF MOBILE PHONE
It is used in our daily life to make phone calls, messages,
etc.
Phone has internet access, built in video cameras and ability
to install additional software.
Phone contains sufficient storage to store precious data like
official documents, private photos-videos, contacts, etc.
4. WHY MOBILE PROTECTION IS IMPORTANT?
As mobile phone contains our private data it is necessary to protect
mobile phone by applying unlock patterns and installing antivirus
applications.
PHYSICAL SECURITY: A phone can be confiscated or stolen. So
there should be some password protection on your phone.
Once your data is stolen by hacker, you would asked to pay some
bucks to release or get your data back or hacker can also blackmail
you on the basis of your private data.
5. TYPES OF MOBILE SECURITY
MOBILE DEVICE SECURITY.
MOBILE APPLICATION SECURITY.
6. MOBILE DEVICE SECURITY
SCREEN LOCKS: All mobile devices (e.g., phones, tablets, and laptops)
should have the screen lock set.
7. .LOCKOUT SETTINGS: After a specific no. of unsuccessful unlock
attempts, the device will get locked which can be opened through user’s ID.
GPS: Many mobile devices have GPS
Capabilities, allowing the device to be
Located if it is lost or stolen.
REMOTE WIPING: some devices allow
The device to be wipe out all data and
applications remotely. This can be used if a
device is unrecoverable.
8. Application controls: Many mobile applications
attempt to access unnecessary user
information (e.g. the location of device).
Controls should be used to limit data that
applications can access and restrict the
actions that applications may undertake.
9. MOBILE APPLICATION SECURITY
ENCRYPTION: Ensure that mobile applications are encrypting sensitive
data that is stored on the devices. Encryption keys must also be created and
stored securely.
AUTHENTICATION: A best practices for mobile
application to authenticate the user and to base access to data
on user’s authentication level.
10. APPLICATION WHITELISTING: it is device administration
practice used to prevent unauthorized application from running. The purpose
is primarily to protect device and networks from harmful application.
12. APPLICATION BASED THREATS
It happens when people download apps that look legit but actually skim data
from their device. Examples are spyware and malware that steals personal and
business information without people realizing what’s going on.
Application based threats are as follows:
MALWARE
SPYWARE
PRIVACY THREATS
VULNERABLE APPLICATION
Some well-known apps like [TRUECALLER and VLC MEDIA PLAYER]
are caught cheating with user’s privacy.
13. TRUECALLER: [malware threat] In latest update of truecaller [v10.41.6]
problem of automatic UPI verification with truecaller is found in which this
app automatically links to your bank account without taking permission of
user.
VLC MEDIAPLAYER: Similarly in VLC [spyware and malware threat]
application bug is found that allows hackers to access
user’s personal data on mobile phone.
14. WEB BASED THREATS
Web based threats are tend to go unnoticed. They happen when people visit
affected sites that seem fine on front-end but in reality, automatically download
malicious content onto devices.
Web based threats are as follows:
PHISHING SCAMS
DRIVE-BY DOWNLOAD
BROWSER EXPLOITS
One of the well-known web based threat is Ransomware virus
15. Ransomware virus can affect your phone by application download and web
links. Once you click link, application starts downloading and interface occurs
on your mobile screen and encrypts all your data. Which can only be removed
after providing some money or it will be deleted your data.
16. NETWORK BASED THREATS
Network based threats are especially bad because cybercriminals can steal
unencrypted data while people use public Wi-Fi networks. Is contains
NETWORK EXPLOITS
WI-FI SNIFFING
17. TIPS TO STAY SAFE
Set a password.
Always update your phone with latest version.
Never download unknown apps.
Always be aware of what you are installing.
Don’t open unknown link from unknown website.
Backup your phone data if possible.
Buy antivirus security for your device.
19. CONCLUTION
Our mobile device contains important and delicate data
for hackers which is needs to be protected.
With simple tips given in presentation we can keep our
mobile and data safe and secure