SlideShare uma empresa Scribd logo
1 de 22
CONTENTS
 INTRODUCTION
 SPREADING OF VIRUS
 ANAMNESIS (CASE STUDIES)
 CURRENT STATUS OF MOBILE
MALWARE
 PROTECTIVE MEASURES
 THREATS OF MOBILE PHONE
VIRUS
 CONCLUSION
INTRODUCTION
Mobile security / Mobile phone security has become
increasingly important in mobile computing.
It is of particular concern as it relates to
the security of personal and business information now
stored on smart phones.
Rapid advances in low-power computing,
communications, and storage technologies continue to
broaden the horizons of mobile devices, such as cell phones
and personal digital assistants (PDAs).
A cell-phone virus is basically the same thing as a computer
virus. An unwanted executable file that "infects" a device and then
copies itself to other devices.
1. A computer virus or worm spreads through e-mail
attachments and Internet downloads.
2. A cell-phone virus or worm spreads via Internet
downloads, MMS attachments and Bluetooth transfers.
Current phone-to-phone
viruses almost exclusively infect
phones running the Symbian
operating system.
Standard operating systems and Bluetooth technology will
enable cell phone viruses to spread either through SMS or by sending
Bluetooth requests when cell phones are physically close enough.
SPREADING OF VIRUS
Phones that can only make and receive calls are not at
risk. Only smart phones with a Bluetooth connection and
data capabilities can receive a cell-phone virus.
These viruses spread primarily in three ways:
1. Internet download - The user downloads an
infected file to the phone by way of a PC or the phone's own
Internet connection.
2. Bluetooth wireless connection - The user receives
a virus via Bluetooth when the phone is in discoverable
mode, meaning it can be seen by other Bluetooth-enabled
phones.
3. Multimedia Messaging Service - The virus is an
attachment to an MMS text message
Mobiles enabled with GPS facility can cause much
large scale of virus infection spread.
ANAMNESIS (CASE STUDIES)
1. CABIR
The first known cell-phone virus, Cabir, is entirely innocuous
(not harmful). All it does is sit in the phone and try to spread itself.
2. COMWAR
The second worm for mobile devices detected in the wild was
COMWAR . This is the first worm for mobiles phones which is able to
propagate via MMS.
3. CARDTRAP
Card Trap is the first known mobile malware that attempts a
cross-platform infection by jumping from an infected phone to a target
computer
4. DUTS
DUTS is a parasitic file infector virus. It is the first known
virus for the PocketPC platform. DUTS affects ARM-based devices
only
5. SKULLS
A Trojan horse piece of code. Once downloaded, the virus,
called Skulls, replaces all phone desktop icons with images of a
skull.
6. LASCO
It is based on the same source code which is now freely
available on the net. LASCO.A is very similar to CABIR.H.
CURRENT STATUS OF MOBILE MALWARE
The first half of 2008 was interesting from a mobile
malware point of view. It's worth stressing the following points:
1. An increase in the number of malicious programs with
Trojan-SMS behavior.
2. The cross-platform nature of mobile Trojans - Any mobile
phone which supports Java applications or has a Python interpreter
is under threat.
3. The increase in the number of WAP sites where such Trojan
programs are placed.
4. The appearance of ICQ spam which advertises WAP sites
and the malicious programs located on these sites.
5. The variety of social engineering methods used to spread
and disguise malicious programs.
6. The identification of short numbers to which short messages
are secretly sent.
THEORETICAL DEVELOPMENTS
1. Symbian Mobiles
Symbian malware has reached the stage where it is
being developed for profit. we saw the first Trojan-spy for
Symbian in April. Flexispy was being sold by its creator
for 50 USD. The Trojan established full control over smart
phones.
2. Windows Mobile
Windows Mobile, currently the second most popular
platform for smart phones, also attracted the attention of
malware writers. This sounds more serious than it actually
is given that there were only two examples of malware for
Windows Mobile – DUTS and BRADOR.
CROSS - PLATFORM MALWARE
The CXOVER virus, is the first example of a cross-
platform virus for mobile devices. CXOVER begins by
checking which operating system is working on the
infected device. Once the virus is on a mobile device it
attempts to copy itself onto accessible PCs. In addition, it
deletes user files on infected devices.
The LETUM worm, which was detected in April,
continued the cross platform trend. LETUM is a typical
email worm in that it spreads as an infected attachment and
sends copies of itself to all the addresses in the local
address book.
Protection against viruses can be implemented in two phase.
1. Network level security – It makes use of the proactive
approach .
2. System level security – It employs MOSES (Mobile
security processing system).
PROTECTIVE MEASURES
1. PROACTIVE APPROACH
The exponential growth of messaging in both home and
enterprise environments has made it a potent vector for the spread
of malicious code. The problem is compounded further by the
increasing convergence of various messaging platforms.
For example, users can now send IM messages from
mobile phones and SMS messages to mobile phones via SMS
gateways on the Internet.
In this section, we explain the basic rate-limiting and
quarantine mechanisms that serve as the building blocks of our
proactive response framework.
 QUARANTINE
In contrast with Rate-limiting, Quarantine-based
systems prevent a suspicious or infected client from
sending or receiving messages. This can be implemented at
the messaging server so that any connection attempt by the
user on an infected client is refused.
 RATE - LIMITING
The Rate-limiting (also known as “virus throttling”)
is a general class of response techniques that seek to limit
the spread of a worm or virus once it is detected on a host.
2. MOBILE SECURITY PROCESSING SYSTEM (MOSES)
Mobile Security Processing System is a programmable
security processor platform, to enable secure data and multi-media
communications in next-generation wireless handsets.
 SW Architecture
The software architecture for MOSES was designed using a
layered philosophy, much like the layering used in the design of
network protocols. At the top level, the SW architecture provides a
generic interface (API) using which security protocols and
applications can be ported to the platform.
 HW Platform Architecture
The hardware platform is based on the Xtensa configurable
and extensible processor from Tensilica, Inc.
Virus might access and/or delete all of the contact
information and calendar entries in your phone. It might send an
infected MMS message to every number in your phone book.
The top three areas of concern for mobile users are receiving
inappropriate content, fraudulent increases in phone bills and loss of
important information stored on the handset.
THREATS OF MOBILE PHONE VIRUS
CONCLUSION
The best way to protect yourself from cell-phone viruses is the
same way you protect yourself from computer viruses: Never open
anything if you don't know what it is?
Here are some steps you can take to decrease your chances of
installing a virus:
 Turn off Bluetooth discoverable mode. Set your phone to "hidden"
so other phones can't detect it and send it the virus.
 Check security updates to learn about file names you should keep
an eye out for.
 Security sites with detailed virus information include: F-Secure,
McAfee & Symantec
 Install some type of security software on your phone.
The software may simply detect and then remove the virus
once it's received and installed, or it may protect your phone from
getting certain viruses in the first place.
Future possibilities include viruses that bug phones -- so
someone can see every number you call and listen to your
conversations -- and viruses that steal financial information.
Ultimately, more connectivity means more exposure to
viruses and faster spreading of infection. As smart phones become
more common and more complex, so will the viruses that target
them. Beware of that
Plan B BullGuard Trend Micro
Examples for security software are as fallows:
Trust Port Quick Heal
kaspersky NQ Avast 360 Avira
AVG CM
& many more …
For any mistakes and suggestion’s feel free to text here
idamakanti.jaswanth@gmail.com

Mais conteúdo relacionado

Mais procurados

Mobile security
Mobile securityMobile security
Mobile securityMphasis
 
Mobile Security 101
Mobile Security 101Mobile Security 101
Mobile Security 101Lookout
 
Mobile Device Security
Mobile Device SecurityMobile Device Security
Mobile Device SecurityNemwos
 
Mobile device security
Mobile device securityMobile device security
Mobile device securityLisa Herrera
 
Ppt on cyber security
Ppt on cyber securityPpt on cyber security
Ppt on cyber securityAvani Patel
 
Android Application Penetration Testing - Mohammed Adam
Android Application Penetration Testing - Mohammed AdamAndroid Application Penetration Testing - Mohammed Adam
Android Application Penetration Testing - Mohammed AdamMohammed Adam
 
Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025Radar Cyber Security
 
My seminar on bluejacking
My seminar on bluejackingMy seminar on bluejacking
My seminar on bluejackingAkshita Pillai
 
Social Engineering new.pptx
Social Engineering new.pptxSocial Engineering new.pptx
Social Engineering new.pptxSanthosh Prabhu
 

Mais procurados (20)

Mobile security
Mobile securityMobile security
Mobile security
 
Mobile security
Mobile securityMobile security
Mobile security
 
Mobile security
Mobile securityMobile security
Mobile security
 
Mobile Security 101
Mobile Security 101Mobile Security 101
Mobile Security 101
 
Mobile security
Mobile securityMobile security
Mobile security
 
Ensuring Mobile Device Security
Ensuring Mobile Device SecurityEnsuring Mobile Device Security
Ensuring Mobile Device Security
 
Mobile Malware
Mobile MalwareMobile Malware
Mobile Malware
 
Mobile security
Mobile securityMobile security
Mobile security
 
mobile application security
mobile application securitymobile application security
mobile application security
 
Antivirus
AntivirusAntivirus
Antivirus
 
Mobile phone-cloning
Mobile phone-cloningMobile phone-cloning
Mobile phone-cloning
 
Mobile Device Security
Mobile Device SecurityMobile Device Security
Mobile Device Security
 
Mobile device security
Mobile device securityMobile device security
Mobile device security
 
Mobile App Security Testing -2
Mobile App Security Testing -2Mobile App Security Testing -2
Mobile App Security Testing -2
 
Ppt on cyber security
Ppt on cyber securityPpt on cyber security
Ppt on cyber security
 
Android Application Penetration Testing - Mohammed Adam
Android Application Penetration Testing - Mohammed AdamAndroid Application Penetration Testing - Mohammed Adam
Android Application Penetration Testing - Mohammed Adam
 
Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025
 
My seminar on bluejacking
My seminar on bluejackingMy seminar on bluejacking
My seminar on bluejacking
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Social Engineering new.pptx
Social Engineering new.pptxSocial Engineering new.pptx
Social Engineering new.pptx
 

Destaque

Mobile security
Mobile securityMobile security
Mobile securityhome
 
2015 Mobile Security Trends: Are You Ready?
2015 Mobile Security Trends: Are You Ready?2015 Mobile Security Trends: Are You Ready?
2015 Mobile Security Trends: Are You Ready?IBM Security
 
Symantec Mobile Security Whitepaper June 2011
Symantec Mobile Security Whitepaper June 2011Symantec Mobile Security Whitepaper June 2011
Symantec Mobile Security Whitepaper June 2011Symantec
 
G4H Webcast: Automated Security Analysis of Mobile Applications with Mobile S...
G4H Webcast: Automated Security Analysis of Mobile Applications with Mobile S...G4H Webcast: Automated Security Analysis of Mobile Applications with Mobile S...
G4H Webcast: Automated Security Analysis of Mobile Applications with Mobile S...Ajin Abraham
 

Destaque (6)

Mobile security
Mobile securityMobile security
Mobile security
 
Mobile security
Mobile securityMobile security
Mobile security
 
2015 Mobile Security Trends: Are You Ready?
2015 Mobile Security Trends: Are You Ready?2015 Mobile Security Trends: Are You Ready?
2015 Mobile Security Trends: Are You Ready?
 
Symantec Mobile Security Whitepaper June 2011
Symantec Mobile Security Whitepaper June 2011Symantec Mobile Security Whitepaper June 2011
Symantec Mobile Security Whitepaper June 2011
 
G4H Webcast: Automated Security Analysis of Mobile Applications with Mobile S...
G4H Webcast: Automated Security Analysis of Mobile Applications with Mobile S...G4H Webcast: Automated Security Analysis of Mobile Applications with Mobile S...
G4H Webcast: Automated Security Analysis of Mobile Applications with Mobile S...
 
E commerce ppt
E commerce pptE commerce ppt
E commerce ppt
 

Semelhante a MOBILE PHONE SECURITY./ MOBILE SECURITY

Treads to mobile network
Treads to mobile networkTreads to mobile network
Treads to mobile networkRAVITEJA828
 
Cell Phone Viruses & Security
Cell Phone Viruses & SecurityCell Phone Viruses & Security
Cell Phone Viruses & Securityguestc03f28
 
Cell Phone Viruses & Security
Cell Phone Viruses & SecurityCell Phone Viruses & Security
Cell Phone Viruses & Securitymanish kumar
 
Mobile virus & worms
Mobile virus & wormsMobile virus & worms
Mobile virus & wormsSourav Verma
 
10940 img sytr12_mobile_malware
10940 img sytr12_mobile_malware10940 img sytr12_mobile_malware
10940 img sytr12_mobile_malwareSytelReplyUK
 
cell phone viruses and security
cell phone viruses and securitycell phone viruses and security
cell phone viruses and securityPRIYANKA944
 
cellphone virus and security
cellphone virus and securitycellphone virus and security
cellphone virus and securityAkhil Kumar
 
INFOGRAPHIC: Top Most Dangerous Malware Trends for 2014
INFOGRAPHIC: Top Most Dangerous Malware Trends for 2014INFOGRAPHIC: Top Most Dangerous Malware Trends for 2014
INFOGRAPHIC: Top Most Dangerous Malware Trends for 2014IBM Security
 
Report on Mobile security
Report  on Mobile securityReport  on Mobile security
Report on Mobile securityKavita Rastogi
 
Mobile security 8soft_final_summercamp2011
Mobile security 8soft_final_summercamp2011Mobile security 8soft_final_summercamp2011
Mobile security 8soft_final_summercamp2011Zarafa
 
cybersecurity essay.docx
cybersecurity essay.docxcybersecurity essay.docx
cybersecurity essay.docxssuser719d6b
 
Report of android hacking
Report of android hackingReport of android hacking
Report of android hackingdiv2345
 
PhD Thesis Writing Assistance - Manuscript
PhD Thesis Writing Assistance - ManuscriptPhD Thesis Writing Assistance - Manuscript
PhD Thesis Writing Assistance - Manuscriptkarishmakittu
 

Semelhante a MOBILE PHONE SECURITY./ MOBILE SECURITY (20)

Treads to mobile network
Treads to mobile networkTreads to mobile network
Treads to mobile network
 
Cell Phone Viruses & Security
Cell Phone Viruses & SecurityCell Phone Viruses & Security
Cell Phone Viruses & Security
 
Cell Phone Viruses & Security
Cell Phone Viruses & SecurityCell Phone Viruses & Security
Cell Phone Viruses & Security
 
Mobile virus & worms
Mobile virus & wormsMobile virus & worms
Mobile virus & worms
 
Cp3201 mobile security final
Cp3201 mobile security finalCp3201 mobile security final
Cp3201 mobile security final
 
10940 img sytr12_mobile_malware
10940 img sytr12_mobile_malware10940 img sytr12_mobile_malware
10940 img sytr12_mobile_malware
 
COMPUTER VIRUSES AND WORMS.pdf
COMPUTER VIRUSES AND WORMS.pdfCOMPUTER VIRUSES AND WORMS.pdf
COMPUTER VIRUSES AND WORMS.pdf
 
Mobile security
Mobile securityMobile security
Mobile security
 
cell phone viruses and security
cell phone viruses and securitycell phone viruses and security
cell phone viruses and security
 
M
MM
M
 
cellphone virus and security
cellphone virus and securitycellphone virus and security
cellphone virus and security
 
CS_UNIT 2(P3).pptx
CS_UNIT 2(P3).pptxCS_UNIT 2(P3).pptx
CS_UNIT 2(P3).pptx
 
INFOGRAPHIC: Top Most Dangerous Malware Trends for 2014
INFOGRAPHIC: Top Most Dangerous Malware Trends for 2014INFOGRAPHIC: Top Most Dangerous Malware Trends for 2014
INFOGRAPHIC: Top Most Dangerous Malware Trends for 2014
 
Report on Mobile security
Report  on Mobile securityReport  on Mobile security
Report on Mobile security
 
Smartphone
SmartphoneSmartphone
Smartphone
 
Rp threat-predictions-2013
Rp threat-predictions-2013Rp threat-predictions-2013
Rp threat-predictions-2013
 
Mobile security 8soft_final_summercamp2011
Mobile security 8soft_final_summercamp2011Mobile security 8soft_final_summercamp2011
Mobile security 8soft_final_summercamp2011
 
cybersecurity essay.docx
cybersecurity essay.docxcybersecurity essay.docx
cybersecurity essay.docx
 
Report of android hacking
Report of android hackingReport of android hacking
Report of android hacking
 
PhD Thesis Writing Assistance - Manuscript
PhD Thesis Writing Assistance - ManuscriptPhD Thesis Writing Assistance - Manuscript
PhD Thesis Writing Assistance - Manuscript
 

Mais de JASHU JASWANTH

TYPES OF TESTS ON CONCRETE
TYPES OF TESTS ON CONCRETETYPES OF TESTS ON CONCRETE
TYPES OF TESTS ON CONCRETEJASHU JASWANTH
 
Fiber Reinforced Concrete (FRC)
Fiber Reinforced Concrete (FRC)Fiber Reinforced Concrete (FRC)
Fiber Reinforced Concrete (FRC)JASHU JASWANTH
 
MAINTENANCE STRATEGIES & CASE STUDIES
MAINTENANCE STRATEGIES & CASE STUDIESMAINTENANCE STRATEGIES & CASE STUDIES
MAINTENANCE STRATEGIES & CASE STUDIESJASHU JASWANTH
 
Non-Destructive Testing (NDT)
Non-Destructive Testing (NDT)Non-Destructive Testing (NDT)
Non-Destructive Testing (NDT)JASHU JASWANTH
 
SHANGHAI TOWER - Shanghai, China
SHANGHAI TOWER - Shanghai, ChinaSHANGHAI TOWER - Shanghai, China
SHANGHAI TOWER - Shanghai, ChinaJASHU JASWANTH
 
Concept & Construction of PALM ISLAND
Concept & Construction of PALM ISLANDConcept & Construction of PALM ISLAND
Concept & Construction of PALM ISLANDJASHU JASWANTH
 
COMPUTER VISION SYNDROME( CVS ) with SOFTWARE LINK involved in it.
COMPUTER VISION SYNDROME( CVS ) with SOFTWARE LINK involved in it.COMPUTER VISION SYNDROME( CVS ) with SOFTWARE LINK involved in it.
COMPUTER VISION SYNDROME( CVS ) with SOFTWARE LINK involved in it.JASHU JASWANTH
 
The Empowerment of Women
The Empowerment of WomenThe Empowerment of Women
The Empowerment of WomenJASHU JASWANTH
 
DETAILS OF TOUGHENED GLASS OR TEMPER GLASS
DETAILS OF TOUGHENED GLASS OR TEMPER GLASSDETAILS OF TOUGHENED GLASS OR TEMPER GLASS
DETAILS OF TOUGHENED GLASS OR TEMPER GLASSJASHU JASWANTH
 
MULTIPLE CHOICE QUESTIONS for civil engineering students or may be for engine...
MULTIPLE CHOICE QUESTIONS for civil engineering students or may be for engine...MULTIPLE CHOICE QUESTIONS for civil engineering students or may be for engine...
MULTIPLE CHOICE QUESTIONS for civil engineering students or may be for engine...JASHU JASWANTH
 
FACE RECOGNITION TECHNOLOGY
FACE RECOGNITION TECHNOLOGYFACE RECOGNITION TECHNOLOGY
FACE RECOGNITION TECHNOLOGYJASHU JASWANTH
 
WIRELESS MOBILE CHARGING USING MICROWAVES
 WIRELESS MOBILE CHARGING USING MICROWAVES  WIRELESS MOBILE CHARGING USING MICROWAVES
WIRELESS MOBILE CHARGING USING MICROWAVES JASHU JASWANTH
 

Mais de JASHU JASWANTH (15)

TYPES OF TESTS ON CONCRETE
TYPES OF TESTS ON CONCRETETYPES OF TESTS ON CONCRETE
TYPES OF TESTS ON CONCRETE
 
Fiber Reinforced Concrete (FRC)
Fiber Reinforced Concrete (FRC)Fiber Reinforced Concrete (FRC)
Fiber Reinforced Concrete (FRC)
 
MAINTENANCE STRATEGIES & CASE STUDIES
MAINTENANCE STRATEGIES & CASE STUDIESMAINTENANCE STRATEGIES & CASE STUDIES
MAINTENANCE STRATEGIES & CASE STUDIES
 
Non-Destructive Testing (NDT)
Non-Destructive Testing (NDT)Non-Destructive Testing (NDT)
Non-Destructive Testing (NDT)
 
SHANGHAI TOWER - Shanghai, China
SHANGHAI TOWER - Shanghai, ChinaSHANGHAI TOWER - Shanghai, China
SHANGHAI TOWER - Shanghai, China
 
Concept & Construction of PALM ISLAND
Concept & Construction of PALM ISLANDConcept & Construction of PALM ISLAND
Concept & Construction of PALM ISLAND
 
COMPUTER VISION SYNDROME( CVS ) with SOFTWARE LINK involved in it.
COMPUTER VISION SYNDROME( CVS ) with SOFTWARE LINK involved in it.COMPUTER VISION SYNDROME( CVS ) with SOFTWARE LINK involved in it.
COMPUTER VISION SYNDROME( CVS ) with SOFTWARE LINK involved in it.
 
The Empowerment of Women
The Empowerment of WomenThe Empowerment of Women
The Empowerment of Women
 
UNITS & CONVERSIONS
UNITS & CONVERSIONSUNITS & CONVERSIONS
UNITS & CONVERSIONS
 
CYBER CRIME
CYBER CRIMECYBER CRIME
CYBER CRIME
 
HOW TO TEMPER GLASS ?
HOW TO TEMPER GLASS ?HOW TO TEMPER GLASS ?
HOW TO TEMPER GLASS ?
 
DETAILS OF TOUGHENED GLASS OR TEMPER GLASS
DETAILS OF TOUGHENED GLASS OR TEMPER GLASSDETAILS OF TOUGHENED GLASS OR TEMPER GLASS
DETAILS OF TOUGHENED GLASS OR TEMPER GLASS
 
MULTIPLE CHOICE QUESTIONS for civil engineering students or may be for engine...
MULTIPLE CHOICE QUESTIONS for civil engineering students or may be for engine...MULTIPLE CHOICE QUESTIONS for civil engineering students or may be for engine...
MULTIPLE CHOICE QUESTIONS for civil engineering students or may be for engine...
 
FACE RECOGNITION TECHNOLOGY
FACE RECOGNITION TECHNOLOGYFACE RECOGNITION TECHNOLOGY
FACE RECOGNITION TECHNOLOGY
 
WIRELESS MOBILE CHARGING USING MICROWAVES
 WIRELESS MOBILE CHARGING USING MICROWAVES  WIRELESS MOBILE CHARGING USING MICROWAVES
WIRELESS MOBILE CHARGING USING MICROWAVES
 

Último

Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptArduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptSAURABHKUMAR892774
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 
Research Methodology for Engineering pdf
Research Methodology for Engineering pdfResearch Methodology for Engineering pdf
Research Methodology for Engineering pdfCaalaaAbdulkerim
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)Dr SOUNDIRARAJ N
 
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor CatchersTechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catcherssdickerson1
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...asadnawaz62
 
Main Memory Management in Operating System
Main Memory Management in Operating SystemMain Memory Management in Operating System
Main Memory Management in Operating SystemRashmi Bhat
 
Indian Dairy Industry Present Status and.ppt
Indian Dairy Industry Present Status and.pptIndian Dairy Industry Present Status and.ppt
Indian Dairy Industry Present Status and.pptMadan Karki
 
Risk Management in Engineering Construction Project
Risk Management in Engineering Construction ProjectRisk Management in Engineering Construction Project
Risk Management in Engineering Construction ProjectErbil Polytechnic University
 
Ch10-Global Supply Chain - Cadena de Suministro.pdf
Ch10-Global Supply Chain - Cadena de Suministro.pdfCh10-Global Supply Chain - Cadena de Suministro.pdf
Ch10-Global Supply Chain - Cadena de Suministro.pdfChristianCDAM
 
home automation using Arduino by Aditya Prasad
home automation using Arduino by Aditya Prasadhome automation using Arduino by Aditya Prasad
home automation using Arduino by Aditya Prasadaditya806802
 
"Exploring the Essential Functions and Design Considerations of Spillways in ...
"Exploring the Essential Functions and Design Considerations of Spillways in ..."Exploring the Essential Functions and Design Considerations of Spillways in ...
"Exploring the Essential Functions and Design Considerations of Spillways in ...Erbil Polytechnic University
 
Katarzyna Lipka-Sidor - BIM School Course
Katarzyna Lipka-Sidor - BIM School CourseKatarzyna Lipka-Sidor - BIM School Course
Katarzyna Lipka-Sidor - BIM School Coursebim.edu.pl
 
Industrial Safety Unit-IV workplace health and safety.ppt
Industrial Safety Unit-IV workplace health and safety.pptIndustrial Safety Unit-IV workplace health and safety.ppt
Industrial Safety Unit-IV workplace health and safety.pptNarmatha D
 
Configuration of IoT devices - Systems managament
Configuration of IoT devices - Systems managamentConfiguration of IoT devices - Systems managament
Configuration of IoT devices - Systems managamentBharaniDharan195623
 
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTION
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTIONTHE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTION
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTIONjhunlian
 
Virtual memory management in Operating System
Virtual memory management in Operating SystemVirtual memory management in Operating System
Virtual memory management in Operating SystemRashmi Bhat
 
Internet of things -Arshdeep Bahga .pptx
Internet of things -Arshdeep Bahga .pptxInternet of things -Arshdeep Bahga .pptx
Internet of things -Arshdeep Bahga .pptxVelmuruganTECE
 
Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...
Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...
Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...Erbil Polytechnic University
 

Último (20)

Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptArduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.ppt
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 
Research Methodology for Engineering pdf
Research Methodology for Engineering pdfResearch Methodology for Engineering pdf
Research Methodology for Engineering pdf
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
 
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor CatchersTechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...
 
Main Memory Management in Operating System
Main Memory Management in Operating SystemMain Memory Management in Operating System
Main Memory Management in Operating System
 
Indian Dairy Industry Present Status and.ppt
Indian Dairy Industry Present Status and.pptIndian Dairy Industry Present Status and.ppt
Indian Dairy Industry Present Status and.ppt
 
Risk Management in Engineering Construction Project
Risk Management in Engineering Construction ProjectRisk Management in Engineering Construction Project
Risk Management in Engineering Construction Project
 
Ch10-Global Supply Chain - Cadena de Suministro.pdf
Ch10-Global Supply Chain - Cadena de Suministro.pdfCh10-Global Supply Chain - Cadena de Suministro.pdf
Ch10-Global Supply Chain - Cadena de Suministro.pdf
 
POWER SYSTEMS-1 Complete notes examples
POWER SYSTEMS-1 Complete notes  examplesPOWER SYSTEMS-1 Complete notes  examples
POWER SYSTEMS-1 Complete notes examples
 
home automation using Arduino by Aditya Prasad
home automation using Arduino by Aditya Prasadhome automation using Arduino by Aditya Prasad
home automation using Arduino by Aditya Prasad
 
"Exploring the Essential Functions and Design Considerations of Spillways in ...
"Exploring the Essential Functions and Design Considerations of Spillways in ..."Exploring the Essential Functions and Design Considerations of Spillways in ...
"Exploring the Essential Functions and Design Considerations of Spillways in ...
 
Katarzyna Lipka-Sidor - BIM School Course
Katarzyna Lipka-Sidor - BIM School CourseKatarzyna Lipka-Sidor - BIM School Course
Katarzyna Lipka-Sidor - BIM School Course
 
Industrial Safety Unit-IV workplace health and safety.ppt
Industrial Safety Unit-IV workplace health and safety.pptIndustrial Safety Unit-IV workplace health and safety.ppt
Industrial Safety Unit-IV workplace health and safety.ppt
 
Configuration of IoT devices - Systems managament
Configuration of IoT devices - Systems managamentConfiguration of IoT devices - Systems managament
Configuration of IoT devices - Systems managament
 
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTION
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTIONTHE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTION
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTION
 
Virtual memory management in Operating System
Virtual memory management in Operating SystemVirtual memory management in Operating System
Virtual memory management in Operating System
 
Internet of things -Arshdeep Bahga .pptx
Internet of things -Arshdeep Bahga .pptxInternet of things -Arshdeep Bahga .pptx
Internet of things -Arshdeep Bahga .pptx
 
Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...
Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...
Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...
 

MOBILE PHONE SECURITY./ MOBILE SECURITY

  • 1.
  • 2. CONTENTS  INTRODUCTION  SPREADING OF VIRUS  ANAMNESIS (CASE STUDIES)  CURRENT STATUS OF MOBILE MALWARE  PROTECTIVE MEASURES  THREATS OF MOBILE PHONE VIRUS  CONCLUSION
  • 3. INTRODUCTION Mobile security / Mobile phone security has become increasingly important in mobile computing. It is of particular concern as it relates to the security of personal and business information now stored on smart phones. Rapid advances in low-power computing, communications, and storage technologies continue to broaden the horizons of mobile devices, such as cell phones and personal digital assistants (PDAs).
  • 4. A cell-phone virus is basically the same thing as a computer virus. An unwanted executable file that "infects" a device and then copies itself to other devices. 1. A computer virus or worm spreads through e-mail attachments and Internet downloads. 2. A cell-phone virus or worm spreads via Internet downloads, MMS attachments and Bluetooth transfers. Current phone-to-phone viruses almost exclusively infect phones running the Symbian operating system. Standard operating systems and Bluetooth technology will enable cell phone viruses to spread either through SMS or by sending Bluetooth requests when cell phones are physically close enough.
  • 5. SPREADING OF VIRUS Phones that can only make and receive calls are not at risk. Only smart phones with a Bluetooth connection and data capabilities can receive a cell-phone virus. These viruses spread primarily in three ways: 1. Internet download - The user downloads an infected file to the phone by way of a PC or the phone's own Internet connection.
  • 6. 2. Bluetooth wireless connection - The user receives a virus via Bluetooth when the phone is in discoverable mode, meaning it can be seen by other Bluetooth-enabled phones. 3. Multimedia Messaging Service - The virus is an attachment to an MMS text message Mobiles enabled with GPS facility can cause much large scale of virus infection spread.
  • 7. ANAMNESIS (CASE STUDIES) 1. CABIR The first known cell-phone virus, Cabir, is entirely innocuous (not harmful). All it does is sit in the phone and try to spread itself. 2. COMWAR The second worm for mobile devices detected in the wild was COMWAR . This is the first worm for mobiles phones which is able to propagate via MMS. 3. CARDTRAP Card Trap is the first known mobile malware that attempts a cross-platform infection by jumping from an infected phone to a target computer
  • 8. 4. DUTS DUTS is a parasitic file infector virus. It is the first known virus for the PocketPC platform. DUTS affects ARM-based devices only 5. SKULLS A Trojan horse piece of code. Once downloaded, the virus, called Skulls, replaces all phone desktop icons with images of a skull. 6. LASCO It is based on the same source code which is now freely available on the net. LASCO.A is very similar to CABIR.H.
  • 9. CURRENT STATUS OF MOBILE MALWARE The first half of 2008 was interesting from a mobile malware point of view. It's worth stressing the following points: 1. An increase in the number of malicious programs with Trojan-SMS behavior. 2. The cross-platform nature of mobile Trojans - Any mobile phone which supports Java applications or has a Python interpreter is under threat.
  • 10. 3. The increase in the number of WAP sites where such Trojan programs are placed. 4. The appearance of ICQ spam which advertises WAP sites and the malicious programs located on these sites. 5. The variety of social engineering methods used to spread and disguise malicious programs. 6. The identification of short numbers to which short messages are secretly sent.
  • 11. THEORETICAL DEVELOPMENTS 1. Symbian Mobiles Symbian malware has reached the stage where it is being developed for profit. we saw the first Trojan-spy for Symbian in April. Flexispy was being sold by its creator for 50 USD. The Trojan established full control over smart phones.
  • 12. 2. Windows Mobile Windows Mobile, currently the second most popular platform for smart phones, also attracted the attention of malware writers. This sounds more serious than it actually is given that there were only two examples of malware for Windows Mobile – DUTS and BRADOR.
  • 13. CROSS - PLATFORM MALWARE The CXOVER virus, is the first example of a cross- platform virus for mobile devices. CXOVER begins by checking which operating system is working on the infected device. Once the virus is on a mobile device it attempts to copy itself onto accessible PCs. In addition, it deletes user files on infected devices. The LETUM worm, which was detected in April, continued the cross platform trend. LETUM is a typical email worm in that it spreads as an infected attachment and sends copies of itself to all the addresses in the local address book.
  • 14. Protection against viruses can be implemented in two phase. 1. Network level security – It makes use of the proactive approach . 2. System level security – It employs MOSES (Mobile security processing system). PROTECTIVE MEASURES
  • 15. 1. PROACTIVE APPROACH The exponential growth of messaging in both home and enterprise environments has made it a potent vector for the spread of malicious code. The problem is compounded further by the increasing convergence of various messaging platforms. For example, users can now send IM messages from mobile phones and SMS messages to mobile phones via SMS gateways on the Internet. In this section, we explain the basic rate-limiting and quarantine mechanisms that serve as the building blocks of our proactive response framework.
  • 16.  QUARANTINE In contrast with Rate-limiting, Quarantine-based systems prevent a suspicious or infected client from sending or receiving messages. This can be implemented at the messaging server so that any connection attempt by the user on an infected client is refused.  RATE - LIMITING The Rate-limiting (also known as “virus throttling”) is a general class of response techniques that seek to limit the spread of a worm or virus once it is detected on a host.
  • 17. 2. MOBILE SECURITY PROCESSING SYSTEM (MOSES) Mobile Security Processing System is a programmable security processor platform, to enable secure data and multi-media communications in next-generation wireless handsets.  SW Architecture The software architecture for MOSES was designed using a layered philosophy, much like the layering used in the design of network protocols. At the top level, the SW architecture provides a generic interface (API) using which security protocols and applications can be ported to the platform.  HW Platform Architecture The hardware platform is based on the Xtensa configurable and extensible processor from Tensilica, Inc.
  • 18. Virus might access and/or delete all of the contact information and calendar entries in your phone. It might send an infected MMS message to every number in your phone book. The top three areas of concern for mobile users are receiving inappropriate content, fraudulent increases in phone bills and loss of important information stored on the handset. THREATS OF MOBILE PHONE VIRUS
  • 19. CONCLUSION The best way to protect yourself from cell-phone viruses is the same way you protect yourself from computer viruses: Never open anything if you don't know what it is? Here are some steps you can take to decrease your chances of installing a virus:  Turn off Bluetooth discoverable mode. Set your phone to "hidden" so other phones can't detect it and send it the virus.  Check security updates to learn about file names you should keep an eye out for.  Security sites with detailed virus information include: F-Secure, McAfee & Symantec
  • 20.  Install some type of security software on your phone. The software may simply detect and then remove the virus once it's received and installed, or it may protect your phone from getting certain viruses in the first place. Future possibilities include viruses that bug phones -- so someone can see every number you call and listen to your conversations -- and viruses that steal financial information. Ultimately, more connectivity means more exposure to viruses and faster spreading of infection. As smart phones become more common and more complex, so will the viruses that target them. Beware of that
  • 21. Plan B BullGuard Trend Micro Examples for security software are as fallows: Trust Port Quick Heal kaspersky NQ Avast 360 Avira AVG CM & many more …
  • 22. For any mistakes and suggestion’s feel free to text here idamakanti.jaswanth@gmail.com

Notas do Editor

  1. & many more …