1 / 19

Cell Phone Security

By Paul Capers. Cell Phone Security. What is a Cell Phone?. A cell phone is a portable telephone that does not use a wired connection. It connects to a wireless carrier network using radio waves

tiana
Download Presentation

Cell Phone Security

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. By Paul Capers Cell Phone Security

  2. What is a Cell Phone? • A cell phone is a portable telephone that does not use a wired connection. It connects to a wireless carrier network using radio waves • The ability to communicate over cellular networks distinguishes it self from other types of handheld devices.

  3. Cellular Communications • Cell Phones communicate through the air by radio waves with a base station • Cellular networks provide coverage based on dividing a large geographical service area into smaller areas of coverage called cells. • Cells play an important role in reuse of radio frequencies in the limited radio spectrum available to allow more calls to occur than otherwise would be possible.

  4. Importance of a Cell Phone • The importance of having a cell phone in this day in age is valuable to our lives. It has become a necessity for many people in today’s society.  Giving the ability to keep in touch with family, business associates, and having the capability of sending email are only a few of the reasons for the ever-increasing importance of cell phones.

  5. Cell Phone Capabilities • Text messaging • GPS • Music • Sound &Video recording • Sending /Receiving Pictures • Microsoft office applications • Camera/camcorder • Games • Bluetooth • Wi-Fi connectivity • Instant messaging • Surfing the web • E-mail • and a range of other things of that sort.

  6. Security a MUST have!! • Even though a cell phone presents great features and capabilities, these phones need security. • Cell phones is nothing less than a simplified computer

  7. Security a Must have!! • Personal/ Business Use • Prevent others from listening to your private conversations • Protect sensitive financial information • Protect Emails/Calender/address book • Prevent fraudulent billing

  8. Cell Phone Viruses • The first known cell-phone virus appeared in 2004 called Cabir.A—it affected only a small number of Bluetooth-enabled phones. • Common Viruses today • Cabir.A • Skulls.A • Commwarrior.A • Locknut.B • Fontal.A

  9. Viruses • Results From a Virus • It will spread throughout the phone. • Access and/or delete contact information and calendar entries • Send an infected SMS/MMS messages to every number in your phone book • Send costly messages/calls • Kill your battery The Point is, cell phone viruses are here and will only grow in popularity

  10. Cell Phone Vulnerabilities • Stolen/Lost • VoIp • Bluetooth • Eavesdropping

  11. Stolen/Lost • Cell Phones are small. One of the reasons why they are so popular. On the other hand, small things have a way of getting lost or stolen. HOW MANY PEOPLE LOST THERE PHONE BEFORE? • It is highly recommended that you lock your phone with a password. The finder of the phone may have yourdevice, but at least they won’t have your personal information or be able to use your device.

  12. VoIP • Voice over IP is a growing occurrence, as are its security problems. With a little time and a solid understanding of a VoIP system, it can be easy to target phone systems and trick them into passing fake information. This could be as simple as changing the caller ID number listed with the phone call, or as dangerous as being able to bypass security checks and accessing a mobile phone users account

  13. Bluetooth • Bluetooth is a wireless technology that allows local devices to generate a small network through which information can be passed. This information usually consists of addresses and small files. Bluetooth settings must be correctly applied. If the settings are not applied correctly, an attacker can gain access to your call history, address book, calendar entries, and much more. • To avoid such problems you should simply disable your bluetooth when not in use.

  14. Eavesdropping • At one point in time eavesdropping was a big problem for analog phone users. Due to the fact that FM radio signals were easily monitored using scanners. • The majority of cell phones today are digital. • Therefore they are less vulnerable to eavesdropping.

  15. Celebrity Victims • Paris Hilton: hackers gained access to her sidekick and downloaded all of her stored video, text and data files and posted her address book on the Internet.

  16. Celebrity Victims • President Barack Obama • Cyber terrorist Kasper Hauser has accessed President Barack Obama's encrypted Blackberry messages • Obama's Blackberry contained sensitive messages from the Commander in Chief to Vice President Joe Biden, Secretary of State Hillary Clinton, California Governor Arnold Schwarzenegger - even Nuclear Command Control itself.

  17. Celebrity Victims • kardashinavideo.html

  18. Protecting Your Phone • Turn off Bluetooth discoverable mode • Check Security Updates • Use a mobile anti-virus program • NetQuin(Droid) • LookOut Mobile Security(Droid) • F-Secure • McAfee • Symantec • Lock Phone with password • Have a voicemail password • Frequently change your password

  19. The End

More Related