SlideShare une entreprise Scribd logo
1  sur  53
HC/RO. Tapan Kumar Khilar
Introduction
The term mobile security is a broad one that covers
everything from protecting mobile devices from
malware threats to reducing risks and
securing mobile devices and their data in the case of
theft, unauthorized access or accidental loss of
the mobile device.
Application security
 Application security describes security measures at
the application level that aim to prevent data or code
within the app from being stolen or hijacked.
 Application security may include hardware, software,
and procedures that identify or
minimize security vulnerabilities.
End-User Education
 In information technology the term end user is used
to distinguish the person for whom a hardware or
software product is designed.
 Our end-users are the first line of defense against
cyber security attacks (like phishing scams).
Mobile Security Threats
 Data Leakage
 Network Spoofing(Unsecured Wi-Fi)
 Social engineering
 Malicious Apps
 Improper Session Handling
Data Leakage
 These are typically free apps found in official app stores
that perform as advertised, but also send personal—and
potentially corporate—data to a remote server, where it is
mined by advertisers or even cybercriminals.
 Apps pose a real problem for mobile users, who give them
sweeping permissions, but don’t always check security.
Army blacklists 3 apps, warns troops against using WeChat, Smesh, Line
Network Spoofing
 Network spoofing is when hackers set up fake access
points (connections that look like Wi-Fi networks but
are actually traps) in high-traffic public locations such as
coffee shops, libraries and airports.
 cybercriminals give the access points common names,
like “Free Airport Wi-Fi” or “Coffeehouse,” which
encourage users to connect.
 attackers require users to create an “account” to access
these free services, complete with a password.
 many users employ the same email and password
combination for multiple services, allowing the hackers
to compromise their email, e-commerce, and other
secure information.
Social engineering
 Social engineering is the practice of obtaining
confidential information by manipulation of legitimate
users.
 A social engineer will commonly use the telephone or
Internet to trick a person into revealing sensitive
information or getting them to do something that is
against typical policies.
Thereare two types of Social Engineeringattacks
 Technical attacks
 Non-technical attacks.
“Technical attacks are those attacks that deceive the user into
believing that the application in use is truly providing them with
security which is not the factalways.”
Example:- Phishing
Common bait
Vishing
Spam mail
Popup Window
Interesting Software
Phishing
Phishing is the process of crafting
emails that appear to be from a
trusted source and typically invite
the recipient to either supply
confidential information or click on
amalicious link or attachment.
Fake Mail Online
Example
Common Bait
• “Sweet Deals”
– Free Stuff
– Limited Time
Offers
– PackageDelivery
• Help Me, Help
You!
– TechSupport
Vishing It is the practice of leveraging Voice over Internet
Protocol (VoIP) technology to trick private personal and
financial information from the public for the purpose of
financial reward. This term is a combination of "voice" and
phishing. Vishing exploits the public's trust in telephone
services.
 Spam Mails E-mails that offer friendships, diversion, gifts
and various free pictures and information take advantage of
the anonymity and camaraderie of the Internet to plant
malicious code.
 Popup Window The attacker's rogue program generates a
pop up window, saying that the application connectivity was
dropped due to network problems, and now the user needs to
reenter his id and password to continue with his session.
 Interesting Software In this case the victim is convinced to
download and install a very useful program or application
which might be 'window dressed' .
The non- technicalattacks
Non-technical approach are perpetrated purely through
deception; i.e. by taking advantage of the victim's human
behavior weaknesses.
 Pretexting / Impersonation
 Dumpster Diving
 Spying and Eavesdropping
 Acting as a Technical Expert
 Support Staff
 Pretexting / Impersonation: This is the act of creating
and using an invented scenario (the pretext) to persuade a
target to release information. It's more than a simple lie as
it most often involves some prior research or set up and
makes use of pieces of known information (e.g. date of
birth, mother's maiden name, billing address etc.) to
establish legitimacy in the mind.
 Dumpster Diving: If the junk mail contains personal
identification information, a 'dumpster diver' can use it in
carrying out an identity theft. A hacker can retrieve
confidential Information from the hard disk of a
computer as there are numerous ways to retrieve
information from disks, even if the user thinks the data
has been 'deleted' from the disk.
 Spying and Eavesdropping: A clever spy can determine
the id and password by observing a user typing it in (Shoulder
Surfing). All that needs to be done is to be there behind the
user and be able to see his fingers on the keyboard.
 Acting as a Technical Expert: This is the case where an
intruder pretends to be a support technician working on a
network problem requests the user to let him access the
workstation and 'fix' the problem.
 Support Staff: Here a hacker may pose as a member of a
facility support staff and do the trick. A man dressed like the
cleaning crew, walks into the work area, carrying cleaning
equipment. In the process of appearing to clean your desk
area, he can snoop around and get valuable information - such
as passwords, or a confidential file that you have forgotten to
lock up.
Malicious Apps
A malware attack is a type of cyber attack in
which malware or malicious software performs
activities on the victim's computer system,
usually without his/her knowledge.
Nowadays, people use words like malware,
spyware, and ransom ware a lot more than the
word "virus." ... Computer viruses operate via
similar means.
Improper session handling
Improper session handling occurs when
the session token is unintentionally shared with the
adversary during a subsequent transaction between the
mobile app and the backend servers.
 Install Some Security App on Your Device.
 Create Strong Passwords and unlock patterns.
 Important Apps like browser, Antivirus and payment wallet apps
should be updated regularly.
 Uninstall unnecessary Apps.
 Understand app permissions before accepting them.
 Do not connect unsecure wifi in public place.
 Avoid opening links of lotteries, prizes, gifts, discounts etc.
 Never give your full name or address to strangers.
 Wipe data on your old phone before you donate, resell or recycle it.
 Report stolen phones.
 Watch out for pirated apps.
 While logging in to any site, check the URL (the one in the address
bar), it should be exactly the same as the site you want to log in to .
Mobile security
Mobile security

Contenu connexe

Tendances

Mobile security
Mobile securityMobile security
Mobile securityMphasis
 
Wireless and mobile security
Wireless and mobile securityWireless and mobile security
Wireless and mobile securityPushkar Pashupat
 
What Is Spyware?
What Is Spyware?What Is Spyware?
What Is Spyware?Lookout
 
Cyber security government ppt By Vishwadeep Badgujar
Cyber security government  ppt By Vishwadeep BadgujarCyber security government  ppt By Vishwadeep Badgujar
Cyber security government ppt By Vishwadeep BadgujarVishwadeep Badgujar
 
Cyber Security 03
Cyber Security 03Cyber Security 03
Cyber Security 03Home
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentationParab Mishra
 
Cyber Security in Society
Cyber Security in SocietyCyber Security in Society
Cyber Security in SocietyRubal Sagwal
 
Network security
Network securityNetwork security
Network securitytoamma
 
Mobile device privacy and security
Mobile device privacy and securityMobile device privacy and security
Mobile device privacy and securityImran Khan
 
Cyber security awareness
Cyber security awarenessCyber security awareness
Cyber security awarenessJason Murray
 
Cybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your OrganizationCybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your OrganizationTriCorps Technologies
 
Mobile Device Security
Mobile Device SecurityMobile Device Security
Mobile Device SecurityNemwos
 

Tendances (20)

Mobile security
Mobile securityMobile security
Mobile security
 
Ensuring Mobile Device Security
Ensuring Mobile Device SecurityEnsuring Mobile Device Security
Ensuring Mobile Device Security
 
Mobile security
Mobile securityMobile security
Mobile security
 
Wireless and mobile security
Wireless and mobile securityWireless and mobile security
Wireless and mobile security
 
Mobile security
Mobile securityMobile security
Mobile security
 
What Is Spyware?
What Is Spyware?What Is Spyware?
What Is Spyware?
 
Mobile security
Mobile securityMobile security
Mobile security
 
Cyber security government ppt By Vishwadeep Badgujar
Cyber security government  ppt By Vishwadeep BadgujarCyber security government  ppt By Vishwadeep Badgujar
Cyber security government ppt By Vishwadeep Badgujar
 
Mobile Security
Mobile SecurityMobile Security
Mobile Security
 
Cyber Security 03
Cyber Security 03Cyber Security 03
Cyber Security 03
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Security in Society
Cyber Security in SocietyCyber Security in Society
Cyber Security in Society
 
Network security
Network securityNetwork security
Network security
 
Mobile device privacy and security
Mobile device privacy and securityMobile device privacy and security
Mobile device privacy and security
 
Cybersecurity Awareness
Cybersecurity AwarenessCybersecurity Awareness
Cybersecurity Awareness
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 
Cyber security awareness
Cyber security awarenessCyber security awareness
Cyber security awareness
 
Cybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your OrganizationCybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your Organization
 
Mobile Device Security
Mobile Device SecurityMobile Device Security
Mobile Device Security
 

Similaire à Mobile security

mobile security.pptx
mobile security.pptxmobile security.pptx
mobile security.pptxTapan Khilar
 
cyber security.pptx
cyber security.pptxcyber security.pptx
cyber security.pptxTapan Khilar
 
Cyber Security
Cyber SecurityCyber Security
Cyber SecurityNcell
 
Cape it unit 2 module 3 unedited students notes (compiled from internet)
Cape it unit 2 module 3 unedited students notes (compiled from internet)Cape it unit 2 module 3 unedited students notes (compiled from internet)
Cape it unit 2 module 3 unedited students notes (compiled from internet)Jevaughan Edie
 
Implications of Misuse and Cyber Security.pdf
Implications of Misuse and Cyber Security.pdfImplications of Misuse and Cyber Security.pdf
Implications of Misuse and Cyber Security.pdfsrtwgwfwwgw
 
SAMPLE ATTACKS PRESENTATION.pdf
SAMPLE ATTACKS PRESENTATION.pdfSAMPLE ATTACKS PRESENTATION.pdf
SAMPLE ATTACKS PRESENTATION.pdfssusera0b94b
 
Security awareness-checklist 2019
Security awareness-checklist 2019Security awareness-checklist 2019
Security awareness-checklist 2019Mustafa Kuğu
 
Ethics and privacy ppt 3rd period
Ethics and privacy ppt 3rd periodEthics and privacy ppt 3rd period
Ethics and privacy ppt 3rd periodcharvill
 
social engineering attacks.docx
social engineering attacks.docxsocial engineering attacks.docx
social engineering attacks.docxMehwishAnsari11
 
Information security
Information securityInformation security
Information securityIshaRana14
 
Edu 03 assingment
Edu 03 assingmentEdu 03 assingment
Edu 03 assingmentAswani34
 
Guarding the Digital Fortress Unmasking 10 Common Types of Cybersecurity Thre...
Guarding the Digital Fortress Unmasking 10 Common Types of Cybersecurity Thre...Guarding the Digital Fortress Unmasking 10 Common Types of Cybersecurity Thre...
Guarding the Digital Fortress Unmasking 10 Common Types of Cybersecurity Thre...Mverve1
 
Guarding the Digital Fortress.pdf
Guarding the Digital Fortress.pdfGuarding the Digital Fortress.pdf
Guarding the Digital Fortress.pdfMverve1
 
Computer Security for Lawyers
Computer Security for LawyersComputer Security for Lawyers
Computer Security for LawyersMark Lanterman
 

Similaire à Mobile security (20)

mobile security.pptx
mobile security.pptxmobile security.pptx
mobile security.pptx
 
cyber security.pptx
cyber security.pptxcyber security.pptx
cyber security.pptx
 
Social engineering
Social engineeringSocial engineering
Social engineering
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Amir bouker
Amir bouker Amir bouker
Amir bouker
 
Computer security
Computer securityComputer security
Computer security
 
Information security
Information securityInformation security
Information security
 
Cape it unit 2 module 3 unedited students notes (compiled from internet)
Cape it unit 2 module 3 unedited students notes (compiled from internet)Cape it unit 2 module 3 unedited students notes (compiled from internet)
Cape it unit 2 module 3 unedited students notes (compiled from internet)
 
Implications of Misuse and Cyber Security.pdf
Implications of Misuse and Cyber Security.pdfImplications of Misuse and Cyber Security.pdf
Implications of Misuse and Cyber Security.pdf
 
SAMPLE ATTACKS PRESENTATION.pdf
SAMPLE ATTACKS PRESENTATION.pdfSAMPLE ATTACKS PRESENTATION.pdf
SAMPLE ATTACKS PRESENTATION.pdf
 
Security awareness-checklist 2019
Security awareness-checklist 2019Security awareness-checklist 2019
Security awareness-checklist 2019
 
Ethics and privacy ppt 3rd period
Ethics and privacy ppt 3rd periodEthics and privacy ppt 3rd period
Ethics and privacy ppt 3rd period
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
social engineering attacks.docx
social engineering attacks.docxsocial engineering attacks.docx
social engineering attacks.docx
 
Information security
Information securityInformation security
Information security
 
Edu 03 assingment
Edu 03 assingmentEdu 03 assingment
Edu 03 assingment
 
Guarding the Digital Fortress Unmasking 10 Common Types of Cybersecurity Thre...
Guarding the Digital Fortress Unmasking 10 Common Types of Cybersecurity Thre...Guarding the Digital Fortress Unmasking 10 Common Types of Cybersecurity Thre...
Guarding the Digital Fortress Unmasking 10 Common Types of Cybersecurity Thre...
 
Guarding the Digital Fortress.pdf
Guarding the Digital Fortress.pdfGuarding the Digital Fortress.pdf
Guarding the Digital Fortress.pdf
 
Computer-Security.pptx
Computer-Security.pptxComputer-Security.pptx
Computer-Security.pptx
 
Computer Security for Lawyers
Computer Security for LawyersComputer Security for Lawyers
Computer Security for Lawyers
 

Plus de Tapan Khilar

CYBER SECURITY AWARENESS.pptx
CYBER SECURITY AWARENESS.pptxCYBER SECURITY AWARENESS.pptx
CYBER SECURITY AWARENESS.pptxTapan Khilar
 
SNMP_ network monitoring.pptx
SNMP_ network monitoring.pptxSNMP_ network monitoring.pptx
SNMP_ network monitoring.pptxTapan Khilar
 
cctv setup (2).pptx
cctv setup (2).pptxcctv setup (2).pptx
cctv setup (2).pptxTapan Khilar
 
IT ACT 2000 _ AA 2008_TAPAN.pptx
IT ACT 2000 _ AA 2008_TAPAN.pptxIT ACT 2000 _ AA 2008_TAPAN.pptx
IT ACT 2000 _ AA 2008_TAPAN.pptxTapan Khilar
 
Snmp network monitoring
Snmp  network monitoringSnmp  network monitoring
Snmp network monitoringTapan Khilar
 
Server operating system
Server operating systemServer operating system
Server operating systemTapan Khilar
 
Memory and storage
Memory and storageMemory and storage
Memory and storageTapan Khilar
 
Input and output device
Input and output deviceInput and output device
Input and output deviceTapan Khilar
 
I series processor
I series  processorI series  processor
I series processorTapan Khilar
 
Computer networking
Computer networkingComputer networking
Computer networkingTapan Khilar
 

Plus de Tapan Khilar (20)

CYBER SECURITY AWARENESS.pptx
CYBER SECURITY AWARENESS.pptxCYBER SECURITY AWARENESS.pptx
CYBER SECURITY AWARENESS.pptx
 
SNMP_ network monitoring.pptx
SNMP_ network monitoring.pptxSNMP_ network monitoring.pptx
SNMP_ network monitoring.pptx
 
cctv setup (2).pptx
cctv setup (2).pptxcctv setup (2).pptx
cctv setup (2).pptx
 
FIBER OPTICS .ppt
FIBER OPTICS .pptFIBER OPTICS .ppt
FIBER OPTICS .ppt
 
IDS VS IPS.pptx
IDS VS IPS.pptxIDS VS IPS.pptx
IDS VS IPS.pptx
 
IT ACT 2000 _ AA 2008_TAPAN.pptx
IT ACT 2000 _ AA 2008_TAPAN.pptxIT ACT 2000 _ AA 2008_TAPAN.pptx
IT ACT 2000 _ AA 2008_TAPAN.pptx
 
Acl cisco
Acl ciscoAcl cisco
Acl cisco
 
Data security
Data securityData security
Data security
 
Snmp network monitoring
Snmp  network monitoringSnmp  network monitoring
Snmp network monitoring
 
Server operating system
Server operating systemServer operating system
Server operating system
 
Operating systems
Operating systemsOperating systems
Operating systems
 
Network switch
Network switchNetwork switch
Network switch
 
Network devices
Network devicesNetwork devices
Network devices
 
Memory and storage
Memory and storageMemory and storage
Memory and storage
 
Ip addressing
Ip addressingIp addressing
Ip addressing
 
Internet security
Internet securityInternet security
Internet security
 
Input and output device
Input and output deviceInput and output device
Input and output device
 
I series processor
I series  processorI series  processor
I series processor
 
Computer networking
Computer networkingComputer networking
Computer networking
 
Assemble your pc
Assemble your pcAssemble your pc
Assemble your pc
 

Dernier

Mobile Application Development-Components and Layouts
Mobile Application Development-Components and LayoutsMobile Application Development-Components and Layouts
Mobile Application Development-Components and LayoutsChandrakantDivate1
 
FULL ENJOY - 9999218229 Call Girls in {Mahipalpur}| Delhi NCR
FULL ENJOY - 9999218229 Call Girls in {Mahipalpur}| Delhi NCRFULL ENJOY - 9999218229 Call Girls in {Mahipalpur}| Delhi NCR
FULL ENJOY - 9999218229 Call Girls in {Mahipalpur}| Delhi NCRnishacall1
 
Leading Mobile App Development Companies in India (2).pdf
Leading Mobile App Development Companies in India (2).pdfLeading Mobile App Development Companies in India (2).pdf
Leading Mobile App Development Companies in India (2).pdfCWS Technology
 
Android Application Components with Implementation & Examples
Android Application Components with Implementation & ExamplesAndroid Application Components with Implementation & Examples
Android Application Components with Implementation & ExamplesChandrakantDivate1
 
Thane 💋 Call Girls 7738631006 💋 Call Girls in Thane Escort service book now. ...
Thane 💋 Call Girls 7738631006 💋 Call Girls in Thane Escort service book now. ...Thane 💋 Call Girls 7738631006 💋 Call Girls in Thane Escort service book now. ...
Thane 💋 Call Girls 7738631006 💋 Call Girls in Thane Escort service book now. ...Pooja Nehwal
 
Mobile Application Development-Android and It’s Tools
Mobile Application Development-Android and It’s ToolsMobile Application Development-Android and It’s Tools
Mobile Application Development-Android and It’s ToolsChandrakantDivate1
 
9999266834 Call Girls In Noida Sector 52 (Delhi) Call Girl Service
9999266834 Call Girls In Noida Sector 52 (Delhi) Call Girl Service9999266834 Call Girls In Noida Sector 52 (Delhi) Call Girl Service
9999266834 Call Girls In Noida Sector 52 (Delhi) Call Girl Servicenishacall1
 

Dernier (8)

Mobile Application Development-Components and Layouts
Mobile Application Development-Components and LayoutsMobile Application Development-Components and Layouts
Mobile Application Development-Components and Layouts
 
FULL ENJOY - 9999218229 Call Girls in {Mahipalpur}| Delhi NCR
FULL ENJOY - 9999218229 Call Girls in {Mahipalpur}| Delhi NCRFULL ENJOY - 9999218229 Call Girls in {Mahipalpur}| Delhi NCR
FULL ENJOY - 9999218229 Call Girls in {Mahipalpur}| Delhi NCR
 
Obat Penggugur Kandungan Di Apotik Kimia Farma (087776558899)
Obat Penggugur Kandungan Di Apotik Kimia Farma (087776558899)Obat Penggugur Kandungan Di Apotik Kimia Farma (087776558899)
Obat Penggugur Kandungan Di Apotik Kimia Farma (087776558899)
 
Leading Mobile App Development Companies in India (2).pdf
Leading Mobile App Development Companies in India (2).pdfLeading Mobile App Development Companies in India (2).pdf
Leading Mobile App Development Companies in India (2).pdf
 
Android Application Components with Implementation & Examples
Android Application Components with Implementation & ExamplesAndroid Application Components with Implementation & Examples
Android Application Components with Implementation & Examples
 
Thane 💋 Call Girls 7738631006 💋 Call Girls in Thane Escort service book now. ...
Thane 💋 Call Girls 7738631006 💋 Call Girls in Thane Escort service book now. ...Thane 💋 Call Girls 7738631006 💋 Call Girls in Thane Escort service book now. ...
Thane 💋 Call Girls 7738631006 💋 Call Girls in Thane Escort service book now. ...
 
Mobile Application Development-Android and It’s Tools
Mobile Application Development-Android and It’s ToolsMobile Application Development-Android and It’s Tools
Mobile Application Development-Android and It’s Tools
 
9999266834 Call Girls In Noida Sector 52 (Delhi) Call Girl Service
9999266834 Call Girls In Noida Sector 52 (Delhi) Call Girl Service9999266834 Call Girls In Noida Sector 52 (Delhi) Call Girl Service
9999266834 Call Girls In Noida Sector 52 (Delhi) Call Girl Service
 

Mobile security

  • 2. Introduction The term mobile security is a broad one that covers everything from protecting mobile devices from malware threats to reducing risks and securing mobile devices and their data in the case of theft, unauthorized access or accidental loss of the mobile device.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10. Application security  Application security describes security measures at the application level that aim to prevent data or code within the app from being stolen or hijacked.  Application security may include hardware, software, and procedures that identify or minimize security vulnerabilities.
  • 11. End-User Education  In information technology the term end user is used to distinguish the person for whom a hardware or software product is designed.  Our end-users are the first line of defense against cyber security attacks (like phishing scams).
  • 12. Mobile Security Threats  Data Leakage  Network Spoofing(Unsecured Wi-Fi)  Social engineering  Malicious Apps  Improper Session Handling
  • 13. Data Leakage  These are typically free apps found in official app stores that perform as advertised, but also send personal—and potentially corporate—data to a remote server, where it is mined by advertisers or even cybercriminals.  Apps pose a real problem for mobile users, who give them sweeping permissions, but don’t always check security.
  • 14.
  • 15.
  • 16. Army blacklists 3 apps, warns troops against using WeChat, Smesh, Line
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22. Network Spoofing  Network spoofing is when hackers set up fake access points (connections that look like Wi-Fi networks but are actually traps) in high-traffic public locations such as coffee shops, libraries and airports.  cybercriminals give the access points common names, like “Free Airport Wi-Fi” or “Coffeehouse,” which encourage users to connect.  attackers require users to create an “account” to access these free services, complete with a password.  many users employ the same email and password combination for multiple services, allowing the hackers to compromise their email, e-commerce, and other secure information.
  • 23.
  • 24. Social engineering  Social engineering is the practice of obtaining confidential information by manipulation of legitimate users.  A social engineer will commonly use the telephone or Internet to trick a person into revealing sensitive information or getting them to do something that is against typical policies.
  • 25. Thereare two types of Social Engineeringattacks  Technical attacks  Non-technical attacks. “Technical attacks are those attacks that deceive the user into believing that the application in use is truly providing them with security which is not the factalways.” Example:- Phishing Common bait Vishing Spam mail Popup Window Interesting Software
  • 26. Phishing Phishing is the process of crafting emails that appear to be from a trusted source and typically invite the recipient to either supply confidential information or click on amalicious link or attachment.
  • 27.
  • 28.
  • 29.
  • 30.
  • 31.
  • 33.
  • 34.
  • 36. Common Bait • “Sweet Deals” – Free Stuff – Limited Time Offers – PackageDelivery • Help Me, Help You! – TechSupport
  • 37.
  • 38.
  • 39. Vishing It is the practice of leveraging Voice over Internet Protocol (VoIP) technology to trick private personal and financial information from the public for the purpose of financial reward. This term is a combination of "voice" and phishing. Vishing exploits the public's trust in telephone services.  Spam Mails E-mails that offer friendships, diversion, gifts and various free pictures and information take advantage of the anonymity and camaraderie of the Internet to plant malicious code.  Popup Window The attacker's rogue program generates a pop up window, saying that the application connectivity was dropped due to network problems, and now the user needs to reenter his id and password to continue with his session.  Interesting Software In this case the victim is convinced to download and install a very useful program or application which might be 'window dressed' .
  • 40.
  • 41.
  • 42. The non- technicalattacks Non-technical approach are perpetrated purely through deception; i.e. by taking advantage of the victim's human behavior weaknesses.  Pretexting / Impersonation  Dumpster Diving  Spying and Eavesdropping  Acting as a Technical Expert  Support Staff
  • 43.  Pretexting / Impersonation: This is the act of creating and using an invented scenario (the pretext) to persuade a target to release information. It's more than a simple lie as it most often involves some prior research or set up and makes use of pieces of known information (e.g. date of birth, mother's maiden name, billing address etc.) to establish legitimacy in the mind.  Dumpster Diving: If the junk mail contains personal identification information, a 'dumpster diver' can use it in carrying out an identity theft. A hacker can retrieve confidential Information from the hard disk of a computer as there are numerous ways to retrieve information from disks, even if the user thinks the data has been 'deleted' from the disk.
  • 44.  Spying and Eavesdropping: A clever spy can determine the id and password by observing a user typing it in (Shoulder Surfing). All that needs to be done is to be there behind the user and be able to see his fingers on the keyboard.  Acting as a Technical Expert: This is the case where an intruder pretends to be a support technician working on a network problem requests the user to let him access the workstation and 'fix' the problem.  Support Staff: Here a hacker may pose as a member of a facility support staff and do the trick. A man dressed like the cleaning crew, walks into the work area, carrying cleaning equipment. In the process of appearing to clean your desk area, he can snoop around and get valuable information - such as passwords, or a confidential file that you have forgotten to lock up.
  • 45. Malicious Apps A malware attack is a type of cyber attack in which malware or malicious software performs activities on the victim's computer system, usually without his/her knowledge. Nowadays, people use words like malware, spyware, and ransom ware a lot more than the word "virus." ... Computer viruses operate via similar means.
  • 46.
  • 47. Improper session handling Improper session handling occurs when the session token is unintentionally shared with the adversary during a subsequent transaction between the mobile app and the backend servers.
  • 48.
  • 49.
  • 50.
  • 51.  Install Some Security App on Your Device.  Create Strong Passwords and unlock patterns.  Important Apps like browser, Antivirus and payment wallet apps should be updated regularly.  Uninstall unnecessary Apps.  Understand app permissions before accepting them.  Do not connect unsecure wifi in public place.  Avoid opening links of lotteries, prizes, gifts, discounts etc.  Never give your full name or address to strangers.  Wipe data on your old phone before you donate, resell or recycle it.  Report stolen phones.  Watch out for pirated apps.  While logging in to any site, check the URL (the one in the address bar), it should be exactly the same as the site you want to log in to .

Notes de l'éditeur

  1. Statistics. Cybercrime cases in India, registered under the IT Act, increased at a rate of 300 percent between 2011 and 2014. In 2015, there were 11,592 cases of cyber crime registered in India.12317 in 2016
  2. Implement a cybersecurity policy and procedure document.Have cybersecurity tools in place to help prevent the potential for compromise.
  3. These are typically free apps found in official app stores that perform as advertised, but also send personal—and potentially corporate—data to a remote server, where it is mined by advertisers or even cybercriminals.