him

20
CELLPHONE VIRUS AND CELLPHONE VIRUS AND SECURITY SECURITY BY BY HIMANSHU KUMAR HIMANSHU KUMAR REG.NO:-U11CS056 REG.NO:-U11CS056

Upload: himanshu-breaker

Post on 28-Jan-2015

96 views

Category:

Technology


1 download

DESCRIPTION

 

TRANSCRIPT

Page 1: Him

CELLPHONE VIRUS AND CELLPHONE VIRUS AND SECURITYSECURITY BYBY

HIMANSHU KUMARHIMANSHU KUMARREG.NO:-U11CS056REG.NO:-U11CS056

Page 2: Him

INTRODUCTION

2

Page 3: Him

Smart Phones ‘R Pocket Smart Phones ‘R Pocket Computers Computers Most commonly used phones, as defined

by operating system (OS) – Android (Android OS) BlackBerry (RIM OS) iPhones / iPod touch (iPhone OS) PalmPre (WebOS) Windows Mobile (WinMobile OS)

3

Page 4: Him

Current threats by mobile malwareCurrent threats by mobile malware

For financial gain / loss

Unnecessary calls / SMS / MMS Send and sell private information

Cause phones to work slowly or crash

Wipe out contact books and other information on the phone

Install “false” applications

Page 5: Him

Internet, Bluetooth, and MMSInternet, Bluetooth, and MMS

In all of these transfer methods, the user has to agree at least once to run the infected file

But smart phone virus writters get you to open and install their product the same way computer virus writers do: The virus is typically disguised as a game,

security patch or other desirable application

5

Page 6: Him

Viruses and Smart PhonesViruses and Smart Phones How smart phone viruses spread – Internet downloads Bluetooth

Multimedia Messaging System (MMS) Only smart phones susceptible to viruses Phones that can only make and receive calls are

not at risk

6

Page 7: Him

7

HISTORY

iPhone SMS attack first took place in July 2009

We trust smart phones & think they are safe We have the mistaken sense they are immune

to security threats

Smart phones typically lack security features, like antivirus, found on other computers

Page 8: Him

Classification ofMobile Viruses

Page 9: Him

ClassificationClassification

Behaviour Virus Worm Trojan

Environment Operating System Vulnerable Application

Page 10: Him

31st October 2006Mobile Worms and Viruses

Classification (examples)Classification (examples)Source:

Kas

pers

ky L

abs

Page 11: Him

Case Studies

Page 12: Him

Case Study – CABIRCase Study – CABIR

First mobile worm Spread vector – Bluetooth Infected file – caribe.sis 15 new variants exist

Page 13: Him

Case Study - ComWarCase Study - ComWar

Second landmark in mobile worms Spread vector - Bluetooth and MMS Large spread area due to MMS Not as proof of concept – Intention to harm by

charging the mobile user Multiple variants detected

Page 14: Him

Case Study - CardTrapCase Study - CardTrap

First cross-over mobile virus found Can migrate from mobile to PC Propogates as infected mobile application as well

as Windows worm 2 variants found

Page 15: Him

Protective Measures

Page 16: Him

Securing against attacksSecuring against attacks

System level security MOSES

Network Level Security Proactive approach

Page 17: Him

Lock Down Bluetooth!Lock Down Bluetooth!

Bluetooth is default-on Wastes your battery Leaves you open to Bluetooth-based attacks

– most common at this time

17

Page 18: Him

Secure an iPhoneSecure an iPhone

Auto-Lock locks the touch screen for a preset time period after not being used for one, two, three, four or five minutes. Turned on by default but can be disabled altogether

Password-protect the SIM card on a 3G The Erase Data function lets you completely

wipe your iPhone after 10 failed passcode attempts

18

Page 19: Him

Social Engineering ThreatsSocial Engineering Threats The best security in the world will not help you

if – You click on an phishing email and give your

personal information You click on a SMS/text message that

appears to come from your carrier You respond to a vishing phone call*

Never give information via email or by phone or on the web, unless you initiate the exchange

19

Page 20: Him

Threats to Smart Phones Threats to Smart Phones Attackers will exploit our social conditioning

entering Personally Identifiable Information (PI/PII), while interacting with phone voice response to commit vishing and identity theft.1

We demand more and better availability from phone service than we would from an ISP, “so the threat of a DoS attack might compel carriers to pay out on a blackmail scam.”1

“At this point, mobile device capability is far ahead of security… We’ll start to see the botnet problem infiltrate the mobile world in 2012.”2

20