110 likes | 234 Views
Mobile Device Security. Presented by Team Alpha. Introduction (Ross). Beginning of mobility (why, who, where, when It began) DynaTAC handheld phone First mobile call made by Martin Cooper in 1973 Cooper called Bell labs rival in New York
E N D
Mobile Device Security Presented by Team Alpha
Introduction (Ross) • Beginning of mobility (why, who, where, when It began) • DynaTAC handheld phone • First mobile call made by Martin Cooper in 1973 • Cooper called Bell labs rival in New York • Smartphone and Tablet devices (why, where, when, and who) • Simon from IBM • First introduced in 1990’s • What else about Simon??? • What about the first Tablet device???? • What, who, where, and when???
Mobile security (Ross) • What is mobile security? • First know virus written for smartphones in 2004 • Virus called “Caribe” written for Symbian operating system • Classified by Kaspersky Lab as Worm.SymbOS.Cabir • Started the security concern for modern phones.
Type of Device Operating System (Ross) • Windows • Built-in Windows Office documents and Adobe Flash support • Multi-tasking capability (Live tiles on Windows 8 Phones • Available for multiple phone device brands • iOS • Has good embedded mobile security • Includes full-block, file level hardware encryption • Phone device must be Apple
Type of device operating system continued • Android • Google product • Community and user driven • No restrictions on applications • Unsecure • Blackberry • Very successful in government and corporate markets • Ranked top in security level • Excellent integration with corporate email systems
Statistical Data (Ross) • According to the State of Mobility Survey 2012 by Symantec, 59 percent of the 6,275 respondents reported that their organizations are making line-of-business applications accessible from mobile devices, and 71 percent said their organization is looking at implementing a corporate "store" for mobile applications. • It's not hard to see why. Organizations believe embracing mobile computing increases the efficiency and effectiveness of their workforces. Symantec's survey found that 73 percent of respondents expected to increase efficiency through mobile computing, and all of them did realize that increased efficiency • See link for reference http://www.cio.com/article/711258/For_BYOD_Best_Practices_Secure_Data_Not_Devices • You may choose to use or not; up to you.
The Need to Secure (John) • BYOD Policy • Mobile Commerce • Gateway to Corporate Networks • Personal Content • Unsecured Wireless Communications • Because the US President uses one
Pros and Cons (John) • Personal work space • Apps and Games • Inconvenient (personal and work phone) • Secure communications • Access to corporate data • Access to business applications • Remote IT support (for IT personnel)
Recommendation (Kevin) • Mobile device management (MDM) tools • BYOD security policy • Hire dedicated staff for MDM • Educate users through InfoSec classes • Encourage InfoSec staff to acquire certification