SlideShare una empresa de Scribd logo
1 de 19
Áine Curry 08406804
Brian Flaherty 12232197
Reggie Sugrue 12231292
Introduction
Mobile devices have become more technical in recent years.
• Wireless connectivity
• Short range connections via Bluetooth
• Mobile Applications


• This has lead to the increased vulnerability of mobile device
Mobile Malware 2012
Attacks increased by 185 %
• increased number of mobile devices



99% of these attacks related to Android Mobile devices
What makes Android vulnerable to
Attacks?
Android is the most popular operating system
• 75% of the market share

Android Applications widely available
• Anyone can post App’s to Google’s Android Market

Android is slow in fixing detected flaw
Recent Malware Attacks
March 2013 – First discovered mobile malware attack
• Stole SMS messages, call logs, contacts and phone data

December 2012 – Malware used to steal €36 million from 30,000 bank accounts
Main Types of Malware
• Collect device data - 28%
• Spies on user - 25%
• Send content - 24%


SMishing, Fake Apps, Stealing Information such
as bank details – major threats
Fake Apps
BYOD
Bring Your Own Disaster?


• Unknown third-party access via mobile apps
• Challenges in tracking data
• Data management, segregation difficult for compliance
• Stolen, lost mobile devices leak data
• Disgruntled employees a risk
Motives
• Financial
  • Main reason for malware
• Social
  • Boosting image as a hacker
• Political Agendas
  • Trojan implanted in a popular app supporting
    “Arab Spring”
How to detect mobile malware
2 methods of detection:

• Simple detection techniques


• Technical detection technique
Simple detection techniques
Symptoms of Mobile malware
• Slow performance
• Quick battery consumption
• Applications refusing to open or work
• Automatic sending of text message to contacts
• GPS active even when a program is not running
Technical Detection Techniques
Static Analysis
• Detects malware in operating systems by dissembling mobile device

Dynamic Analysis
• Mobile device is isolated into a virtual machine and behaviour is monitored

Application Permission Analysis
• Performs permission checks on installed applications
•   Defence against Malware & Viruses
•   Smarthphones can be attacked in two mediums
•   Corporate level
•   Everyday Users
Organizations
Organizations need security because member of enterprise are accessing
information on their mobile devices.
National Institute of Standards and Technology provide security guidelines.
4 different categories of security that organizations should fall under
according with NIST guidelines.
4 Categories
1) General Policy – enforce enterprise security like monitoring when policy
violations occur.
2) Encryptions Policy – making sure that there is strong encryption to
prevent attacks.
3) Authentication – making sure that users must pass security breaches to
get access.
4) Restriction – restricting people who you don’t want to have access to your
resources.
BYOD
Abbreviated for Bring Your Own Devices to Work.
People bring these devices to work but there must be security policies for
these devices as well as the organization original hardware.
Organizations should specify what devices are allowed.
Define what sites are allowed to be used and companies should have a
employee exit strategy.
Everyday Users
Users use smartphones everyday carrying out transactions with sensitive
information like e-mails and bill payments.
Current day users are blissfully unaware of the malware and viruses that can
possible interact with their devices.
Users should gain education of what malicious kinds of attacks are out there
and what security is available.
Helpful Tips for Users
Install anti-virus software on their mobile devices.
Do not connect to unusual Wi-Fi network.
Avoid clicking links that come from unsecure sources as this can forward
users on to harmful sites.
Avoid geo-tagging if people you don’t know will have access to the
information.
Make sure there is encryption system in your device.
Future of Mobile Malware & Viruses
Going to get worse before it gets better because Users are only getting to
grips with mobile security.
Mobile devices are less protected than computers.
More sophisticated methods be introduced so it will be harder to pin down.
Examples of future threats are SMS phishing and NFC pay-service
corruption.

Más contenido relacionado

La actualidad más candente

Mobile security
Mobile securityMobile security
Mobile securityhome
 
Cybersecurity Series - Cyber Defense for Internal Auditors
Cybersecurity Series - Cyber Defense for Internal AuditorsCybersecurity Series - Cyber Defense for Internal Auditors
Cybersecurity Series - Cyber Defense for Internal AuditorsJim Kaplan CIA CFE
 
Mobile Security
Mobile SecurityMobile Security
Mobile SecurityKevin Lee
 
Android security a survey of issues, malware penetration, and defenses
Android security a survey of issues, malware penetration, and defensesAndroid security a survey of issues, malware penetration, and defenses
Android security a survey of issues, malware penetration, and defensesLeMeniz Infotech
 
Mobile device security
Mobile device securityMobile device security
Mobile device securityLisa Herrera
 
Security Attacks in Stand-Alone Computer and Cloud Computing: An Analysis
Security Attacks in Stand-Alone Computer and Cloud Computing: An AnalysisSecurity Attacks in Stand-Alone Computer and Cloud Computing: An Analysis
Security Attacks in Stand-Alone Computer and Cloud Computing: An Analysisdadkhah077
 
2015 Mobile Security Trends: Are You Ready?
2015 Mobile Security Trends: Are You Ready?2015 Mobile Security Trends: Are You Ready?
2015 Mobile Security Trends: Are You Ready?IBM Security
 
Mobile Security 101
Mobile Security 101Mobile Security 101
Mobile Security 101Lookout
 
Top Seven Risks of Enterprise Mobility - How to protect your business
Top Seven Risks of Enterprise Mobility - How to protect your businessTop Seven Risks of Enterprise Mobility - How to protect your business
Top Seven Risks of Enterprise Mobility - How to protect your businessSymantec
 
Wireless and mobile security
Wireless and mobile securityWireless and mobile security
Wireless and mobile securityPushkar Pashupat
 
2010: Mobile Security - WHYMCA Developer Conference
2010: Mobile Security - WHYMCA Developer Conference2010: Mobile Security - WHYMCA Developer Conference
2010: Mobile Security - WHYMCA Developer ConferenceFabio Pietrosanti
 
Hot Cyber Security Technologies
Hot Cyber Security TechnologiesHot Cyber Security Technologies
Hot Cyber Security TechnologiesRuchikaSachdeva4
 
Smartphone Ownage: The state of mobile botnets and rootkits
Smartphone Ownage: The state of mobile botnets and rootkitsSmartphone Ownage: The state of mobile botnets and rootkits
Smartphone Ownage: The state of mobile botnets and rootkitsJimmy Shah
 
Symantec Mobile Security Whitepaper June 2011
Symantec Mobile Security Whitepaper June 2011Symantec Mobile Security Whitepaper June 2011
Symantec Mobile Security Whitepaper June 2011Symantec
 

La actualidad más candente (20)

Mobile security
Mobile securityMobile security
Mobile security
 
Mobile Security Research Projects Help
Mobile Security  Research Projects HelpMobile Security  Research Projects Help
Mobile Security Research Projects Help
 
Mobile security
Mobile securityMobile security
Mobile security
 
New trends in Payments Security: NFC & Mobile
New trends in Payments Security: NFC & MobileNew trends in Payments Security: NFC & Mobile
New trends in Payments Security: NFC & Mobile
 
Mobile security
Mobile securityMobile security
Mobile security
 
Cybersecurity Series - Cyber Defense for Internal Auditors
Cybersecurity Series - Cyber Defense for Internal AuditorsCybersecurity Series - Cyber Defense for Internal Auditors
Cybersecurity Series - Cyber Defense for Internal Auditors
 
Mobile Security
Mobile SecurityMobile Security
Mobile Security
 
Android security a survey of issues, malware penetration, and defenses
Android security a survey of issues, malware penetration, and defensesAndroid security a survey of issues, malware penetration, and defenses
Android security a survey of issues, malware penetration, and defenses
 
Mobile security
Mobile securityMobile security
Mobile security
 
Mobile device security
Mobile device securityMobile device security
Mobile device security
 
Mobile Security
Mobile SecurityMobile Security
Mobile Security
 
Security Attacks in Stand-Alone Computer and Cloud Computing: An Analysis
Security Attacks in Stand-Alone Computer and Cloud Computing: An AnalysisSecurity Attacks in Stand-Alone Computer and Cloud Computing: An Analysis
Security Attacks in Stand-Alone Computer and Cloud Computing: An Analysis
 
2015 Mobile Security Trends: Are You Ready?
2015 Mobile Security Trends: Are You Ready?2015 Mobile Security Trends: Are You Ready?
2015 Mobile Security Trends: Are You Ready?
 
Mobile Security 101
Mobile Security 101Mobile Security 101
Mobile Security 101
 
Top Seven Risks of Enterprise Mobility - How to protect your business
Top Seven Risks of Enterprise Mobility - How to protect your businessTop Seven Risks of Enterprise Mobility - How to protect your business
Top Seven Risks of Enterprise Mobility - How to protect your business
 
Wireless and mobile security
Wireless and mobile securityWireless and mobile security
Wireless and mobile security
 
2010: Mobile Security - WHYMCA Developer Conference
2010: Mobile Security - WHYMCA Developer Conference2010: Mobile Security - WHYMCA Developer Conference
2010: Mobile Security - WHYMCA Developer Conference
 
Hot Cyber Security Technologies
Hot Cyber Security TechnologiesHot Cyber Security Technologies
Hot Cyber Security Technologies
 
Smartphone Ownage: The state of mobile botnets and rootkits
Smartphone Ownage: The state of mobile botnets and rootkitsSmartphone Ownage: The state of mobile botnets and rootkits
Smartphone Ownage: The state of mobile botnets and rootkits
 
Symantec Mobile Security Whitepaper June 2011
Symantec Mobile Security Whitepaper June 2011Symantec Mobile Security Whitepaper June 2011
Symantec Mobile Security Whitepaper June 2011
 

Similar a Ms810 assignment viruses and malware affecting moblie devices

Mobile App Security Best Practices Protecting User Data.pdf
Mobile App Security Best Practices Protecting User Data.pdfMobile App Security Best Practices Protecting User Data.pdf
Mobile App Security Best Practices Protecting User Data.pdfGMATechnologies1
 
BYOD - Secure the data, not the device
BYOD - Secure the data, not the deviceBYOD - Secure the data, not the device
BYOD - Secure the data, not the deviceb coatesworth
 
Article on Mobile Security
Article on Mobile SecurityArticle on Mobile Security
Article on Mobile SecurityTharaka Mahadewa
 
WEEK5 Mobile Device Security 31032022.pdf
WEEK5 Mobile Device Security 31032022.pdfWEEK5 Mobile Device Security 31032022.pdf
WEEK5 Mobile Device Security 31032022.pdfSetiya Nugroho
 
Mobile Apps and Security Attacks: An Introduction
Mobile Apps and Security Attacks: An IntroductionMobile Apps and Security Attacks: An Introduction
Mobile Apps and Security Attacks: An IntroductionNagarro
 
Whitepaper - CISO Guide_6pp
Whitepaper - CISO Guide_6ppWhitepaper - CISO Guide_6pp
Whitepaper - CISO Guide_6ppEric Zhuo
 
Data Mining For Intrusion Detection in Mobile Systems
Data Mining For Intrusion Detection in Mobile SystemsData Mining For Intrusion Detection in Mobile Systems
Data Mining For Intrusion Detection in Mobile SystemsIOSR Journals
 
Evolutionand impactofhiddenmobilethreats wandera
Evolutionand impactofhiddenmobilethreats wanderaEvolutionand impactofhiddenmobilethreats wandera
Evolutionand impactofhiddenmobilethreats wanderaAnjoum .
 
Third Annual Mobile Threats Report
Third Annual Mobile Threats ReportThird Annual Mobile Threats Report
Third Annual Mobile Threats ReportJuniper Networks
 
Taxonomy mobile malware threats and detection techniques
Taxonomy  mobile malware threats and detection techniquesTaxonomy  mobile malware threats and detection techniques
Taxonomy mobile malware threats and detection techniquescsandit
 
Report on Mobile security
Report  on Mobile securityReport  on Mobile security
Report on Mobile securityKavita Rastogi
 
IRJET- Android Device Attacks and Threats
IRJET-  	  Android Device Attacks and ThreatsIRJET-  	  Android Device Attacks and Threats
IRJET- Android Device Attacks and ThreatsIRJET Journal
 
Assign 1_8812814ctm.pptx
Assign 1_8812814ctm.pptxAssign 1_8812814ctm.pptx
Assign 1_8812814ctm.pptxpdevang
 
Attacks on Mobiles\Cell Phones
Attacks on Mobiles\Cell PhonesAttacks on Mobiles\Cell Phones
Attacks on Mobiles\Cell PhonesFaizan Shaikh
 
BETTER- Threat Whitepaper- PoS
BETTER- Threat Whitepaper- PoSBETTER- Threat Whitepaper- PoS
BETTER- Threat Whitepaper- PoSPurna Bhat
 
Mobile Security Threats In Organisations: 4 Challenges To Navigate And Solve
Mobile Security Threats In Organisations: 4 Challenges To Navigate And SolveMobile Security Threats In Organisations: 4 Challenges To Navigate And Solve
Mobile Security Threats In Organisations: 4 Challenges To Navigate And SolveZeroblack
 
Top Risks of Enterprise Mobility
Top Risks of Enterprise MobilityTop Risks of Enterprise Mobility
Top Risks of Enterprise MobilitySymantec
 

Similar a Ms810 assignment viruses and malware affecting moblie devices (20)

Mobile App Security Best Practices Protecting User Data.pdf
Mobile App Security Best Practices Protecting User Data.pdfMobile App Security Best Practices Protecting User Data.pdf
Mobile App Security Best Practices Protecting User Data.pdf
 
BYOD - Secure the data, not the device
BYOD - Secure the data, not the deviceBYOD - Secure the data, not the device
BYOD - Secure the data, not the device
 
Article on Mobile Security
Article on Mobile SecurityArticle on Mobile Security
Article on Mobile Security
 
WEEK5 Mobile Device Security 31032022.pdf
WEEK5 Mobile Device Security 31032022.pdfWEEK5 Mobile Device Security 31032022.pdf
WEEK5 Mobile Device Security 31032022.pdf
 
Mobile security article
Mobile security articleMobile security article
Mobile security article
 
Mobile Apps and Security Attacks: An Introduction
Mobile Apps and Security Attacks: An IntroductionMobile Apps and Security Attacks: An Introduction
Mobile Apps and Security Attacks: An Introduction
 
Whitepaper - CISO Guide_6pp
Whitepaper - CISO Guide_6ppWhitepaper - CISO Guide_6pp
Whitepaper - CISO Guide_6pp
 
Data Mining For Intrusion Detection in Mobile Systems
Data Mining For Intrusion Detection in Mobile SystemsData Mining For Intrusion Detection in Mobile Systems
Data Mining For Intrusion Detection in Mobile Systems
 
Evolutionand impactofhiddenmobilethreats wandera
Evolutionand impactofhiddenmobilethreats wanderaEvolutionand impactofhiddenmobilethreats wandera
Evolutionand impactofhiddenmobilethreats wandera
 
Third Annual Mobile Threats Report
Third Annual Mobile Threats ReportThird Annual Mobile Threats Report
Third Annual Mobile Threats Report
 
Taxonomy mobile malware threats and detection techniques
Taxonomy  mobile malware threats and detection techniquesTaxonomy  mobile malware threats and detection techniques
Taxonomy mobile malware threats and detection techniques
 
Report on Mobile security
Report  on Mobile securityReport  on Mobile security
Report on Mobile security
 
IRJET- Android Device Attacks and Threats
IRJET-  	  Android Device Attacks and ThreatsIRJET-  	  Android Device Attacks and Threats
IRJET- Android Device Attacks and Threats
 
CTO Cybersecurity Forum 2013 David Turahi
CTO Cybersecurity Forum 2013 David TurahiCTO Cybersecurity Forum 2013 David Turahi
CTO Cybersecurity Forum 2013 David Turahi
 
Assign 1_8812814ctm.pptx
Assign 1_8812814ctm.pptxAssign 1_8812814ctm.pptx
Assign 1_8812814ctm.pptx
 
Attacks on Mobiles\Cell Phones
Attacks on Mobiles\Cell PhonesAttacks on Mobiles\Cell Phones
Attacks on Mobiles\Cell Phones
 
BETTER- Threat Whitepaper- PoS
BETTER- Threat Whitepaper- PoSBETTER- Threat Whitepaper- PoS
BETTER- Threat Whitepaper- PoS
 
Mobile Security Threats In Organisations: 4 Challenges To Navigate And Solve
Mobile Security Threats In Organisations: 4 Challenges To Navigate And SolveMobile Security Threats In Organisations: 4 Challenges To Navigate And Solve
Mobile Security Threats In Organisations: 4 Challenges To Navigate And Solve
 
Top Risks of Enterprise Mobility
Top Risks of Enterprise MobilityTop Risks of Enterprise Mobility
Top Risks of Enterprise Mobility
 
Outside the Office: Mobile Security
Outside the Office: Mobile SecurityOutside the Office: Mobile Security
Outside the Office: Mobile Security
 

Último

"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfSeasiaInfotech2
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesZilliz
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 

Último (20)

"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdf
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector Databases
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 

Ms810 assignment viruses and malware affecting moblie devices

  • 1. Áine Curry 08406804 Brian Flaherty 12232197 Reggie Sugrue 12231292
  • 2. Introduction Mobile devices have become more technical in recent years. • Wireless connectivity • Short range connections via Bluetooth • Mobile Applications • This has lead to the increased vulnerability of mobile device
  • 3. Mobile Malware 2012 Attacks increased by 185 % • increased number of mobile devices 99% of these attacks related to Android Mobile devices
  • 4. What makes Android vulnerable to Attacks? Android is the most popular operating system • 75% of the market share Android Applications widely available • Anyone can post App’s to Google’s Android Market Android is slow in fixing detected flaw
  • 5. Recent Malware Attacks March 2013 – First discovered mobile malware attack • Stole SMS messages, call logs, contacts and phone data December 2012 – Malware used to steal €36 million from 30,000 bank accounts
  • 6. Main Types of Malware • Collect device data - 28% • Spies on user - 25% • Send content - 24% SMishing, Fake Apps, Stealing Information such as bank details – major threats
  • 8. BYOD Bring Your Own Disaster? • Unknown third-party access via mobile apps • Challenges in tracking data • Data management, segregation difficult for compliance • Stolen, lost mobile devices leak data • Disgruntled employees a risk
  • 9. Motives • Financial • Main reason for malware • Social • Boosting image as a hacker • Political Agendas • Trojan implanted in a popular app supporting “Arab Spring”
  • 10. How to detect mobile malware 2 methods of detection: • Simple detection techniques • Technical detection technique
  • 11. Simple detection techniques Symptoms of Mobile malware • Slow performance • Quick battery consumption • Applications refusing to open or work • Automatic sending of text message to contacts • GPS active even when a program is not running
  • 12. Technical Detection Techniques Static Analysis • Detects malware in operating systems by dissembling mobile device Dynamic Analysis • Mobile device is isolated into a virtual machine and behaviour is monitored Application Permission Analysis • Performs permission checks on installed applications
  • 13. Defence against Malware & Viruses • Smarthphones can be attacked in two mediums • Corporate level • Everyday Users
  • 14. Organizations Organizations need security because member of enterprise are accessing information on their mobile devices. National Institute of Standards and Technology provide security guidelines. 4 different categories of security that organizations should fall under according with NIST guidelines.
  • 15. 4 Categories 1) General Policy – enforce enterprise security like monitoring when policy violations occur. 2) Encryptions Policy – making sure that there is strong encryption to prevent attacks. 3) Authentication – making sure that users must pass security breaches to get access. 4) Restriction – restricting people who you don’t want to have access to your resources.
  • 16. BYOD Abbreviated for Bring Your Own Devices to Work. People bring these devices to work but there must be security policies for these devices as well as the organization original hardware. Organizations should specify what devices are allowed. Define what sites are allowed to be used and companies should have a employee exit strategy.
  • 17. Everyday Users Users use smartphones everyday carrying out transactions with sensitive information like e-mails and bill payments. Current day users are blissfully unaware of the malware and viruses that can possible interact with their devices. Users should gain education of what malicious kinds of attacks are out there and what security is available.
  • 18. Helpful Tips for Users Install anti-virus software on their mobile devices. Do not connect to unusual Wi-Fi network. Avoid clicking links that come from unsecure sources as this can forward users on to harmful sites. Avoid geo-tagging if people you don’t know will have access to the information. Make sure there is encryption system in your device.
  • 19. Future of Mobile Malware & Viruses Going to get worse before it gets better because Users are only getting to grips with mobile security. Mobile devices are less protected than computers. More sophisticated methods be introduced so it will be harder to pin down. Examples of future threats are SMS phishing and NFC pay-service corruption.