Mobile Device Security and Privacy Information Security and Privacy - - PowerPoint PPT Presentation

mobile device security
SMART_READER_LITE
LIVE PREVIEW

Mobile Device Security and Privacy Information Security and Privacy - - PowerPoint PPT Presentation

Mobile Device Security and Privacy Information Security and Privacy Office January 2012 Agenda Protecting mobile devices and your privacy Protecting Mobile Devices and Your Privacy Before We Start The City of Phoenix does not


slide-1
SLIDE 1

Mobile Device Security and Privacy

Information Security and Privacy Office January 2012

slide-2
SLIDE 2

Agenda

  • Protecting mobile devices and your

privacy

slide-3
SLIDE 3

Protecting Mobile Devices and Your Privacy

slide-4
SLIDE 4

Before We Start…

The City of Phoenix does not endorse, recommend, or vilify any specific vendors, products, apps, or services.

slide-5
SLIDE 5

Goal: Convince You To…

  • 1. Keep your device with you – don’t

leave it unattended

  • 2. Protect your device with a strong

password

  • 3. Use anti-malware software
  • 4. Read those (often boring) privacy

policies

  • 5. Don’t download or keep apps that

request more permissions than needed

slide-6
SLIDE 6

Do You Have a Smartphone?

slide-7
SLIDE 7

Pop Quiz

  • How many smartphone users are there in

the U.S.?

– As of September 2011

  • 87.4 million
  • 33.7 million
  • 946,800 thousand
slide-8
SLIDE 8

Pop Quiz

  • How many smartphone users are there in

the U.S.?

– As of 9/2011

  • 87.4 million
  • 33.7 million
  • 946,800 thousand
slide-9
SLIDE 9

Pop Quiz

  • In the U.S. 113 mobile phones are lost

every …

  • Day
  • Hour
  • Minute
slide-10
SLIDE 10

Pop Quiz

  • In the U.S. 113 mobile phones are lost

every …

  • Day
  • Hour
  • Minute
slide-11
SLIDE 11

Top 10 U.S. Cities for Cell Phone Loss or Theft

slide-12
SLIDE 12

Do You Access or Do Banking?

slide-13
SLIDE 13

Using Your Smartphone

  • 44% use a browser to access the Internet

– 32.5 million Americans accessed banking

  • Vendors, retailers, merchants, content providers,

mobile operators, and banks are all actively establishing new payment services

– The value of mobile payment transactions is projected to reach almost $630 billion by 2014, up from $170 billion in 2010

slide-14
SLIDE 14

Password-Protect Your Device

  • 24% store computer or banking passwords on

their mobile devices

  • More than half of smartphone users do not use

any password protection to prevent unauthorized access to their device

  • What’s the risk?
slide-15
SLIDE 15

No Password What’s the Harm?

  • Access personal email and work email
  • Access your financial accounts,

like banks, Mint.com, or PayPal

  • Access your data in Google

Docs, Evernote, or Dropbox

  • Post embarrassing updates to

Facebook and Twitter

  • So use a strong password

– Require the password after minimum period of inactivity

slide-16
SLIDE 16

When Purchasing a Mobile Device

  • Ask about security features and functions

– Can you add a strong password, how are patches deployed… – What apps are pre-loaded, are apps vetted

  • Pre-loaded apps generally have more permissions than ones you

install

– What software protections can you can install after purchasing

  • Do you really need all the bells and whistles
  • Research the device

– What maintenance is needed, is it a hacker target or thief magnet, how do you secure it – Read reviews – are most consumers satisfied

slide-17
SLIDE 17

Smartphone Malware What’s the Harm?

  • Force the infected phone call a given phone number

– Remember 900 numbers?

  • Send premium rate text

messages

  • Automatically visit websites

that the malware directs it to

– Earns money for malware writer

  • Steal personal information
  • Be alert for unusual behaviors on

your phone, which could be a sign that it is infected

– Unusual text messages, strange charges to the phone bill, and suddenly decreased battery life

slide-18
SLIDE 18

What’s the Best Anti-Malware Software?

  • Read app reviews
  • Check reliable consumer

publications

  • Check industry publications
  • Look for names you trust
  • The City of Phoenix does not endorse, recommend, or vilify any specific

vendors, products, apps, or services.

slide-19
SLIDE 19

Keep a Clean Machine

  • Keep your mobile security software current
  • Automate software updates

– Many software programs will automatically connect and update to defend against known risks – Example: Sync regularly with iTunes – don’t just charge the battery

slide-20
SLIDE 20

Prepare for the Unthinkable

  • Consider using a “find my device” to locate your

device if lost or stolen

  • Enable remote wipe capability
slide-21
SLIDE 21

Mobile Device Privacy

slide-22
SLIDE 22

Do You Read App Privacy Policies / Permissions?

slide-23
SLIDE 23

Using Your Smartphone

  • 26% of smartphone owners say they always

read the privacy policy when downloading apps

– I’m not sure I believe that

  • 31% say they never read the policy
slide-24
SLIDE 24

Example – Game

  • New!

4 ½ Stars! Reputable Developer!

slide-25
SLIDE 25

Example – Game

slide-26
SLIDE 26

Why Do Apps Need “Read Phone State and Identity” Permission?

  • Phone State

– Lets the app tell whether you’re on a call or if the phone’s ringing – Allows games, media players, podcasts to pause while you’re on a call

  • Phone Identity

– Developer may need a way to assign a unique ID to you for registration/activation purposes – Many ad publishers use this permission to get the Phone ID for tracking purposes

  • App may not know who you are exactly, but tracking your usage over time

allows a company to build a profile of your individual activity

slide-27
SLIDE 27

True or False

  • A basic Android application has no

permissions associated with it

– This means the app cannot do anything that would adversely impact the user experience

  • r any data on the device
slide-28
SLIDE 28

True!

  • App developer must specifically state the

permissions he wants the app to have

slide-29
SLIDE 29

Flashlight App

slide-30
SLIDE 30

Compare – Flashlight App

  • Free!

5 Stars! Lots of installs!

slide-31
SLIDE 31

Example – Flashlight App

slide-32
SLIDE 32

Example – Flashlight App

slide-33
SLIDE 33

True or False

  • Most free app developers rely on

advertising to fund their businesses

slide-34
SLIDE 34

True!

  • Most free app developers rely on advertising to

fund their businesses

slide-35
SLIDE 35

Why the App’s Free

  • Free and cheap apps are usually supported by ads

– Marketers want to know user demographics to better target ads

  • The advertising company pays the app developer and

supplies a library (of code/programs) that the developer links to within the application

– The app developer might not really even be aware of what the ad libraries do

  • The ad library “piggybacks” on the app’s permissions
  • So, for example, if the app can read your contact list, the

advertiser (through the library) can read your contact list

slide-36
SLIDE 36

“Read Phone State and Identity” Trade-off

  • Some advertising systems, like AdMob, require

developers to use this permission so the advertiser can collect statistics

  • This means:
  • Both the advertiser and the app publisher can track your

usage of the app, and your usage across multiple apps if they collect all that data centrally (which advertisers definitely do)

slide-37
SLIDE 37

I Know You

  • Sign up for something and give your email address or

Facebook login

– Ties all of the profile information to a real individual

  • I know where you live, work, and shop

– Because of your GPS info

  • I know what you like

– Because of Facebook and your shopping profile

  • I know your friends and family

– Because of Facebook and device contacts and messaging

slide-38
SLIDE 38

Before Downloading that App

  • Be especially wary of typically-suspicious apps

(like ringtone apps) that use unneeded permissions

  • Only install apps with

potentially harmful permissions from developers you trust

  • Check the app’s marketplace rating to determine

safety

– Not a perfect indicator (like with Flashlight)

slide-39
SLIDE 39

Look For Apps That Tell You How It’s Using Permissions

slide-40
SLIDE 40

Does the App Want Passwords?

  • Think twice before giving an app

passwords

– Example: Some apps ask for passwords to popular services, like GoogleDocs and Dropbox to upload and store things

slide-41
SLIDE 41

App Stores

  • Apple reviews all apps in its store and tries to

verify…

– Does the app do what it says it does? Does it function reliably? And does it respect the limitations that Apple has put on developers? – This process does weed out some security threats, like apps that carry malware – Does not eliminate all risks to your privacy

  • Android apps are not vetted

– Android market is considered the “wild, wild west”

slide-42
SLIDE 42

Example: Movie Trivia Game

Uses internet connection to see what the rest of the world has answered to current question

slide-43
SLIDE 43

Example: Whole Foods App

slide-44
SLIDE 44

iOS Location Services

  • Tell if an iOS app is using location services
  • Look for the arrow next to the battery

indicator

slide-45
SLIDE 45

eBook Reader Privacy

  • Electronic Frontier Foundation researched

and published a guide to eReader privacy

– https://www.eff.org/deeplinks/2010/12/2010-e- book-buyers-guide-e-book-privacy

slide-46
SLIDE 46

Quiz: Would you use this IM service?

From an instant messaging site

slide-47
SLIDE 47

Are You Convinced To…

  • 1. Keep your device with you – don’t

leave it unattended

  • 2. Protect your device with a strong

password

  • 3. Use anti-malware software
  • 4. Read those (often boring) privacy

policies

  • 5. Don’t download or keep apps that

request more permissions than needed

slide-48
SLIDE 48

Questions? Contact ispo@phoenix.gov

slide-49
SLIDE 49

More Cowbell

(Supplemental Info)

slide-50
SLIDE 50

What’s Wrong With This Picture?

slide-51
SLIDE 51

QR Codes

  • Quick Response codes are popping up

everywhere

– Magazine ads, newsletters, real estate signs, newspaper ads, trade show booths

  • A QR code is basically a 2D barcode that can be

read by smart phone users

– An easy way to direct a user to a website – just scan the QR code

  • Could be a link to a malicious website
slide-52
SLIDE 52

Malicious QR Codes are Coming

  • QR codes will come in email messages
  • QR codes will be physically distributed around

– Flyers in a parking lot – Malicious stickers pasted over different legitimate ads

  • Only use QR code reader software that allows

you to confirm the action to be taken, such as visit a website link

  • If you do not know and trust the link, cancel the

action