Professional Documents
Culture Documents
MOD 4 - Overview of Mobile Threats and Vulnerabilities
MOD 4 - Overview of Mobile Threats and Vulnerabilities
SECURITY
MOD 4 – Overview of Mobile
Threats and Vulnerabilities
Learning Objectives
• Introduction to Mobile Threats and Vulnerabilities
• Physical security controls
• Tools and attacks against mobile devices
• Mobile devices and security infrastructures
• High-Level threats and vulnerabilities
• Securing mobile hardware
• The camera
• Microphones
• Sensors
• Radios
MOD 4 – Overview of Mobile Threats and Vulnerabilities 2
Introduction to Mobile Threats and
Vulnerabilities
• Just as mobile apps are popular in virtually every facet of life, they’ve
become an essential part of business.
• With consumers now spending over 90% of their five hours a day of smart
device time on apps, it’s no surprise that apps have become unavoidable
both from a usage and application point of view.
• However, this raises the very serious issue of what kind of security threats
and vulnerabilities mobile apps pose, as offering apps to customers or
relying on apps for your business can also increase risk production
perspective.
21
MOD 4 – Overview of Mobile Threats and Vulnerabilities
ii. Social engineering attacks
• Users are often educated about the threat of phishing emails on their
laptops and desktops, but they may not apply the same caution to their
mobile device.
• Users should be educated to avoid following email links, opening
attachments, or visiting websites that are not confirmed as safe.
• MDM products can provide a whitelist of websites that are considered safe,
automatically allowing access to these sites.
• Alternatively, a secure browser can be installed on the device, allowing access
only to approved sites.
• Once on a system, the worm will search for some form of contacts database
or file sharing system and send itself out as an attachment.
• When in email form, the attachment is part of an email that looks like it’s
from the person whose computer was compromised.
• While there are countless new threats being developed daily, many of
them rely on old security vulnerabilities to work.
• With so many malwares looking to exploit the same few
vulnerabilities time and time again, one of the biggest risks that a
business can take is failing to patch those vulnerabilities once they’re
discovered.
• RFID security tags are the simplest way for your business to keep track
of inventory, shipments, and protect against theft.
• Small, inexpensive, and effective, if you don’t currently use them then
you need to seriously reconsider!