Cell Phone Security

19
Cell Phone Security By Paul Capers

description

By Paul Capers. Cell Phone Security. What is a Cell Phone?. A cell phone is a portable telephone that does not use a wired connection. It connects to a wireless carrier network using radio waves - PowerPoint PPT Presentation

Transcript of Cell Phone Security

Page 1: Cell Phone Security

Cell Phone Security

By Paul Capers

Page 2: Cell Phone Security

What is a Cell Phone?

A cell phone is a portable telephone that does not use a wired connection. It connects to a wireless carrier network using radio waves

The ability to communicate over cellular networks distinguishes it self from other types of handheld devices.

Page 3: Cell Phone Security

Cellular Communications

Cell Phones communicate through the air by radio waves with a base station

Cellular networks provide coverage based on dividing a large geographical service area into smaller areas of coverage called cells.

Cells play an important role in reuse of radio frequencies in the limited radio spectrum available to allow more calls to occur than otherwise would be possible.

Page 4: Cell Phone Security

Importance of a Cell Phone The importance of having a cell

phone in this day in age is valuable to our lives. It has become a necessity for many people in today’s society.  Giving the ability to keep in touch with family, business associates, and having the capability of sending email are only a few of the reasons for the ever-increasing importance of cell phones.

Page 5: Cell Phone Security

Cell Phone Capabilities

Text messaging GPS Music Sound &Video

recording Sending /Receiving

Pictures Microsoft office

applications Camera/camcorder

Games Bluetooth Wi-Fi connectivity Instant messaging Surfing the web E-mail and a range of

other things of that sort.

Page 6: Cell Phone Security

Security a MUST have!!

Even though a cell phone presents great features and capabilities, these phones need security.

Cell phones is nothing less than a simplified computer

Page 7: Cell Phone Security

Security a Must have!!

Personal/ Business Use Prevent others from listening to your

private conversations Protect sensitive financial information Protect Emails/Calender/address book Prevent fraudulent billing

Page 8: Cell Phone Security

Cell Phone Viruses

The first known cell-phone virus appeared in 2004 called Cabir.A—it affected only a small number of Bluetooth-enabled phones.

Common Viruses today Cabir.A Skulls.A

Commwarrior.A Locknut.B Fontal.A

Page 9: Cell Phone Security

Viruses

Results From a Virus It will spread throughout the phone. Access and/or delete contact information

and calendar entries Send an infected SMS/MMS messages to

every number in your phone book Send costly messages/calls Kill your batteryThe Point is, cell phone viruses are here

and will only grow in popularity

Page 10: Cell Phone Security

Cell Phone Vulnerabilities

Stolen/Lost VoIp

Bluetooth Eavesdropping

Page 11: Cell Phone Security

Stolen/Lost Cell Phones are small. One of the reasons

why they are so popular. On the other hand, small things have a way of getting lost or stolen.

HOW MANY PEOPLE LOST THERE PHONE BEFORE?

It is highly recommended that you lock your phone with a password. The finder of the phone may have your device, but at least they won’t have your personal information or be able to use your device.

Page 12: Cell Phone Security

VoIP

Voice over IP is a growing occurrence, as are its security problems. With a little time and a solid understanding of a VoIP system, it can be easy to target phone systems and trick them into passing fake information. This could be as simple as changing the caller ID number listed with the phone call, or as dangerous as being able to bypass security checks and accessing a mobile phone users account

Page 13: Cell Phone Security

Bluetooth Bluetooth is a wireless technology that allows

local devices to generate a small network through which information can be passed. This information usually consists of addresses and small files. Bluetooth settings must be correctly applied. If the settings are not applied correctly, an attacker can gain access to your call history, address book, calendar entries, and much more.

To avoid such problems you should simply disable your bluetooth when not in use.

Page 14: Cell Phone Security

Eavesdropping

At one point in time eavesdropping was a big problem for analog phone users. Due to the fact that FM radio signals were easily monitored using scanners.

The majority of cell phones today are digital.

Therefore they are less vulnerable to eavesdropping.

Page 15: Cell Phone Security

Celebrity Victims

Paris Hilton: hackers gained access to her sidekick and downloaded all of her stored video, text and data files and posted her address book on the Internet.

Page 16: Cell Phone Security

Celebrity Victims President Barack Obama

Cyber terrorist Kasper Hauser has accessed President Barack Obama's encrypted Blackberry messages

Obama's Blackberry contained sensitive messages from the Commander in Chief to Vice President Joe Biden, Secretary of State Hillary Clinton, California Governor Arnold Schwarzenegger - even Nuclear Command Control itself.

Page 17: Cell Phone Security

Celebrity Victims

kardashinavideo.html

Page 18: Cell Phone Security

Protecting Your Phone Turn off Bluetooth discoverable mode Check Security Updates Use a mobile anti-virus program

NetQuin(Droid) LookOut Mobile Security(Droid) F-Secure McAfee SymantecLock Phone with passwordHave a voicemail passwordFrequently change your password

Page 19: Cell Phone Security

The End