SlideShare una empresa de Scribd logo
1 de 14
Mobile Security Mobile Commerce USA - November 2009 David Eads, Founder david@MobileStrategyPartners.com +1 (404) 285-4219
Background Founder & CEO, Mobile Strategy Partners LLC Help organizations optimize mobile commerce from both a business & tech perspective Perform Risk Assessments as a part of my practice Participated in many IT security reviews throughout my career in ecommerce, mobile commerce Confidential
Frozen in fear Security consistently reported as the biggest barrier to mobile banking and mobile commerce usage 47% of non-adopters cite security;73% fear hackers can break into their phones (Tom Wills, Javelin, 12/08 ) Security considered during purchase, implementation Fraud fears limit Mobile Commerce functionality in N. America Few commerce apps with a real checkout process Limited transactional capabilities in mobile banking Mobile payments wheels still spinning (esp. P2P) Attacks follow adoption: Africa was first, hackers will turn to us Phishing seems the most common & effective attack SIM, Mobile phone fraud also related (Absa ‘07) Confidential
It’s not what we fear… Mobile Commerce is basically safe, however consumers are still afraid Everyone generally learned lessons of ecommerce 128-bit SSL Multifactor Authentication Phone Disabling features Phone viruses, network hacks rare so far Mobile makes us MORE secure in many ways Balance, Transaction alerts, visibility Confidential
… the danger is the unknown Untested defenses are weak defenses Monitoring systems an afterthought Mobile new to Information Security teams Consumer education lacking Unsophisticated users with smart phones Confidential
Social trickery Phishing proven effective, likely to continue Phishing often cross-channel Fake call centers, targeted attacks, detailed research URL not visible on mobile browsers, URL shorteners SMS alerts perfect temptation for phishing Shortcode registration limits spoofing, but possible Linking from SMS to web encourages email to web Social networking, mobile convergence amplifies risk Confidential
Limited Detection Few organizations monitor for mobile attacks Variety of fraud detection systems exist for ecommerce sites but not optimized for mobile Some adaptable to mobile, mobile requires more(e.g. monitor SMS patterns, web services, mobile web) Security companies yet to fully focus on mobile Recession, limited adoption discourages investment in defensive systems Attacks can happen even if adoption is low! Confidential
Unsophisticated Users What happens when my Mom has a smartphone?! Unsophisticated userstoday tend to have unsophisticated phones which provide significant protection Smartphone trend means most phones will be smart My Mother-in-law & Father-in-Law have Blackberries They are more vulnerable via phone than  AOL dial-up Damage to unsophisticated users can create major perception problems for the entire industry Confidential
Recommendations Continue discouraging SMS, email links to apps Promote, encourage PIN-locking phones Require Multifactor Authentication & don’t bypass it Avoid storing sensitive data on phones Architect mobile systems with security in mind Keep sensitive data out of DMZs Continual penetration testing Mobile-aware fraud detection Confidential
Additional Slides Confidential
Best Practices DO Encourage transactional functionality that drives revenue, like checkout, payments, etc. DO perform a thorough risk assessment with mobile experts starting at the design phase DO continual penetration testing and monitoring DO user experience design to prevent confusion DO require true MFA before transactions, etc. DO provide strong encryption, etc. Confidential
Worst Practices DON’T store sensitive data on the phone DON’T encourage linking from SMS messages DON’T let vendor architecture create security risks DON’T display user identifiable information without proper  multifactor authentication DON’T do transactions in SMS without authentication from another channel (like voice) DON’T encourage putting sensitive info in SMS Confidential
Threat Examples Hacker getting to credit card numbers or other useful identity theft information through a breach in corporate access through mobile connection Phishing attacks to trick users into providing access Phishers then transfer money out of their account Phishers could also potentially manipulate stocks Using identifiable information to gain access Mobile app doesn’t do transactions, but exposes data Thief uses data to gain access to acct. over phone Confidential
Brokerage Examples Confidential

Más contenido relacionado

La actualidad más candente

Mobile security in Cyber Security
Mobile security in Cyber SecurityMobile security in Cyber Security
Mobile security in Cyber SecurityGeo Marian
 
MobileCON 2013 – Attacks Aginst MDM Solutions (and What You Can Do About It)
MobileCON 2013 – Attacks Aginst MDM Solutions (and What You Can Do About It)MobileCON 2013 – Attacks Aginst MDM Solutions (and What You Can Do About It)
MobileCON 2013 – Attacks Aginst MDM Solutions (and What You Can Do About It)Lacoon Mobile Security
 
The Internet of things paradox
The Internet of things paradoxThe Internet of things paradox
The Internet of things paradoxGolden Locksmith
 
Authentication service security
Authentication service securityAuthentication service security
Authentication service securityG Prachi
 
Mobile Security
Mobile SecurityMobile Security
Mobile SecurityKevin Lee
 
Mobile security
Mobile securityMobile security
Mobile securityhome
 
Distil Networks Protecting the Telephony Industry
Distil Networks Protecting the Telephony IndustryDistil Networks Protecting the Telephony Industry
Distil Networks Protecting the Telephony IndustryPaul Hobbs
 
Mobile Security 101
Mobile Security 101Mobile Security 101
Mobile Security 101Lookout
 
Smartphone Ownage: The state of mobile botnets and rootkits
Smartphone Ownage: The state of mobile botnets and rootkitsSmartphone Ownage: The state of mobile botnets and rootkits
Smartphone Ownage: The state of mobile botnets and rootkitsJimmy Shah
 
Threats of Public Wi-Fi
Threats of Public Wi-Fi Threats of Public Wi-Fi
Threats of Public Wi-Fi The TNS Group
 
Cybersecurity Awareness Infographics
Cybersecurity Awareness InfographicsCybersecurity Awareness Infographics
Cybersecurity Awareness InfographicsNetLockSmith
 
Smart phone and mobile device security
Smart phone and mobile device securitySmart phone and mobile device security
Smart phone and mobile device securityCAS
 
Phishing technique tanish khilani
Phishing technique tanish  khilani Phishing technique tanish  khilani
Phishing technique tanish khilani Tanish Khilani
 
Smartphone security
Smartphone  securitySmartphone  security
Smartphone securityManish Gupta
 

La actualidad más candente (20)

Mobile security in Cyber Security
Mobile security in Cyber SecurityMobile security in Cyber Security
Mobile security in Cyber Security
 
MobileCON 2013 – Attacks Aginst MDM Solutions (and What You Can Do About It)
MobileCON 2013 – Attacks Aginst MDM Solutions (and What You Can Do About It)MobileCON 2013 – Attacks Aginst MDM Solutions (and What You Can Do About It)
MobileCON 2013 – Attacks Aginst MDM Solutions (and What You Can Do About It)
 
Cyber Insurance Types of Attacks
Cyber Insurance Types of AttacksCyber Insurance Types of Attacks
Cyber Insurance Types of Attacks
 
The Internet of things paradox
The Internet of things paradoxThe Internet of things paradox
The Internet of things paradox
 
Authentication service security
Authentication service securityAuthentication service security
Authentication service security
 
Mobile security
Mobile securityMobile security
Mobile security
 
Mobile Security
Mobile SecurityMobile Security
Mobile Security
 
Mobile security
Mobile securityMobile security
Mobile security
 
Distil Networks Protecting the Telephony Industry
Distil Networks Protecting the Telephony IndustryDistil Networks Protecting the Telephony Industry
Distil Networks Protecting the Telephony Industry
 
Mobile app security
Mobile app securityMobile app security
Mobile app security
 
Mobile Security 101
Mobile Security 101Mobile Security 101
Mobile Security 101
 
Smartphone Ownage: The state of mobile botnets and rootkits
Smartphone Ownage: The state of mobile botnets and rootkitsSmartphone Ownage: The state of mobile botnets and rootkits
Smartphone Ownage: The state of mobile botnets and rootkits
 
Threats of Public Wi-Fi
Threats of Public Wi-Fi Threats of Public Wi-Fi
Threats of Public Wi-Fi
 
Cybersecurity Awareness Infographics
Cybersecurity Awareness InfographicsCybersecurity Awareness Infographics
Cybersecurity Awareness Infographics
 
Smart phone and mobile device security
Smart phone and mobile device securitySmart phone and mobile device security
Smart phone and mobile device security
 
Him
HimHim
Him
 
Phishing technique tanish khilani
Phishing technique tanish  khilani Phishing technique tanish  khilani
Phishing technique tanish khilani
 
Mobile phone security
Mobile phone securityMobile phone security
Mobile phone security
 
Nonprofit Cybersecurity Incident Report
Nonprofit Cybersecurity Incident ReportNonprofit Cybersecurity Incident Report
Nonprofit Cybersecurity Incident Report
 
Smartphone security
Smartphone  securitySmartphone  security
Smartphone security
 

Similar a Mobile Strategy Partners Mobile Security

Overcome Security Threats Affecting Mobile Financial Solutions 2020
Overcome Security Threats Affecting Mobile Financial Solutions 2020Overcome Security Threats Affecting Mobile Financial Solutions 2020
Overcome Security Threats Affecting Mobile Financial Solutions 2020Fusion Informatics
 
mobile or cellphones attacked by viruses,phishing,swishing-1.pptx
mobile or cellphones attacked by viruses,phishing,swishing-1.pptxmobile or cellphones attacked by viruses,phishing,swishing-1.pptx
mobile or cellphones attacked by viruses,phishing,swishing-1.pptxvrandmandora1
 
Are Mobile Banking Apps Safe?
Are Mobile Banking Apps Safe?Are Mobile Banking Apps Safe?
Are Mobile Banking Apps Safe?VISTA InfoSec
 
How to reduce security risks to ensure user confidence in m-payments
How to reduce security risks to ensure user confidence in m-paymentsHow to reduce security risks to ensure user confidence in m-payments
How to reduce security risks to ensure user confidence in m-paymentsBMI Healthcare
 
CASE STUDY There is a new phenomenon in the cybersecurity domain ca.pdf
CASE STUDY There is a new phenomenon in the cybersecurity domain ca.pdfCASE STUDY There is a new phenomenon in the cybersecurity domain ca.pdf
CASE STUDY There is a new phenomenon in the cybersecurity domain ca.pdfkostikjaylonshaewe47
 
Report on Mobile security
Report  on Mobile securityReport  on Mobile security
Report on Mobile securityKavita Rastogi
 
MOBILE SECURITY.pptx
MOBILE SECURITY.pptxMOBILE SECURITY.pptx
MOBILE SECURITY.pptxKakshaPatel3
 
Secure Mobile Working 1.0
Secure Mobile Working 1.0Secure Mobile Working 1.0
Secure Mobile Working 1.0Jon Collins
 
Mobile App Security Best Practices Protecting User Data.pdf
Mobile App Security Best Practices Protecting User Data.pdfMobile App Security Best Practices Protecting User Data.pdf
Mobile App Security Best Practices Protecting User Data.pdfGMATechnologies1
 
Cyber Security and Fraud Prevention Tools Tactics
Cyber Security and Fraud Prevention Tools TacticsCyber Security and Fraud Prevention Tools Tactics
Cyber Security and Fraud Prevention Tools TacticsBen Graybar
 
cellphone virus and security
cellphone virus and securitycellphone virus and security
cellphone virus and securityAkhil Kumar
 
Can You Steal From Me Now? Mobile and BYOD Security Risks
Can You Steal From Me Now? Mobile and BYOD Security RisksCan You Steal From Me Now? Mobile and BYOD Security Risks
Can You Steal From Me Now? Mobile and BYOD Security RisksMichael Davis
 
Top 2016 Mobile Security Threats and your Employees
Top 2016 Mobile Security Threats and your EmployeesTop 2016 Mobile Security Threats and your Employees
Top 2016 Mobile Security Threats and your EmployeesNeil Kemp
 
Smartphone Security
Smartphone SecuritySmartphone Security
Smartphone SecurityMalasta Hill
 
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?Do New Mobile Devices in Enterprises Pose A Serious Security Threat?
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?acijjournal
 
How to Secure Your Mobile Commerce App.pdf
How to Secure Your Mobile Commerce App.pdfHow to Secure Your Mobile Commerce App.pdf
How to Secure Your Mobile Commerce App.pdfOZONESOFT Solutions
 
Security&reliability
Security&reliabilitySecurity&reliability
Security&reliabilitycaca1009
 

Similar a Mobile Strategy Partners Mobile Security (20)

Overcome Security Threats Affecting Mobile Financial Solutions 2020
Overcome Security Threats Affecting Mobile Financial Solutions 2020Overcome Security Threats Affecting Mobile Financial Solutions 2020
Overcome Security Threats Affecting Mobile Financial Solutions 2020
 
mobile or cellphones attacked by viruses,phishing,swishing-1.pptx
mobile or cellphones attacked by viruses,phishing,swishing-1.pptxmobile or cellphones attacked by viruses,phishing,swishing-1.pptx
mobile or cellphones attacked by viruses,phishing,swishing-1.pptx
 
Are Mobile Banking Apps Safe?
Are Mobile Banking Apps Safe?Are Mobile Banking Apps Safe?
Are Mobile Banking Apps Safe?
 
How to reduce security risks to ensure user confidence in m-payments
How to reduce security risks to ensure user confidence in m-paymentsHow to reduce security risks to ensure user confidence in m-payments
How to reduce security risks to ensure user confidence in m-payments
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
CASE STUDY There is a new phenomenon in the cybersecurity domain ca.pdf
CASE STUDY There is a new phenomenon in the cybersecurity domain ca.pdfCASE STUDY There is a new phenomenon in the cybersecurity domain ca.pdf
CASE STUDY There is a new phenomenon in the cybersecurity domain ca.pdf
 
Report on Mobile security
Report  on Mobile securityReport  on Mobile security
Report on Mobile security
 
MOBILE SECURITY.pptx
MOBILE SECURITY.pptxMOBILE SECURITY.pptx
MOBILE SECURITY.pptx
 
Cn35499502
Cn35499502Cn35499502
Cn35499502
 
Secure Mobile Working 1.0
Secure Mobile Working 1.0Secure Mobile Working 1.0
Secure Mobile Working 1.0
 
Mobile App Security Best Practices Protecting User Data.pdf
Mobile App Security Best Practices Protecting User Data.pdfMobile App Security Best Practices Protecting User Data.pdf
Mobile App Security Best Practices Protecting User Data.pdf
 
Cyber Security and Fraud Prevention Tools Tactics
Cyber Security and Fraud Prevention Tools TacticsCyber Security and Fraud Prevention Tools Tactics
Cyber Security and Fraud Prevention Tools Tactics
 
cellphone virus and security
cellphone virus and securitycellphone virus and security
cellphone virus and security
 
Can You Steal From Me Now? Mobile and BYOD Security Risks
Can You Steal From Me Now? Mobile and BYOD Security RisksCan You Steal From Me Now? Mobile and BYOD Security Risks
Can You Steal From Me Now? Mobile and BYOD Security Risks
 
Top 2016 Mobile Security Threats and your Employees
Top 2016 Mobile Security Threats and your EmployeesTop 2016 Mobile Security Threats and your Employees
Top 2016 Mobile Security Threats and your Employees
 
Smartphone Security
Smartphone SecuritySmartphone Security
Smartphone Security
 
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?Do New Mobile Devices in Enterprises Pose A Serious Security Threat?
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?
 
CTO Cybersecurity Forum 2013 David Turahi
CTO Cybersecurity Forum 2013 David TurahiCTO Cybersecurity Forum 2013 David Turahi
CTO Cybersecurity Forum 2013 David Turahi
 
How to Secure Your Mobile Commerce App.pdf
How to Secure Your Mobile Commerce App.pdfHow to Secure Your Mobile Commerce App.pdf
How to Secure Your Mobile Commerce App.pdf
 
Security&reliability
Security&reliabilitySecurity&reliability
Security&reliability
 

Mobile Strategy Partners Mobile Security

  • 1. Mobile Security Mobile Commerce USA - November 2009 David Eads, Founder david@MobileStrategyPartners.com +1 (404) 285-4219
  • 2. Background Founder & CEO, Mobile Strategy Partners LLC Help organizations optimize mobile commerce from both a business & tech perspective Perform Risk Assessments as a part of my practice Participated in many IT security reviews throughout my career in ecommerce, mobile commerce Confidential
  • 3. Frozen in fear Security consistently reported as the biggest barrier to mobile banking and mobile commerce usage 47% of non-adopters cite security;73% fear hackers can break into their phones (Tom Wills, Javelin, 12/08 ) Security considered during purchase, implementation Fraud fears limit Mobile Commerce functionality in N. America Few commerce apps with a real checkout process Limited transactional capabilities in mobile banking Mobile payments wheels still spinning (esp. P2P) Attacks follow adoption: Africa was first, hackers will turn to us Phishing seems the most common & effective attack SIM, Mobile phone fraud also related (Absa ‘07) Confidential
  • 4. It’s not what we fear… Mobile Commerce is basically safe, however consumers are still afraid Everyone generally learned lessons of ecommerce 128-bit SSL Multifactor Authentication Phone Disabling features Phone viruses, network hacks rare so far Mobile makes us MORE secure in many ways Balance, Transaction alerts, visibility Confidential
  • 5. … the danger is the unknown Untested defenses are weak defenses Monitoring systems an afterthought Mobile new to Information Security teams Consumer education lacking Unsophisticated users with smart phones Confidential
  • 6. Social trickery Phishing proven effective, likely to continue Phishing often cross-channel Fake call centers, targeted attacks, detailed research URL not visible on mobile browsers, URL shorteners SMS alerts perfect temptation for phishing Shortcode registration limits spoofing, but possible Linking from SMS to web encourages email to web Social networking, mobile convergence amplifies risk Confidential
  • 7. Limited Detection Few organizations monitor for mobile attacks Variety of fraud detection systems exist for ecommerce sites but not optimized for mobile Some adaptable to mobile, mobile requires more(e.g. monitor SMS patterns, web services, mobile web) Security companies yet to fully focus on mobile Recession, limited adoption discourages investment in defensive systems Attacks can happen even if adoption is low! Confidential
  • 8. Unsophisticated Users What happens when my Mom has a smartphone?! Unsophisticated userstoday tend to have unsophisticated phones which provide significant protection Smartphone trend means most phones will be smart My Mother-in-law & Father-in-Law have Blackberries They are more vulnerable via phone than AOL dial-up Damage to unsophisticated users can create major perception problems for the entire industry Confidential
  • 9. Recommendations Continue discouraging SMS, email links to apps Promote, encourage PIN-locking phones Require Multifactor Authentication & don’t bypass it Avoid storing sensitive data on phones Architect mobile systems with security in mind Keep sensitive data out of DMZs Continual penetration testing Mobile-aware fraud detection Confidential
  • 11. Best Practices DO Encourage transactional functionality that drives revenue, like checkout, payments, etc. DO perform a thorough risk assessment with mobile experts starting at the design phase DO continual penetration testing and monitoring DO user experience design to prevent confusion DO require true MFA before transactions, etc. DO provide strong encryption, etc. Confidential
  • 12. Worst Practices DON’T store sensitive data on the phone DON’T encourage linking from SMS messages DON’T let vendor architecture create security risks DON’T display user identifiable information without proper multifactor authentication DON’T do transactions in SMS without authentication from another channel (like voice) DON’T encourage putting sensitive info in SMS Confidential
  • 13. Threat Examples Hacker getting to credit card numbers or other useful identity theft information through a breach in corporate access through mobile connection Phishing attacks to trick users into providing access Phishers then transfer money out of their account Phishers could also potentially manipulate stocks Using identifiable information to gain access Mobile app doesn’t do transactions, but exposes data Thief uses data to gain access to acct. over phone Confidential

Notas del editor

  1. Founder & CEO of MSP, focus on optimizing mobile commerce from both biz & tech perspective; participated in a number of security reviews in a variety of verticals; spoken on mobile security, authored whitepaperAs a part of my practice I help companies with risk assessmentsShow of hands – PIN lock on phone? looked at someone else’s phone on a train or plane?(Credent 5/09, 40% don’t lock, 99% have sens. data) http://www.darkreading.com/security/client/showArticle.jhtml?articleID=215901048The real threat isn’t in what people fear, but in other overlooked areas
  2. Absa 2007 - http://www.itweb.co.za/index.php?option=com_content&view=article&id=6258&catid=159:it-in-banking
  3. USAA, BofA, numbers on fraud caught immediately by consumers b/c of mobile?