210 likes | 269 Views
Learn about the risks associated with mobile devices such as smartphone theft, app vulnerabilities, and network insecurities. Discover best security practices, historical hacker profiles, and SSL browsing tips to enhance your awareness and safeguard your information.
E N D
InformationSecurity-NetworkandMobileSecurity MS in Information Systems and Assurance
Survey Highlights • 61% of you prefer using mobile device to surf the Internet. • 46% of you spend 2 hours or less daily on mobile device. • 42% of you indicate they have lost their mobile devices before. • 39% of you never change passwords and 6% change 3 times a year. • 64% of you have used unsecured network. • 27% of you will keep using even if the app would collect personal information
Historical hackers • Profile: • Male • Between 14 and 34 years of age • Computer addicted • No permanent girlfriend No Commercial Interest !!!
World’s Greatest Teenage Hackers • James Kosta: The 13-Year-Old Who Hacked Everything • Matthew Weigman: The 14-Year-Old Who Hacked SWAT • Jonathan James: The 15-Year-Old Who Hacked NASA • Richard Pryce: The 16-Year-Old Who Hacked the Pentagon
Tips for Safe Browsing Do use a secure network Do not enter usernames and password on sites that do not use HTTPS. Close your browser after leaving secure sites.
Technology Demo: WireShark Captures packets in real time and display them in human-readable format Includes filters, color-coding and other features that let you dig deep into network traffic and inspect individual packets.
Smartphone Risks • Increase mobility → Increased exposure • Easily lost or stolen • device, content, identity • Susceptible to threats and attacks • App-based, Web-based, SMS/Text message-based
What if you were Donald Trumps’ secretary…? On March 17, 2017, a laptop containing Trump Tower floor plans and information on the Clinton investigation was stolen from the car of a Secret Service agent. What would you do? Get everything back in 24 hours, If not, you’re fired !!!
Quick Response Codes OR Code – Wait Before You Scan! • Speaking of mobile devices and the web, a relatively new development is the “Quick Response” or “QR” code, the little square dot-like bar codes that are meant to be photographed by mobile devices as a convenient way of taking your mobile device to a particular location online (or giving folks a phone number, text, etc.) • Quick, what do those barcodes say, eh?
Mobile APPS- Security Risk Concerns • McDonald's App Leaks Details of 2.2 Million Customers: A vulnerable application used by millions of McDonald’s customers in India was recently found to leak personal information on its users. • Google removed 132 Android apps from its store after researchers found that their HTML code contained hidden, malicious iframes.
Social Problems • There aren’t always solutions to all of these problems • Humans will continue to be tricked into giving out information they shouldn’t • So, the best that can be done is to implement a wide variety of solutions and more closely monitor who has access to what network resources and information.
Best Security Practices • Password protect Passcode protect Pass swipe protect?
Best Security Practices cont. • Install Security Software • Anti-virus and anti-malware available for mobile devices • Keep your apps up-to-date • Install a phone finder app • Enroll in a backup program • Set device to wipe contents after specified number of failed login attempts
Best Security Practices cont. • When installing apps • Take time to read the small print • What information does the app require access to? • Where are you downloading the app from? • Is it the app store location set by default on the phone?
Best Security Practices cont. • Know where your device is at all times • Be mindful of how you use your device • Follow same guidelines as you do for your computer • Double check URLs for accuracy • Don’t open suspicious links • Make sure the Website is secure before giving any personal data
Lost or Stolen? • Treat as if your purse or wallet • File a report with law enforcement • Contact your service vendor to cancel your service and report your device missing • If you have a backup/wipe program, contact your vendor to have them wipe the device
Key Points • Password/Passcode protect your device • Lock your device • Use anti-virus software • Sync/back up your data • Install a phone finder app