mobile device security
play

Mobile Device Security and Privacy Information Security and Privacy - PowerPoint PPT Presentation

Mobile Device Security and Privacy Information Security and Privacy Office January 2012 Agenda Protecting mobile devices and your privacy Protecting Mobile Devices and Your Privacy Before We Start The City of Phoenix does not


  1. Mobile Device Security and Privacy Information Security and Privacy Office January 2012

  2. Agenda • Protecting mobile devices and your privacy

  3. Protecting Mobile Devices and Your Privacy

  4. Before We Start… The City of Phoenix does not endorse, recommend, or vilify any specific vendors, products, apps, or services.

  5. Goal: Convince You To… 1. Keep your device with you – don’t leave it unattended 2. Protect your device with a strong password 3. Use anti-malware software 4. Read those (often boring) privacy policies 5. Don’t download or keep apps that request more permissions than needed

  6. Do You Have a Smartphone?

  7. Pop Quiz • How many smartphone users are there in the U.S.? – As of September 2011 • 87.4 million • 33.7 million • 946,800 thousand

  8. Pop Quiz • How many smartphone users are there in the U.S.? – As of 9/2011 • 87.4 million • 33.7 million • 946,800 thousand

  9. Pop Quiz • In the U.S. 113 mobile phones are lost every … • Day • Hour • Minute

  10. Pop Quiz • In the U.S. 113 mobile phones are lost every … • Day • Hour • Minute

  11. Top 10 U.S. Cities for Cell Phone Loss or Theft

  12. Do You Access or Do Banking?

  13. Using Your Smartphone • 44% use a browser to access the Internet – 32.5 million Americans accessed banking • Vendors, retailers, merchants, content providers, mobile operators, and banks are all actively establishing new payment services – The value of mobile payment transactions is projected to reach almost $630 billion by 2014, up from $170 billion in 2010

  14. Password-Protect Your Device • 24% store computer or banking passwords on their mobile devices • More than half of smartphone users do not use any password protection to prevent unauthorized access to their device • What’s the risk?

  15. No Password What’s the Harm? • Access personal email and work email • Access your financial accounts, like banks, Mint.com, or PayPal • Access your data in Google Docs, Evernote, or Dropbox • Post embarrassing updates to Facebook and Twitter • So use a strong password – Require the password after minimum period of inactivity

  16. When Purchasing a Mobile Device • Ask about security features and functions – Can you add a strong password, how are patches deployed… – What apps are pre-loaded, are apps vetted • Pre-loaded apps generally have more permissions than ones you install – What software protections can you can install after purchasing • Do you really need all the bells and whistles • Research the device – What maintenance is needed, is it a hacker target or thief magnet, how do you secure it – Read reviews – are most consumers satisfied

  17. Smartphone Malware What’s the Harm? • Force the infected phone call a given phone number – Remember 900 numbers? • Send premium rate text messages • Automatically visit websites that the malware directs it to – Earns money for malware writer • Steal personal information • Be alert for unusual behaviors on your phone, which could be a sign that it is infected – Unusual text messages, strange charges to the phone bill, and suddenly decreased battery life

  18. What’s the Best Anti-Malware Software? • Read app reviews • Check reliable consumer publications • Check industry publications • Look for names you trust • The City of Phoenix does not endorse, recommend, or vilify any specific vendors, products, apps, or services.

  19. Keep a Clean Machine • Keep your mobile security software current • Automate software updates – Many software programs will automatically connect and update to defend against known risks – Example: Sync regularly with iTunes – don’t just charge the battery

  20. Prepare for the Unthinkable • Consider using a “find my device” to locate your device if lost or stolen • Enable remote wipe capability

  21. Mobile Device Privacy

  22. Do You Read App Privacy Policies / Permissions?

  23. Using Your Smartphone • 26% of smartphone owners say they always read the privacy policy when downloading apps – I’m not sure I believe that • 31% say they never read the policy

  24. Example – Game • New! 4 ½ Stars! Reputable Developer!

  25. Example – Game

  26. Why Do Apps Need “Read Phone State and Identity” Permission? • Phone State – Lets the app tell whether you’re on a call or if the phone’s ringing – Allows games, media players, podcasts to pause while you’re on a call • Phone Identity – Developer may need a way to assign a unique ID to you for registration/activation purposes – Many ad publishers use this permission to get the Phone ID for tracking purposes • App may not know who you are exactly, but tracking your usage over time allows a company to build a profile of your individual activity

  27. True or False • A basic Android application has no permissions associated with it – This means the app cannot do anything that would adversely impact the user experience or any data on the device

  28. True! • App developer must specifically state the permissions he wants the app to have

  29. Flashlight App

  30. Compare – Flashlight App • Free! 5 Stars! Lots of installs!

  31. Example – Flashlight App

  32. Example – Flashlight App

  33. True or False • Most free app developers rely on advertising to fund their businesses

  34. True! • Most free app developers rely on advertising to fund their businesses

  35. Why the App’s Free • Free and cheap apps are usually supported by ads – Marketers want to know user demographics to better target ads • The advertising company pays the app developer and supplies a library (of code/programs) that the developer links to within the application – The app developer might not really even be aware of what the ad libraries do • The ad library “piggybacks” on the app’s permissions • So, for example, if the app can read your contact list, the advertiser (through the library) can read your contact list

  36. “Read Phone State and Identity” Trade-off • Some advertising systems, like AdMob, require developers to use this permission so the advertiser can collect statistics • This means: • Both the advertiser and the app publisher can track your usage of the app, and your usage across multiple apps if they collect all that data centrally (which advertisers definitely do)

  37. I Know You • Sign up for something and give your email address or Facebook login – Ties all of the profile information to a real individual • I know where you live, work, and shop – Because of your GPS info • I know what you like – Because of Facebook and your shopping profile • I know your friends and family – Because of Facebook and device contacts and messaging

  38. Before Downloading that App • Be especially wary of typically-suspicious apps (like ringtone apps) that use unneeded permissions • Only install apps with potentially harmful permissions from developers you trust • Check the app’s marketplace rating to determine safety – Not a perfect indicator (like with Flashlight)

  39. Look For Apps That Tell You How It’s Using Permissions

  40. Does the App Want Passwords? • Think twice before giving an app passwords – Example: Some apps ask for passwords to popular services, like GoogleDocs and Dropbox to upload and store things

  41. App Stores • Apple reviews all apps in its store and tries to verify… – Does the app do what it says it does? Does it function reliably? And does it respect the limitations that Apple has put on developers? – This process does weed out some security threats, like apps that carry malware – Does not eliminate all risks to your privacy • Android apps are not vetted – Android market is considered the “wild, wild west”

  42. Example: Movie Trivia Game Uses internet connection to see what the rest of the world has answered to current question

  43. Example: Whole Foods App

  44. iOS Location Services • Tell if an iOS app is using location services • Look for the arrow next to the battery indicator

  45. eBook Reader Privacy • Electronic Frontier Foundation researched and published a guide to eReader privacy – https://www.eff.org/deeplinks/2010/12/2010-e- book-buyers-guide-e-book-privacy

  46. Quiz: Would you use this IM service? From an instant messaging site

  47. Are You Convinced To… 1. Keep your device with you – don’t leave it unattended 2. Protect your device with a strong password 3. Use anti-malware software 4. Read those (often boring) privacy policies 5. Don’t download or keep apps that request more permissions than needed

  48. Questions? Contact ispo@phoenix.gov

  49. More Cowbell (Supplemental Info)

  50. What’s Wrong With This Picture?

  51. QR Codes • Quick Response codes are popping up everywhere – Magazine ads, newsletters, real estate signs, newspaper ads, trade show booths • A QR code is basically a 2D barcode that can be read by smart phone users – An easy way to direct a user to a website – just scan the QR code • Could be a link to a malicious website

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend