120 likes | 254 Views
Cell Phone Security. a little computer in your pocket an easy target for malcontents. Presentation Topics. history functionality usage security issues. attack prevention attack recovery enterprise future. History. the brick analog networks limited users limited availability.
E N D
Cell Phone Security • a little computer in your pocket • an easy target for malcontents CS691 Robin Kimzey
Presentation Topics • history • functionality • usage • security issues • attack prevention • attack recovery • enterprise • future CS691 Robin Kimzey
History • the brick • analog networks • limited users • limited availability CS691 Robin Kimzey
Typical Functionality • voice calls • text messaging • web surfing • bluetooth connectivity • wi-fi connectivity • email CS691 Robin Kimzey
Typical Usage • verbal communication • electronic communication • storage of information like contacts and possibly business or personal security data • personal/business photos • business presentations or confidential files CS691 Robin Kimzey
Security Issues • physical theft • signal interception • malware infection • cloning • tracking • textspamming • DoS (bluetooth) • enterprise access CS691 Robin Kimzey
Attack Prevention • physically secure device • use security tools available to you • only enable features that are used • look for 3rd party software for additional security • be aware of security issues and avoid them when possible • trusted software from trusted sources CS691 Robin Kimzey
Attack Recovery • report stolen/lost hardware immediately • disable account • wipe device contents remotely • reset device and re-install authorized apps CS691 Robin Kimzey
Enterprise • setup solid security policy for all devices • enforce the security policy in place • train users to understand and mitigate security issues CS691 Robin Kimzey
Future Trends/Issues • standardized/open OSes like Android • increased functionality • zombie/botnet threat • current computer risks are future cell phone risks CS691 Robin Kimzey
References • NIST SP800-124, http://csrc.nist.gov/publications/drafts/800-82/draft_sp800-82-fpd.pdf • Emerging Cyber Threats Report for 2009, Georgia Tech http://www.gtiscsecuritysummit.com/pdf/CyberThreatsReport2009.pdf CS691 Robin Kimzey
Questions? CS691 Robin Kimzey