Mobile Operating Systems & Security 1. Mobile security: iOS vs. Android vs. BlackBerry vs....

download Mobile Operating Systems & Security 1. Mobile security: iOS vs. Android vs. BlackBerry vs. Windows Phone

of 52

  • date post

  • Category


  • view

  • download


Embed Size (px)

Transcript of Mobile Operating Systems & Security 1. Mobile security: iOS vs. Android vs. BlackBerry vs....

  • Mobile Operating Systems & Security

  • How can I protect myself?

  • Operating Systems Android



  • What do they do? ● operate smartphones, tablets, watches and

    other mobile devices ● includes

    ○ touchscreens ○ cellular or wireless ○ GPS ○ Camera & Video ○ Speech Recognition ○ Audio Player ○ Bluetooth ○ and more

  • Android Operating System

    ● developed by Google ● free and open source ● developed by multiple


  • Popular Android Devices ● Phones

    ○ Motorola Droid Turbo ○ Motorola Moto X ○ Samsung Galaxy S6 ○ Samsung Galaxy Note 4 ○ Google 6 Nexus

    ● Tablets ○ Nvidia Shield ○ Google Nexus 9 ○ Samsung Galaxy 5

  • Apple Operating System ● developed by Apple ● closed source ● all iOS devices are

    developed by Apple

  • Popular iOS Devices ● Tablets

    ○ iPad Air 2 ○ iPad Mini 3

    ● Phones ○ iPhone 6

    ● Music & Video ○ iPod touch ○ iPod shuffle & nano ○ Apple TV

  • Windows Operating System

    ● developed by Microsoft

    ● closed and shared source

    ● sold across different vendors

  • Popular Windows Devices ● Phones

    ○ HTC One M8 ○ Nokia Lumina 830 ○ Nokia Lumina1520

    ● Tablets ○ Asus Transformer ○ Dell Venue 11 ○ Microsoft Surface

    Pro 3

  • Transformation

    Mobile devices have transformed our daily lives

    We’ve quickly learned their good features

    We’re slower at learning their threats

  • While we may be bad at actually protecting our desktop PC’s, we at least acknowledge the existence of viruses and other malware

  • We know that the main threats are malware from the Web and mechanical failure such as a hard drive crash

  • We know that we should back our data up and use a good set of anti-malware tools

    We don’t always do it, but we know it

  • We also know that we don’t need to worry too much about our desktop computer being stolen.

    Or that we’ll accidentally leave it behind at Starbucks

  • Our “phones” are at risk for all of the threats our desktop PC’s face

    And they pose a greater risk to us, exactly because they are portable

    But we tend not to be “proactive” about that

    As a species we are a little slow on the uptake sometimes

  • Consumer Reports Survey “Almost 40 percent in our survey didn’t take even minimal security measures, such as: ● using a screen lock, ● backing up data, or ● installing an app to locate a missing phone

    or ● remotely erase data from it.”

  • Raise your hand Let’s do a quick survey right now.

    Enter “Yes” in the chat box right now, if you already have a passcode lock or something similar on your mobile device

  • Let’s start with some ideas that relate to any mobile device: iPhone, Android, Windows phone, or tablet.

    {Your screenshots may vary!}

  • Security Basics Enable “Passcode Lock”

    Enable “Find my phone”

    Enable “Erase my phone”

    Utilize security apps carefully

    An App can be a Trap

    Regularly update your device’s OS

  • Security Basics Exactly how you do each of these things will vary from device to device and from OS to OS within a device family

    So…. RTFM: Read The Friendly Manual

  • Apple Devices Let’s start with the Apple family of devices

    Most of the important security steps for your iPhone or iPad are built in

  • Passcode Lock If you do nothing else, do this!! If you lose or mislay your device, this will prevent a thief or curious finder from getting at your stuff. And even if it does not keep them out forever, it buys you time to use the other security measures.

  • iPad Settings - Passcode Find it in Settings; Read the instructions

  • iPhone

    Enable Passcode Lock on Your iPhone or iPad

  • iPhone Fingerprint

    Your Apple device may allow a fingerprint or some other form of genetic ID

    Try it, and see whether it works for you

    If it does, use it

  • Find my iPhone

    Whether your missing phone is tied to a chair in a warehouse or just under the driver’s seat in your car, you’ll want to find it before you take any further steps

  • Find my iPhone

    If your iPhone or iPad is missing, you’ll have to use another device to locate it

    Precisely how you do that depends on what other devices you own

    When you run the locator from your other device, you’ll get a display something like the one on the next slide

  • Find my iPhone

  • Lost Mode & Remote Wipe

  • Android Devices Android devices don’t have as much security “baked in” as Apple devices

    But they do offer some nice security options

    And there are some good apps to increase the security

    We’ll start with the phone itself

  • Android Unlock Code

    This is the equivalent of the iPhone four digit passcode.

    You set it up in Settings

  • Android Settings--Location & Security

    Here’s one screen image

    {Again, your own device may look different}

  • Unlock Pattern I chose a Pattern as the “lock” for my Android phone

    The example shows a letter, but don’t use that!

    Any guesses as to why not?

    You also have the option of a Password rather than a four digit PIN or a Pattern

  • Find my Android Device As with an iPhone, you also want the ability to find and

    --if necessary--

    erase your missing Android phone or tablet

    You’ll need an App for that

  • Lookout - Free Version ►SECURITY & ANTIVIRUS

    • App Scanning: Continuous, over-the-air protection from viruses, malware, adware and spyware


    • Locate & Scream: Map the location of your device and make it sound an alarm - even when it is on silent!

    • Signal Flare: Automatically save your phone's location when the battery is low


    • Contact Backup: Save a copy of your Google contacts

    • Download your contacts to your computer so you can transfer them to an existing phone or tablet.

  • Lookout - Premium Version ►Theft Alerts: Get an email with a photo & location when someone messes with your device.

    (Also known as a "Theftie")

    ►Safe Browsing: Block dangerous URLs ►Privacy Advisor: See what personal information can be accessed by your apps

    ►Lock & Wipe: Remotely lock your device, post a custom message and erase your data

    ►Other premium features: photo & call history backup, Premium tech support

    Premium Cost: $29.99/year or $2.99/month

  • Where’sMyDroid? Free/Basic Version Find phone by making it ring or vibrate

    Find phone (on App web site) using GPS

    GPS flare - Location alert on low battery

    Passcode Protection for lock out

    Notification of changed SIM card or phone #

  • Where’sMyDroid? Premium Version Take pictures with remote camera

    Remotely wipe SD card and phone data

    Prevent App from being uninstalled

    Hide the App icon

    Use a land line to activate the App

    Customizable “lost” ringtone

  • The best App for you?? Go to Google Play and look the available Apps over

    Pick a few that you really like

    Check the Web for reviews

    Then decide

  • Apps Security An app can be a trap -- a backdoor into your device

    Review apps before you install them

  • Microsoft Phone As with Apple and Android devices, it is smart to: ● require an unlock code, ● use a phone finder, ● activate the data erasure feature in settings

    or in the security App you’ve chosen

    Microsoft also recommends that you purchase and install Malware protection

  • Find My Windows Phone The MS Web site says: “Use the free Find My Phone service Whether your phone is lodged between couch cushions or left in a taxi, misplacing it is a drag. But setting up Find My Phone can help.

    From your browser, you can ring your phone, find it on a map, lock it, or even erase it.

  • You can also send your contact info (or another brief message) to show on the lock screen, just in case some kind soul has found it.

    This "set it and forget it" step is great for your peace of mind.”

  • Windows Device Malware

  • Summary Now that your phone has your personal data, your contact information, your financial data, tons of other private files,

    (and those pictures of you hot tubbing with Ryan Gosling,)

    you really should make sure that only you have access to it

  • Summary Start