2k likes | 4.59k Views
Mobile Device Security. ZACH CURRY. Overview. Mobile Device Security. Introduction. 1. Mobile Device Use. 2. 3. Importance of Mobile Device Security. 4. Mobile Device Exploitation. 5. Securing Mobile Devices. 6. Conclusion. ZACH CURRY. Introduction. Mobile Device Security.
E N D
Mobile Device Security ZACHCURRY
Overview Mobile Device Security Introduction 1 Mobile Device Use 2 3 Importance of Mobile Device Security 4 Mobile Device Exploitation 5 Securing Mobile Devices 6 Conclusion ZACHCURRY
Introduction Mobile Device Security • Mobile Device Definition5 • Small, hand-held computing device • Built in display • Touch screen or mini-keyboard • Less than 2 pounds • Mobile Device Examples • iPhone/iPad • Android Smartphones/Tablets • Windows Smartphone • Blackberry ZACHCURRY
Introduction Mobile Device Security • Mobile Device Sectors • Personal • Business • Government • Scope of Presentation • Business • Government • Overlapping • Business + Personal • Government + Personal ZACHCURRY
Mobile Device Use Mobile Device Security • 81% Growth of cell phone usage in 20121 • 87% • American adults who own a cell phone2 • 84% Cell phone owners who could not go a single day w/o their device3 • 45% • American adults who own a smart phone2 ZACHCURRY
Mobile Device Use Mobile Device Security • 4 ZACHCURRY
Importance of Mobile Device Security Mobile Device Security • Business • Intellectual Properties • Financial Loss • Government • Operational Security • Mission Compromise • Footprint • Physical • Logical ZACHCURRY
Importance of Mobile Device Security Mobile Device Security • Logic Footprint pre-Mobile Devices • Direct organizational control • Virtual Private Networks • Encrypted tunnels • Logical Footprint w/Mobile Devices • Increase in means of connecting • Less/No control of devices • Unsecure WiFi • Plaintext transmission ZACHCURRY
Importance of Mobile Device Security Mobile Device Security ZACHCURRY
Importance of Mobile Device Security Mobile Device Security ZACHCURRY
Mobile Device Exploitation Mobile Device Security • Physical Theft • Loss of data • Loss of network credentials • Potential for erroneous emails, actions, etc • Kernel Modules • Hook low level functions under OS • Exfiltration of anything • Can completely hide itself • Potentially very difficult to remove ZACHCURRY
Mobile Device Exploitation Mobile Device Security • Mobile App Exploitation • Malicious or accidental (ignorance) • Apps running with Root • Attacker can piggy back app • Femtocells • Mini-Cellular Tower • Sends cell traffic over TCP/IP • Can capture all data going over GSM/CDMA • Transparent to device user ZACHCURRY
Securing Mobile Devices Mobile Device Security • What’s Being Done • Apple: App Verification Process6 • Android: ASLR7 • Address space layout randomization • What Can Be Done Moving Forward • More visibility of mobile device security • Approved devices • Mobile security policy • Required Android version • Random device review • Traffic analysis ZACHCURRY
Conclusion Mobile Device Security • Mobile device use continues to grow • Mobile devices in use will exceed population this year8 • Mobile device use: Augmentation Requirement • Mobile space becoming more advantageous to target • Mobile device security needs more visibility! • MOBILE DEVICES ARE HERE TO STAY ZACHCURRY
References Mobile Device Security http://www.cisco.com/en/US/solutions/collateral/ns341/ns525/ns537/ns705/ns827/white_paper_c11-520862.html http://pewinternet.org/Commentary/2012/February/Pew-Internet-Mobile.aspx http://www.huffingtonpost.com/2012/08/16/smartphone-addiction-time-survey_n_1791790.html http://www.gcdtech.com/processed/images/upload/530-530-530-417-0-0-372-smartphone.png http://en.wikipedia.org/wiki/Mobile_device https://developer.apple.com/appstore/guidelines.html http://http://source.android.com/tech/security/ http://www.cisco.com/en/US/solutions/collateral/ns341/ns525/ns537/ns705/ns827/white_paper_c11-520862.html ZACHCURRY
Questions ZACHCURRY