SlideShare una empresa de Scribd logo
1 de 20
Faculty advisor : KIRAN PANCHAL
PREET PATEL : 170520123034
KIRTAN PATEL : 170520123032
CONTENTS
INTRODUCTION
IMPORTANCE OF MOBILE PROTECTION
TYPES OF MOBILE SECURITIES
TYPES OF MOBILE THREATS
TIPS TO STAY SAFE
CONCLUTION
INTRODUCTION
IMPORTANCE OF MOBILE PHONE
It is used in our daily life to make phone calls, messages,
etc.
Phone has internet access, built in video cameras and ability
to install additional software.
Phone contains sufficient storage to store precious data like
official documents, private photos-videos, contacts, etc.
WHY MOBILE PROTECTION IS IMPORTANT?
As mobile phone contains our private data it is necessary to protect
mobile phone by applying unlock patterns and installing antivirus
applications.
PHYSICAL SECURITY: A phone can be confiscated or stolen. So
there should be some password protection on your phone.
Once your data is stolen by hacker, you would asked to pay some
bucks to release or get your data back or hacker can also blackmail
you on the basis of your private data.
TYPES OF MOBILE SECURITY
MOBILE DEVICE SECURITY.
MOBILE APPLICATION SECURITY.
MOBILE DEVICE SECURITY
SCREEN LOCKS: All mobile devices (e.g., phones, tablets, and laptops)
should have the screen lock set.
.LOCKOUT SETTINGS: After a specific no. of unsuccessful unlock
attempts, the device will get locked which can be opened through user’s ID.
GPS: Many mobile devices have GPS
Capabilities, allowing the device to be
Located if it is lost or stolen.
REMOTE WIPING: some devices allow
The device to be wipe out all data and
applications remotely. This can be used if a
device is unrecoverable.
Application controls: Many mobile applications
attempt to access unnecessary user
information (e.g. the location of device).
Controls should be used to limit data that
applications can access and restrict the
actions that applications may undertake.
MOBILE APPLICATION SECURITY
ENCRYPTION: Ensure that mobile applications are encrypting sensitive
data that is stored on the devices. Encryption keys must also be created and
stored securely.
AUTHENTICATION: A best practices for mobile
application to authenticate the user and to base access to data
on user’s authentication level.
APPLICATION WHITELISTING: it is device administration
practice used to prevent unauthorized application from running. The purpose
is primarily to protect device and networks from harmful application.
MOBILE THREATS
APPLICATION BASED THREATS.
WEB BASED THREATS.
NETWORK BASED THREATS.
APPLICATION BASED THREATS
 It happens when people download apps that look legit but actually skim data
from their device. Examples are spyware and malware that steals personal and
business information without people realizing what’s going on.
 Application based threats are as follows:
 MALWARE
 SPYWARE
 PRIVACY THREATS
 VULNERABLE APPLICATION
 Some well-known apps like [TRUECALLER and VLC MEDIA PLAYER]
are caught cheating with user’s privacy.
 TRUECALLER: [malware threat] In latest update of truecaller [v10.41.6]
problem of automatic UPI verification with truecaller is found in which this
app automatically links to your bank account without taking permission of
user.
 VLC MEDIAPLAYER: Similarly in VLC [spyware and malware threat]
application bug is found that allows hackers to access
user’s personal data on mobile phone.
WEB BASED THREATS
 Web based threats are tend to go unnoticed. They happen when people visit
affected sites that seem fine on front-end but in reality, automatically download
malicious content onto devices.
 Web based threats are as follows:
 PHISHING SCAMS
 DRIVE-BY DOWNLOAD
 BROWSER EXPLOITS
 One of the well-known web based threat is Ransomware virus
 Ransomware virus can affect your phone by application download and web
links. Once you click link, application starts downloading and interface occurs
on your mobile screen and encrypts all your data. Which can only be removed
after providing some money or it will be deleted your data.
NETWORK BASED THREATS
 Network based threats are especially bad because cybercriminals can steal
unencrypted data while people use public Wi-Fi networks. Is contains
 NETWORK EXPLOITS
 WI-FI SNIFFING
TIPS TO STAY SAFE
 Set a password.
 Always update your phone with latest version.
 Never download unknown apps.
 Always be aware of what you are installing.
 Don’t open unknown link from unknown website.
 Backup your phone data if possible.
 Buy antivirus security for your device.
ANTIVIRUS APPLICATIONS
CONCLUTION
Our mobile device contains important and delicate data
for hackers which is needs to be protected.
With simple tips given in presentation we can keep our
mobile and data safe and secure
Mobile protection

Más contenido relacionado

La actualidad más candente

Wireless and mobile security
Wireless and mobile securityWireless and mobile security
Wireless and mobile securityPushkar Pashupat
 
Smartphone security
Smartphone  securitySmartphone  security
Smartphone securityManish Gupta
 
Mobile security in Cyber Security
Mobile security in Cyber SecurityMobile security in Cyber Security
Mobile security in Cyber SecurityGeo Marian
 
Mobile Device Security
Mobile Device SecurityMobile Device Security
Mobile Device SecurityNemwos
 
Mobile Security 101
Mobile Security 101Mobile Security 101
Mobile Security 101Lookout
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentationTayabaZahid
 
Smart phone and mobile device security
Smart phone and mobile device securitySmart phone and mobile device security
Smart phone and mobile device securityCAS
 
Mobile device security
Mobile device securityMobile device security
Mobile device securityLisa Herrera
 
kill-chain-presentation-v3
kill-chain-presentation-v3kill-chain-presentation-v3
kill-chain-presentation-v3Shawn Croswell
 
Ppt on cyber security
Ppt on cyber securityPpt on cyber security
Ppt on cyber securityAvani Patel
 
Cyber Security Presentation
Cyber Security PresentationCyber Security Presentation
Cyber Security PresentationHaniyaMaha
 
Application Security | Application Security Tutorial | Cyber Security Certifi...
Application Security | Application Security Tutorial | Cyber Security Certifi...Application Security | Application Security Tutorial | Cyber Security Certifi...
Application Security | Application Security Tutorial | Cyber Security Certifi...Edureka!
 
Module 8 System Hacking
Module 8   System HackingModule 8   System Hacking
Module 8 System Hackingleminhvuong
 
Mobile Application Security
Mobile Application SecurityMobile Application Security
Mobile Application Securitycclark_isec
 

La actualidad más candente (20)

Wireless and mobile security
Wireless and mobile securityWireless and mobile security
Wireless and mobile security
 
Smartphone security
Smartphone  securitySmartphone  security
Smartphone security
 
Mobile security in Cyber Security
Mobile security in Cyber SecurityMobile security in Cyber Security
Mobile security in Cyber Security
 
Mobile Device Security
Mobile Device SecurityMobile Device Security
Mobile Device Security
 
Mobile Malware
Mobile MalwareMobile Malware
Mobile Malware
 
Mobile Security 101
Mobile Security 101Mobile Security 101
Mobile Security 101
 
Mobile security
Mobile securityMobile security
Mobile security
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
 
Mobile Security
Mobile SecurityMobile Security
Mobile Security
 
Smart phone and mobile device security
Smart phone and mobile device securitySmart phone and mobile device security
Smart phone and mobile device security
 
Mobile device security
Mobile device securityMobile device security
Mobile device security
 
kill-chain-presentation-v3
kill-chain-presentation-v3kill-chain-presentation-v3
kill-chain-presentation-v3
 
Ensuring Mobile Device Security
Ensuring Mobile Device SecurityEnsuring Mobile Device Security
Ensuring Mobile Device Security
 
Ppt on cyber security
Ppt on cyber securityPpt on cyber security
Ppt on cyber security
 
Cyber Security Presentation
Cyber Security PresentationCyber Security Presentation
Cyber Security Presentation
 
Application Security | Application Security Tutorial | Cyber Security Certifi...
Application Security | Application Security Tutorial | Cyber Security Certifi...Application Security | Application Security Tutorial | Cyber Security Certifi...
Application Security | Application Security Tutorial | Cyber Security Certifi...
 
Cyber kill chain
Cyber kill chainCyber kill chain
Cyber kill chain
 
What is malware
What is malwareWhat is malware
What is malware
 
Module 8 System Hacking
Module 8   System HackingModule 8   System Hacking
Module 8 System Hacking
 
Mobile Application Security
Mobile Application SecurityMobile Application Security
Mobile Application Security
 

Similar a Mobile protection

What is a Mobile Threat?
What is a Mobile Threat?What is a Mobile Threat?
What is a Mobile Threat?Lookout
 
Report on Mobile security
Report  on Mobile securityReport  on Mobile security
Report on Mobile securityKavita Rastogi
 
Tips of Mobile Application Security
Tips of Mobile Application SecurityTips of Mobile Application Security
Tips of Mobile Application SecurityMarie Weaver
 
Securing Mobile & Online Identity in the Cyber World
Securing Mobile & Online Identity in the Cyber WorldSecuring Mobile & Online Identity in the Cyber World
Securing Mobile & Online Identity in the Cyber WorldEmil Tan
 
MOBILE SECURITY.pptx
MOBILE SECURITY.pptxMOBILE SECURITY.pptx
MOBILE SECURITY.pptxKakshaPatel3
 
How to Keep Your Phone Safe from Hackers (1).pptx
How to Keep Your Phone Safe from Hackers (1).pptxHow to Keep Your Phone Safe from Hackers (1).pptx
How to Keep Your Phone Safe from Hackers (1).pptx4Freedom Mobile
 
10940 img sytr12_mobile_malware
10940 img sytr12_mobile_malware10940 img sytr12_mobile_malware
10940 img sytr12_mobile_malwareSytelReplyUK
 
mobile or cellphones attacked by viruses,phishing,swishing-1.pptx
mobile or cellphones attacked by viruses,phishing,swishing-1.pptxmobile or cellphones attacked by viruses,phishing,swishing-1.pptx
mobile or cellphones attacked by viruses,phishing,swishing-1.pptxvrandmandora1
 
Top Seven Risks of Enterprise Mobility - How to protect your business
Top Seven Risks of Enterprise Mobility - How to protect your businessTop Seven Risks of Enterprise Mobility - How to protect your business
Top Seven Risks of Enterprise Mobility - How to protect your businessSymantec
 
Evaluate Top Seven Risks of Enterprise Mobility
Evaluate Top Seven Risks of Enterprise MobilityEvaluate Top Seven Risks of Enterprise Mobility
Evaluate Top Seven Risks of Enterprise MobilityRapidSSLOnline.com
 
Unicom Conference - Mobile Application Security
Unicom Conference - Mobile Application SecurityUnicom Conference - Mobile Application Security
Unicom Conference - Mobile Application SecuritySubho Halder
 
Mobile App Security Best Practices Protecting User Data.pdf
Mobile App Security Best Practices Protecting User Data.pdfMobile App Security Best Practices Protecting User Data.pdf
Mobile App Security Best Practices Protecting User Data.pdfGMATechnologies1
 
How to Ensure Complete Data Protection at Work?
How to Ensure Complete Data Protection at Work?How to Ensure Complete Data Protection at Work?
How to Ensure Complete Data Protection at Work?XNSPY
 
Mobile Apps and Security Attacks: An Introduction
Mobile Apps and Security Attacks: An IntroductionMobile Apps and Security Attacks: An Introduction
Mobile Apps and Security Attacks: An IntroductionNagarro
 

Similar a Mobile protection (20)

What is a Mobile Threat?
What is a Mobile Threat?What is a Mobile Threat?
What is a Mobile Threat?
 
Smartphone Smart Card 061013
Smartphone Smart Card 061013Smartphone Smart Card 061013
Smartphone Smart Card 061013
 
Report on Mobile security
Report  on Mobile securityReport  on Mobile security
Report on Mobile security
 
Tips of Mobile Application Security
Tips of Mobile Application SecurityTips of Mobile Application Security
Tips of Mobile Application Security
 
Securing Mobile & Online Identity in the Cyber World
Securing Mobile & Online Identity in the Cyber WorldSecuring Mobile & Online Identity in the Cyber World
Securing Mobile & Online Identity in the Cyber World
 
MOBILE SECURITY.pptx
MOBILE SECURITY.pptxMOBILE SECURITY.pptx
MOBILE SECURITY.pptx
 
How to Keep Your Phone Safe from Hackers (1).pptx
How to Keep Your Phone Safe from Hackers (1).pptxHow to Keep Your Phone Safe from Hackers (1).pptx
How to Keep Your Phone Safe from Hackers (1).pptx
 
10940 img sytr12_mobile_malware
10940 img sytr12_mobile_malware10940 img sytr12_mobile_malware
10940 img sytr12_mobile_malware
 
Cn35499502
Cn35499502Cn35499502
Cn35499502
 
mobile or cellphones attacked by viruses,phishing,swishing-1.pptx
mobile or cellphones attacked by viruses,phishing,swishing-1.pptxmobile or cellphones attacked by viruses,phishing,swishing-1.pptx
mobile or cellphones attacked by viruses,phishing,swishing-1.pptx
 
Tips and Tricks on Securing your Android Devices
Tips and Tricks on Securing your Android DevicesTips and Tricks on Securing your Android Devices
Tips and Tricks on Securing your Android Devices
 
Top Seven Risks of Enterprise Mobility - How to protect your business
Top Seven Risks of Enterprise Mobility - How to protect your businessTop Seven Risks of Enterprise Mobility - How to protect your business
Top Seven Risks of Enterprise Mobility - How to protect your business
 
Evaluate Top Seven Risks of Enterprise Mobility
Evaluate Top Seven Risks of Enterprise MobilityEvaluate Top Seven Risks of Enterprise Mobility
Evaluate Top Seven Risks of Enterprise Mobility
 
Top 6-Security-Threats-on-iOS
Top 6-Security-Threats-on-iOSTop 6-Security-Threats-on-iOS
Top 6-Security-Threats-on-iOS
 
CTO Cybersecurity Forum 2013 David Turahi
CTO Cybersecurity Forum 2013 David TurahiCTO Cybersecurity Forum 2013 David Turahi
CTO Cybersecurity Forum 2013 David Turahi
 
pp.pptx
pp.pptxpp.pptx
pp.pptx
 
Unicom Conference - Mobile Application Security
Unicom Conference - Mobile Application SecurityUnicom Conference - Mobile Application Security
Unicom Conference - Mobile Application Security
 
Mobile App Security Best Practices Protecting User Data.pdf
Mobile App Security Best Practices Protecting User Data.pdfMobile App Security Best Practices Protecting User Data.pdf
Mobile App Security Best Practices Protecting User Data.pdf
 
How to Ensure Complete Data Protection at Work?
How to Ensure Complete Data Protection at Work?How to Ensure Complete Data Protection at Work?
How to Ensure Complete Data Protection at Work?
 
Mobile Apps and Security Attacks: An Introduction
Mobile Apps and Security Attacks: An IntroductionMobile Apps and Security Attacks: An Introduction
Mobile Apps and Security Attacks: An Introduction
 

Último

Call US Pooja 9892124323 ✓Call Girls In Mira Road ( Mumbai ) secure service,
Call US Pooja 9892124323 ✓Call Girls In Mira Road ( Mumbai ) secure service,Call US Pooja 9892124323 ✓Call Girls In Mira Road ( Mumbai ) secure service,
Call US Pooja 9892124323 ✓Call Girls In Mira Road ( Mumbai ) secure service,Pooja Nehwal
 
Powerful Love Spells in Arkansas, AR (310) 882-6330 Bring Back Lost Lover
Powerful Love Spells in Arkansas, AR (310) 882-6330 Bring Back Lost LoverPowerful Love Spells in Arkansas, AR (310) 882-6330 Bring Back Lost Lover
Powerful Love Spells in Arkansas, AR (310) 882-6330 Bring Back Lost LoverPsychicRuben LoveSpells
 
BDSM⚡Call Girls in Sector 71 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 71 Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Sector 71 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 71 Noida Escorts >༒8448380779 Escort ServiceDelhi Call girls
 
CALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best Night Fun service
CALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best Night Fun serviceCALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best Night Fun service
CALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best Night Fun serviceanilsa9823
 
FULL ENJOY - 9999218229 Call Girls in {Mahipalpur}| Delhi NCR
FULL ENJOY - 9999218229 Call Girls in {Mahipalpur}| Delhi NCRFULL ENJOY - 9999218229 Call Girls in {Mahipalpur}| Delhi NCR
FULL ENJOY - 9999218229 Call Girls in {Mahipalpur}| Delhi NCRnishacall1
 
9892124323 | Book Call Girls in Juhu and escort services 24x7
9892124323 | Book Call Girls in Juhu and escort services 24x79892124323 | Book Call Girls in Juhu and escort services 24x7
9892124323 | Book Call Girls in Juhu and escort services 24x7Pooja Nehwal
 
CALL ON ➥8923113531 🔝Call Girls Saharaganj Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Saharaganj Lucknow best sexual serviceCALL ON ➥8923113531 🔝Call Girls Saharaganj Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Saharaganj Lucknow best sexual serviceanilsa9823
 

Último (7)

Call US Pooja 9892124323 ✓Call Girls In Mira Road ( Mumbai ) secure service,
Call US Pooja 9892124323 ✓Call Girls In Mira Road ( Mumbai ) secure service,Call US Pooja 9892124323 ✓Call Girls In Mira Road ( Mumbai ) secure service,
Call US Pooja 9892124323 ✓Call Girls In Mira Road ( Mumbai ) secure service,
 
Powerful Love Spells in Arkansas, AR (310) 882-6330 Bring Back Lost Lover
Powerful Love Spells in Arkansas, AR (310) 882-6330 Bring Back Lost LoverPowerful Love Spells in Arkansas, AR (310) 882-6330 Bring Back Lost Lover
Powerful Love Spells in Arkansas, AR (310) 882-6330 Bring Back Lost Lover
 
BDSM⚡Call Girls in Sector 71 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 71 Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Sector 71 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 71 Noida Escorts >༒8448380779 Escort Service
 
CALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best Night Fun service
CALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best Night Fun serviceCALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best Night Fun service
CALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best Night Fun service
 
FULL ENJOY - 9999218229 Call Girls in {Mahipalpur}| Delhi NCR
FULL ENJOY - 9999218229 Call Girls in {Mahipalpur}| Delhi NCRFULL ENJOY - 9999218229 Call Girls in {Mahipalpur}| Delhi NCR
FULL ENJOY - 9999218229 Call Girls in {Mahipalpur}| Delhi NCR
 
9892124323 | Book Call Girls in Juhu and escort services 24x7
9892124323 | Book Call Girls in Juhu and escort services 24x79892124323 | Book Call Girls in Juhu and escort services 24x7
9892124323 | Book Call Girls in Juhu and escort services 24x7
 
CALL ON ➥8923113531 🔝Call Girls Saharaganj Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Saharaganj Lucknow best sexual serviceCALL ON ➥8923113531 🔝Call Girls Saharaganj Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Saharaganj Lucknow best sexual service
 

Mobile protection

  • 1. Faculty advisor : KIRAN PANCHAL PREET PATEL : 170520123034 KIRTAN PATEL : 170520123032
  • 2. CONTENTS INTRODUCTION IMPORTANCE OF MOBILE PROTECTION TYPES OF MOBILE SECURITIES TYPES OF MOBILE THREATS TIPS TO STAY SAFE CONCLUTION
  • 3. INTRODUCTION IMPORTANCE OF MOBILE PHONE It is used in our daily life to make phone calls, messages, etc. Phone has internet access, built in video cameras and ability to install additional software. Phone contains sufficient storage to store precious data like official documents, private photos-videos, contacts, etc.
  • 4. WHY MOBILE PROTECTION IS IMPORTANT? As mobile phone contains our private data it is necessary to protect mobile phone by applying unlock patterns and installing antivirus applications. PHYSICAL SECURITY: A phone can be confiscated or stolen. So there should be some password protection on your phone. Once your data is stolen by hacker, you would asked to pay some bucks to release or get your data back or hacker can also blackmail you on the basis of your private data.
  • 5. TYPES OF MOBILE SECURITY MOBILE DEVICE SECURITY. MOBILE APPLICATION SECURITY.
  • 6. MOBILE DEVICE SECURITY SCREEN LOCKS: All mobile devices (e.g., phones, tablets, and laptops) should have the screen lock set.
  • 7. .LOCKOUT SETTINGS: After a specific no. of unsuccessful unlock attempts, the device will get locked which can be opened through user’s ID. GPS: Many mobile devices have GPS Capabilities, allowing the device to be Located if it is lost or stolen. REMOTE WIPING: some devices allow The device to be wipe out all data and applications remotely. This can be used if a device is unrecoverable.
  • 8. Application controls: Many mobile applications attempt to access unnecessary user information (e.g. the location of device). Controls should be used to limit data that applications can access and restrict the actions that applications may undertake.
  • 9. MOBILE APPLICATION SECURITY ENCRYPTION: Ensure that mobile applications are encrypting sensitive data that is stored on the devices. Encryption keys must also be created and stored securely. AUTHENTICATION: A best practices for mobile application to authenticate the user and to base access to data on user’s authentication level.
  • 10. APPLICATION WHITELISTING: it is device administration practice used to prevent unauthorized application from running. The purpose is primarily to protect device and networks from harmful application.
  • 11. MOBILE THREATS APPLICATION BASED THREATS. WEB BASED THREATS. NETWORK BASED THREATS.
  • 12. APPLICATION BASED THREATS  It happens when people download apps that look legit but actually skim data from their device. Examples are spyware and malware that steals personal and business information without people realizing what’s going on.  Application based threats are as follows:  MALWARE  SPYWARE  PRIVACY THREATS  VULNERABLE APPLICATION  Some well-known apps like [TRUECALLER and VLC MEDIA PLAYER] are caught cheating with user’s privacy.
  • 13.  TRUECALLER: [malware threat] In latest update of truecaller [v10.41.6] problem of automatic UPI verification with truecaller is found in which this app automatically links to your bank account without taking permission of user.  VLC MEDIAPLAYER: Similarly in VLC [spyware and malware threat] application bug is found that allows hackers to access user’s personal data on mobile phone.
  • 14. WEB BASED THREATS  Web based threats are tend to go unnoticed. They happen when people visit affected sites that seem fine on front-end but in reality, automatically download malicious content onto devices.  Web based threats are as follows:  PHISHING SCAMS  DRIVE-BY DOWNLOAD  BROWSER EXPLOITS  One of the well-known web based threat is Ransomware virus
  • 15.  Ransomware virus can affect your phone by application download and web links. Once you click link, application starts downloading and interface occurs on your mobile screen and encrypts all your data. Which can only be removed after providing some money or it will be deleted your data.
  • 16. NETWORK BASED THREATS  Network based threats are especially bad because cybercriminals can steal unencrypted data while people use public Wi-Fi networks. Is contains  NETWORK EXPLOITS  WI-FI SNIFFING
  • 17. TIPS TO STAY SAFE  Set a password.  Always update your phone with latest version.  Never download unknown apps.  Always be aware of what you are installing.  Don’t open unknown link from unknown website.  Backup your phone data if possible.  Buy antivirus security for your device.
  • 19. CONCLUTION Our mobile device contains important and delicate data for hackers which is needs to be protected. With simple tips given in presentation we can keep our mobile and data safe and secure