2013 05-21 --ncc_group_-_mobile security_-_the_impending_apocalypse…_or_maybe_not

25
Mobile Security – The impending apocalypse… or maybe not ISF Summer Chapter

description

 

Transcript of 2013 05-21 --ncc_group_-_mobile security_-_the_impending_apocalypse…_or_maybe_not

Page 1: 2013 05-21 --ncc_group_-_mobile security_-_the_impending_apocalypse…_or_maybe_not

Mobile Security – The impending apocalypse… or maybe not ISF Summer Chapter

Page 2: 2013 05-21 --ncc_group_-_mobile security_-_the_impending_apocalypse…_or_maybe_not

Before we begin…

Hopefully not a lesson in sucking eggs

Page 3: 2013 05-21 --ncc_group_-_mobile security_-_the_impending_apocalypse…_or_maybe_not

Agenda

•What the press would have you believe

•The reality

Page 4: 2013 05-21 --ncc_group_-_mobile security_-_the_impending_apocalypse…_or_maybe_not

Before we begin… Who is this guy?

• Information Cyber Security for > 15 years • Consultancy – 1997 – 2005 • Research – 2005 – 2011

• Symantec / BlackBerry • Research / Consultancy – 2012

• Recx / NCC Group

Page 5: 2013 05-21 --ncc_group_-_mobile security_-_the_impending_apocalypse…_or_maybe_not

What you are led to believe

•Mobile is as insecure the desktop •BYOD is insecure •Malware is rampant •Mobile security needs augmenting

Page 6: 2013 05-21 --ncc_group_-_mobile security_-_the_impending_apocalypse…_or_maybe_not

Motivations

• .… something to sell

•…. exposure

Page 7: 2013 05-21 --ncc_group_-_mobile security_-_the_impending_apocalypse…_or_maybe_not
Page 8: 2013 05-21 --ncc_group_-_mobile security_-_the_impending_apocalypse…_or_maybe_not

Mobile is as insecure as the desktop

• Incentivised •Defence in depth •App stores •Ubiquitous sandboxes •Security policy APIs •Vendors adopting SDLs

Page 9: 2013 05-21 --ncc_group_-_mobile security_-_the_impending_apocalypse…_or_maybe_not

BYOD is insecure

•BYOD is CHALLENGING

•Extending your security perimeter •Loosening your control (potentially) •Mixed domain devices •Policies

Page 10: 2013 05-21 --ncc_group_-_mobile security_-_the_impending_apocalypse…_or_maybe_not

Malware is rampant

•Malware is present NOT rampant

•Trojans (re-packaged apps) •Trojans (unique appealing apps)

•App store revocation •People using third party app stores

Page 11: 2013 05-21 --ncc_group_-_mobile security_-_the_impending_apocalypse…_or_maybe_not

Malware is rampant

Page 12: 2013 05-21 --ncc_group_-_mobile security_-_the_impending_apocalypse…_or_maybe_not

Mobile security needs augmenting

•Platforms have rich security stories •Samsung KNOX •BlackBerry Balance •MDM APIs / Policies ..

•Some augmentation may be needed

•on iOS •On device AV is not one of them

Page 13: 2013 05-21 --ncc_group_-_mobile security_-_the_impending_apocalypse…_or_maybe_not

But it is no utopia

Page 14: 2013 05-21 --ncc_group_-_mobile security_-_the_impending_apocalypse…_or_maybe_not

SDLs cost

•Vendors don’t have • limitless funds • limitless people • limitless time

•Market driven by features •not secure code

•Skills in short demand •Not evenly deployed

Page 15: 2013 05-21 --ncc_group_-_mobile security_-_the_impending_apocalypse…_or_maybe_not

Vulnerability v patching frequency

•No monthly patch Tuesday •Carrier certification

•desire • capacity

•Vendors •desire • capacity

Page 16: 2013 05-21 --ncc_group_-_mobile security_-_the_impending_apocalypse…_or_maybe_not

Vulnerability v patching frequency

•Handset cycle 12 to 36 months •HTC 10 Android models •ZTE 18 Android models •Samsung 12 Android models •Apple 1 iPhone model •BlackBerry 3 BB10 models

•Sustainment costs huge..

Page 17: 2013 05-21 --ncc_group_-_mobile security_-_the_impending_apocalypse…_or_maybe_not

Vulnerabilities can be exploited

Page 18: 2013 05-21 --ncc_group_-_mobile security_-_the_impending_apocalypse…_or_maybe_not

But… criminals are lazy …

Page 19: 2013 05-21 --ncc_group_-_mobile security_-_the_impending_apocalypse…_or_maybe_not

But… there are motivated enablers..

Page 20: 2013 05-21 --ncc_group_-_mobile security_-_the_impending_apocalypse…_or_maybe_not

Devices are complex

•Peripherals •Radio •OS •Apps = a large and complex attack surface

Page 21: 2013 05-21 --ncc_group_-_mobile security_-_the_impending_apocalypse…_or_maybe_not

Rapid change

Page 22: 2013 05-21 --ncc_group_-_mobile security_-_the_impending_apocalypse…_or_maybe_not

Use cases are different

•Physical interaction •Usage patterns

Page 23: 2013 05-21 --ncc_group_-_mobile security_-_the_impending_apocalypse…_or_maybe_not

Mobile security – the future

Page 24: 2013 05-21 --ncc_group_-_mobile security_-_the_impending_apocalypse…_or_maybe_not

Thanks? Questions?

Page 25: 2013 05-21 --ncc_group_-_mobile security_-_the_impending_apocalypse…_or_maybe_not

UK Offices Manchester - Head Office

Cheltenham

Edinburgh

Leatherhead

London

Thame

North American Offices San Francisco

Atlanta

New York

Seattle

Australian Offices Sydney

European Offices Amsterdam - Netherlands

Munich – Germany

Zurich - Switzerland

Ollie Whitehouse [email protected]