SlideShare a Scribd company logo
MOBILE DEVICES: THE CASE FOR CYBER SECURITY
HARDENED SYSTEMS AND METHODS TO ADDRESS
SECURITY RELATED ISSUE
Dawson, M., J. Wright, M. Omar. University of Missouri -
St. Louis, University of Charleston, Saint Leo University
New Threats and Countermeasures in Digital
Crime and Cyber Terrorism
Dawson, M., Wright, J., & Omar,
M. (2015). Mobile Devices: The
Case for Cyber Security
Hardened Systems. In M.
Dawson, & M. Omar (Eds.) New
Threats and Countermeasures
in Digital Crime and Cyber
Terrorism (pp. 8-29). Hershey,
PA: Information Science
Reference. doi:10.4018/978-1-
4666-8345-7.ch002
Abstract
Mobile devices are becoming a method to provide an efficient
and convenient way to access, find and share information;
however, the availability of this information has caused an
increase in cyber attacks. Currently, cyber threats range from
Trojans and viruses to botnets and toolkits. Presently, 96% of
mobile devices do not have preinstalled security software while
approximately 65% of the vulnerabilities are found within the
application layer. This lack in security and policy driven
systems is an opportunityfor malicious cyber attackers to hack
into the various popular devices. Traditional security software
found in desktop computing platforms, such as firewalls,
antivirus, and encryption, is widely used by the general public
in mobile devices. Moreover, mobile devices are even more
vulnerable than personal desktop computers because more
people are using mobile devices to do personal tasks. This
review attempts to display the importance of developing a
national security policy created for mobile devices in order to
protect sensitive and confidential data. Results of this review
provide methods to address security related issues in mobile
devices.
Introduction
Currently, mobile devices are the preferred device for web browsing, emailing,
using social media and making purchases. Due to their size, mobile devices are
easily carried in people’s pockets, purses or briefcases. Unfortunately, the popularity
of mobile devices is a breeding ground for cyber attackers. Operating systems
on mobile devices do not contain security software to protect data. For example,
traditional security software found in personal computers (PCs), such as firewalls,
antivirus, and encryption, is not currently available in mobile devices (Ruggiero, 2011).
In addition to this, mobile phone operating systems are not frequently updated like their
PC counterparts. Cyber attackers can use this gap in security to their advantage. An
example of this gap in security is seen in the 2011 Valentine’s Day attack. Cyber-
attackers dispersed a mobile picture-sharing application that covertly sent premium-
rate text messages from a user’s mobile phone (Ruggiero, 2011). Thus, this example
illustrates the importance of having a security policy for mobile phones.
Social Networking and Electronic Commerce (E-
Commerce) Applications
Many people rely on their mobile devices to do numerous activities, like sending
emails, storing contact information, passwords and other sensitive data. In
addition to this, mobile devices are the device of choice when it comes to social
networking; thus, mobile applications for social networking sites (Facebook, Twitter,
Google+) are another loophole for cyber attackers to gain personal data from
unsuspecting users (Ruggiero, 2011). Social networking sites are host to a surplus of
personal data. That is why malicious applications that use social networking sites to
steal data yield severe consequences. Recently, M-Commerce or “mobile e-
commerce” has gained popularity in our society. Many smartphone users can now
conduct monetary transactions, such as buying goods and applications (apps),
redeeming coupons and tickets, banking and processing point-of-sale payments
(Ruggiero, 2011). Again, all of these smartphone functions are convenient for the user
but advantageous for malicious cyber attackers. Ultimately, there is a niche in
technology for cyber security software that is specifically designed for the mobile
operating system.
Hypothetical Consequences of Cyber Attacks on
Smartphones
The consequences of a cyber attack on a smartphone can be just as
detrimental, or even more detrimental than an attack on a PC. According
to Patrick Traynor, a researcher and assistant professor at the Georgia Tech
School of Computer Science, mobile apps rely on the browser to operate
(Traynor, Ahamad, Alperovitch, Conti, & Davis, 2012). As a result of this,
more Web-based attacks on mobile devices will increase throughout the
year. Traynor also states that IT professionals, computer scientists and
engineers still need to explore the variations between mobile and traditional
desktop browsers to fully understand how to prevent cyber attacks (Traynor,
Ahamad, Alperovitch, Conti, & Davis, 2012).
Challenges with a Mobile Browser
One cyber security challenge for mobile devices is the screen size. For
example, web address bars (which appear once the user clicks on the
browser app) disappear after a few seconds on a smartphone because of the
small screen size (Traynor, Ahamad, Alperovitch, Conti, & Davis, 2012). This
is usually the first-line of defense for cyber security. Checking the Uniform
Resource Locator (URL) of a website is the first way users can insure that
they are at a legitimate website. Moreover, SSL certificates for a website
are usually more difficult to find on a mobile phone browser (Traynor,
Ahamad, Alperovitch, Conti, & Davis, 2012). This adds another gap in
security for mobile devices. Furthermore, the touch-screen attribute of mobile
phones can be cause for concern when dealing with cyber attackers. Traynor
states that the way elements are placed on a page and users’ actions are all
opportunities to implant an attack. An illustration of this is seen when an
attacker creates an attractive display content (i.e. an advertisement for an
app or a link to a social media app) in which the malicious link is carefully
hidden underneath a legitimate image. Unfortunately, once the user clicks
the image they can be redirected to the malicious content via the link
(Traynor, Ahamad, Alperovitch, Conti, & Davis, 2012).
The current status of security for the majority of
today’s mobile devices
Illustrates various cyberthreats in 2010
Percentage of smartphone survey respondents
that received spam in 2009
Legitimate Applications that Can Be Used to
Retrieve Information
Presently, there is valid spy software available for
various mobile devices. An example of this is
FlexiSpy, a legitimate commercial spyware program that
cost over $300 (United States Computer Emergency
Readiness Team, 2010). FlexiSpy can:
• Listen to actual phone calls as they happen;
• Secretly read Short Message Service (SMS) texts,
call logs, and emails;
• Listen to the phone surroundings (use as
remote bugging device);
• View phone GPS location;
• Forward all email events to another inbox;
• Remotely control all phone functions via SMS;
• Accept or reject communication based on
predetermined lists; and
• Evade detection during operation (United States
Computer Emergency Readiness Team, 2010).
Process for mobile device hardening
GOLD IMAGE.
Release OS image to
phone for x days
Create a VM image of
OS for testing
Test against CWEs
and other application
security
reqiuriements
PASS
FAIL
Determine the OS for
phone
Apply requirements
from DISA STIGS,
RMF ICD, Best
Practices & etc.
Review failed
requirements and
develop appropriate
mitigations
Create a VM image of
OS for testing
Contact Information
Dr. Maurice Dawson
Assistant Professor of Information Systems
University of Missouri - St. Louis
+1-314-224-5882
dawsonmau@umsl.edu

More Related Content

PPTX
OSINT EXPLOITATION OF UNIVERSITY TWEETS
PDF
Mobile Cyber Security
PDF
Security techniques for intelligent spam sensing and anomaly detection in onl...
PDF
Deterring Sybil Attack in Online Communication System via Peer-to-peer Audio ...
DOCX
PhD Thesis Writing Assistance - Manuscript
PDF
Comparative review dele
PDF
Mobile Device Users’ Susceptibility To Phishing Attacks
PPT
Social media and Security risks
OSINT EXPLOITATION OF UNIVERSITY TWEETS
Mobile Cyber Security
Security techniques for intelligent spam sensing and anomaly detection in onl...
Deterring Sybil Attack in Online Communication System via Peer-to-peer Audio ...
PhD Thesis Writing Assistance - Manuscript
Comparative review dele
Mobile Device Users’ Susceptibility To Phishing Attacks
Social media and Security risks

What's hot (20)

PDF
Malware threat analysis techniques and approaches for IoT applications: a review
PDF
Social media and security essentials.pptx
PDF
An Automated Model to Detect Fake Profiles and botnets in Online Social Netwo...
PDF
Social network privacy guide
PDF
OSA - Internet Security in India
PDF
Cyber security rule of use internet safely
DOCX
Doc handout
PDF
Emerging cyber threats_report2012
PPTX
How to Like Social Media Network Security
PDF
PDF
CYBER SECURITY: A SURVEY ON ISSUES AND SOLUTIONS
PDF
Blackberry playbook – new challenges
PPT
Web Safey
PPTX
Mobile security in Cyber Security
PDF
IRJET- Android Device Attacks and Threats
PDF
Puppetnets and Botnets: Information Technology Vulnerability Exploits
PDF
Trusting Smart Speakers: Understanding the Different Levels of Trust between ...
PDF
Efficient Data Security for Mobile Instant Messenger
PDF
Review on mobile threats and detection techniques
PDF
Cyber Threat to Public Safety Communications
Malware threat analysis techniques and approaches for IoT applications: a review
Social media and security essentials.pptx
An Automated Model to Detect Fake Profiles and botnets in Online Social Netwo...
Social network privacy guide
OSA - Internet Security in India
Cyber security rule of use internet safely
Doc handout
Emerging cyber threats_report2012
How to Like Social Media Network Security
CYBER SECURITY: A SURVEY ON ISSUES AND SOLUTIONS
Blackberry playbook – new challenges
Web Safey
Mobile security in Cyber Security
IRJET- Android Device Attacks and Threats
Puppetnets and Botnets: Information Technology Vulnerability Exploits
Trusting Smart Speakers: Understanding the Different Levels of Trust between ...
Efficient Data Security for Mobile Instant Messenger
Review on mobile threats and detection techniques
Cyber Threat to Public Safety Communications
Ad

Viewers also liked (20)

PDF
Ericsson ConsumerLab: Wearable technology and the internet of things
PDF
Flashpoint hacking forisis_april2016
PDF
Focus on cyber threats in hacking cycle
PDF
Hacker House August Proposal
PDF
7 Pillars of Growth Hacking - Chris Out from RockBoost
PDF
Cyber Security in Manufacturing
PPTX
CyberSecurity Medical Devices
PPTX
The Foundations of Social Media Risk Management
PPTX
Hacking Mobile Apps
PDF
Wearing safe: Physical and informational security in the age of the wearable ...
PDF
CNIT 128 Ch 1: The mobile risk ecosystem
KEY
OPSEC for hackers
PPTX
Over-the-air (OTA) updates and the Connected car
PPTX
Security Challenges in Emerging Technologies
PDF
CNIT 128 Ch 2: Hacking the cellular network
DOCX
Ethical hacking
PPTX
Hacking-as-a-Service - Hacking Is Now Accessible to Everyone - Are We Prepared?
PDF
Building a Cyber Security Operations Center for SCADA/ICS Environments
PDF
29 Growth Hacking Quick Wins
PDF
Growth Hacking
Ericsson ConsumerLab: Wearable technology and the internet of things
Flashpoint hacking forisis_april2016
Focus on cyber threats in hacking cycle
Hacker House August Proposal
7 Pillars of Growth Hacking - Chris Out from RockBoost
Cyber Security in Manufacturing
CyberSecurity Medical Devices
The Foundations of Social Media Risk Management
Hacking Mobile Apps
Wearing safe: Physical and informational security in the age of the wearable ...
CNIT 128 Ch 1: The mobile risk ecosystem
OPSEC for hackers
Over-the-air (OTA) updates and the Connected car
Security Challenges in Emerging Technologies
CNIT 128 Ch 2: Hacking the cellular network
Ethical hacking
Hacking-as-a-Service - Hacking Is Now Accessible to Everyone - Are We Prepared?
Building a Cyber Security Operations Center for SCADA/ICS Environments
29 Growth Hacking Quick Wins
Growth Hacking
Ad

Similar to MOBILE DEVICES: THE CASE FOR CYBER SECURITY HARDENED SYSTEMS AND METHODS TO ADDRESS SECURITY RELATED ISSUE (20)

PDF
Report on Mobile security
PDF
Cn35499502
PDF
Five mobile security challenges facing the enterprise
PDF
Mobile and SIM data - quantifying the risk - 2011
PDF
Mobile Banking Channel Security - Cyber Security Conference 2011
PPTX
UNIT-3-Cybercrime Mobile and Wireless Devices-1.pptx
PDF
Can You Steal From Me Now? Mobile and BYOD Security Risks
PPTX
CS_UNIT 2(P3).pptx
PPTX
Unit-3.pptx
PDF
Info security - mobile approach
PDF
WEEK5 Mobile Device Security 31032022.pdf
PPTX
Attacks on Mobiles\Cell Phones
PPTX
Why Mobile Security is the Next Frontier in Cybersecurity
PPT
cellphone virus and security
PDF
ISACA CACS 2012 - Mobile Device Security and Privacy
PPTX
Mobile device security
PPTX
Outside the Office: Mobile Security
PPTX
Smartphone
PDF
Symantec Mobile Security Whitepaper June 2011
PPTX
Ms810 assignment viruses and malware affecting moblie devices
Report on Mobile security
Cn35499502
Five mobile security challenges facing the enterprise
Mobile and SIM data - quantifying the risk - 2011
Mobile Banking Channel Security - Cyber Security Conference 2011
UNIT-3-Cybercrime Mobile and Wireless Devices-1.pptx
Can You Steal From Me Now? Mobile and BYOD Security Risks
CS_UNIT 2(P3).pptx
Unit-3.pptx
Info security - mobile approach
WEEK5 Mobile Device Security 31032022.pdf
Attacks on Mobiles\Cell Phones
Why Mobile Security is the Next Frontier in Cybersecurity
cellphone virus and security
ISACA CACS 2012 - Mobile Device Security and Privacy
Mobile device security
Outside the Office: Mobile Security
Smartphone
Symantec Mobile Security Whitepaper June 2011
Ms810 assignment viruses and malware affecting moblie devices

More from Maurice Dawson (20)

PPT
Understanding the Challenge of Cybersecurity in Critical Infrastructure Sectors
PPTX
Unprotected Data: Your Risk of Internet-Enabled Psychological and Information...
PPTX
Security Solutions for Hyperconnectivity in the Internet of Things
PDF
Framework for the Development of Virtual Labs for Industrial Internet of Thin...
PDF
Unprepared for Cybersecurity in Saudi Arabia: Argument for a Shift Towards Cy...
PPTX
CTRL, Search, Exploit, and Destroy
PDF
MWAIS Fall 2017 Newsletter
PDF
MWAIS Fall 2018 Newsletter
PDF
Information Technology Use in West African Agriculture – challenges and oppor...
PDF
The Case for IT Training within Guinea’s Ministry of Agriculture: Evaluating ...
PDF
Schedule for the 13th Annual Conference of the Midwest AIS
PDF
UMSL IS | Farmer 2 Farmer Program
PDF
Midwest Association for Information Systems - MWAIS2018
PDF
MWAIS 2018 - 13th Annual Conference
PDF
MWAIS 2018 : 13th Annual Conference of the Midwest Association for Informatio...
PDF
Technological Advancements for Intelligence Collection, Analysis, and Dissemi...
PDF
Hacking, Privacy and Security in a Hyperconnected Society
PDF
University of Missouri - Saint Louis Cyber Security
PDF
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
PDF
Security Solutions for Hyperconnectivity and the Internet of Things
Understanding the Challenge of Cybersecurity in Critical Infrastructure Sectors
Unprotected Data: Your Risk of Internet-Enabled Psychological and Information...
Security Solutions for Hyperconnectivity in the Internet of Things
Framework for the Development of Virtual Labs for Industrial Internet of Thin...
Unprepared for Cybersecurity in Saudi Arabia: Argument for a Shift Towards Cy...
CTRL, Search, Exploit, and Destroy
MWAIS Fall 2017 Newsletter
MWAIS Fall 2018 Newsletter
Information Technology Use in West African Agriculture – challenges and oppor...
The Case for IT Training within Guinea’s Ministry of Agriculture: Evaluating ...
Schedule for the 13th Annual Conference of the Midwest AIS
UMSL IS | Farmer 2 Farmer Program
Midwest Association for Information Systems - MWAIS2018
MWAIS 2018 - 13th Annual Conference
MWAIS 2018 : 13th Annual Conference of the Midwest Association for Informatio...
Technological Advancements for Intelligence Collection, Analysis, and Dissemi...
Hacking, Privacy and Security in a Hyperconnected Society
University of Missouri - Saint Louis Cyber Security
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
Security Solutions for Hyperconnectivity and the Internet of Things

Recently uploaded (20)

PDF
Electronic commerce courselecture one. Pdf
PPT
Teaching material agriculture food technology
PPTX
sap open course for s4hana steps from ECC to s4
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PPTX
Spectroscopy.pptx food analysis technology
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Approach and Philosophy of On baking technology
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
Spectral efficient network and resource selection model in 5G networks
PPTX
Cloud computing and distributed systems.
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Assigned Numbers - 2025 - Bluetooth® Document
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
Electronic commerce courselecture one. Pdf
Teaching material agriculture food technology
sap open course for s4hana steps from ECC to s4
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Spectroscopy.pptx food analysis technology
Advanced methodologies resolving dimensionality complications for autism neur...
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Encapsulation_ Review paper, used for researhc scholars
Diabetes mellitus diagnosis method based random forest with bat algorithm
“AI and Expert System Decision Support & Business Intelligence Systems”
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Approach and Philosophy of On baking technology
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Spectral efficient network and resource selection model in 5G networks
Cloud computing and distributed systems.
Digital-Transformation-Roadmap-for-Companies.pptx
Assigned Numbers - 2025 - Bluetooth® Document
MIND Revenue Release Quarter 2 2025 Press Release
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
20250228 LYD VKU AI Blended-Learning.pptx

MOBILE DEVICES: THE CASE FOR CYBER SECURITY HARDENED SYSTEMS AND METHODS TO ADDRESS SECURITY RELATED ISSUE

  • 1. MOBILE DEVICES: THE CASE FOR CYBER SECURITY HARDENED SYSTEMS AND METHODS TO ADDRESS SECURITY RELATED ISSUE Dawson, M., J. Wright, M. Omar. University of Missouri - St. Louis, University of Charleston, Saint Leo University
  • 2. New Threats and Countermeasures in Digital Crime and Cyber Terrorism Dawson, M., Wright, J., & Omar, M. (2015). Mobile Devices: The Case for Cyber Security Hardened Systems. In M. Dawson, & M. Omar (Eds.) New Threats and Countermeasures in Digital Crime and Cyber Terrorism (pp. 8-29). Hershey, PA: Information Science Reference. doi:10.4018/978-1- 4666-8345-7.ch002
  • 3. Abstract Mobile devices are becoming a method to provide an efficient and convenient way to access, find and share information; however, the availability of this information has caused an increase in cyber attacks. Currently, cyber threats range from Trojans and viruses to botnets and toolkits. Presently, 96% of mobile devices do not have preinstalled security software while approximately 65% of the vulnerabilities are found within the application layer. This lack in security and policy driven systems is an opportunityfor malicious cyber attackers to hack into the various popular devices. Traditional security software found in desktop computing platforms, such as firewalls, antivirus, and encryption, is widely used by the general public in mobile devices. Moreover, mobile devices are even more vulnerable than personal desktop computers because more people are using mobile devices to do personal tasks. This review attempts to display the importance of developing a national security policy created for mobile devices in order to protect sensitive and confidential data. Results of this review provide methods to address security related issues in mobile devices.
  • 4. Introduction Currently, mobile devices are the preferred device for web browsing, emailing, using social media and making purchases. Due to their size, mobile devices are easily carried in people’s pockets, purses or briefcases. Unfortunately, the popularity of mobile devices is a breeding ground for cyber attackers. Operating systems on mobile devices do not contain security software to protect data. For example, traditional security software found in personal computers (PCs), such as firewalls, antivirus, and encryption, is not currently available in mobile devices (Ruggiero, 2011). In addition to this, mobile phone operating systems are not frequently updated like their PC counterparts. Cyber attackers can use this gap in security to their advantage. An example of this gap in security is seen in the 2011 Valentine’s Day attack. Cyber- attackers dispersed a mobile picture-sharing application that covertly sent premium- rate text messages from a user’s mobile phone (Ruggiero, 2011). Thus, this example illustrates the importance of having a security policy for mobile phones.
  • 5. Social Networking and Electronic Commerce (E- Commerce) Applications Many people rely on their mobile devices to do numerous activities, like sending emails, storing contact information, passwords and other sensitive data. In addition to this, mobile devices are the device of choice when it comes to social networking; thus, mobile applications for social networking sites (Facebook, Twitter, Google+) are another loophole for cyber attackers to gain personal data from unsuspecting users (Ruggiero, 2011). Social networking sites are host to a surplus of personal data. That is why malicious applications that use social networking sites to steal data yield severe consequences. Recently, M-Commerce or “mobile e- commerce” has gained popularity in our society. Many smartphone users can now conduct monetary transactions, such as buying goods and applications (apps), redeeming coupons and tickets, banking and processing point-of-sale payments (Ruggiero, 2011). Again, all of these smartphone functions are convenient for the user but advantageous for malicious cyber attackers. Ultimately, there is a niche in technology for cyber security software that is specifically designed for the mobile operating system.
  • 6. Hypothetical Consequences of Cyber Attacks on Smartphones The consequences of a cyber attack on a smartphone can be just as detrimental, or even more detrimental than an attack on a PC. According to Patrick Traynor, a researcher and assistant professor at the Georgia Tech School of Computer Science, mobile apps rely on the browser to operate (Traynor, Ahamad, Alperovitch, Conti, & Davis, 2012). As a result of this, more Web-based attacks on mobile devices will increase throughout the year. Traynor also states that IT professionals, computer scientists and engineers still need to explore the variations between mobile and traditional desktop browsers to fully understand how to prevent cyber attacks (Traynor, Ahamad, Alperovitch, Conti, & Davis, 2012).
  • 7. Challenges with a Mobile Browser One cyber security challenge for mobile devices is the screen size. For example, web address bars (which appear once the user clicks on the browser app) disappear after a few seconds on a smartphone because of the small screen size (Traynor, Ahamad, Alperovitch, Conti, & Davis, 2012). This is usually the first-line of defense for cyber security. Checking the Uniform Resource Locator (URL) of a website is the first way users can insure that they are at a legitimate website. Moreover, SSL certificates for a website are usually more difficult to find on a mobile phone browser (Traynor, Ahamad, Alperovitch, Conti, & Davis, 2012). This adds another gap in security for mobile devices. Furthermore, the touch-screen attribute of mobile phones can be cause for concern when dealing with cyber attackers. Traynor states that the way elements are placed on a page and users’ actions are all opportunities to implant an attack. An illustration of this is seen when an attacker creates an attractive display content (i.e. an advertisement for an app or a link to a social media app) in which the malicious link is carefully hidden underneath a legitimate image. Unfortunately, once the user clicks the image they can be redirected to the malicious content via the link (Traynor, Ahamad, Alperovitch, Conti, & Davis, 2012).
  • 8. The current status of security for the majority of today’s mobile devices
  • 10. Percentage of smartphone survey respondents that received spam in 2009
  • 11. Legitimate Applications that Can Be Used to Retrieve Information Presently, there is valid spy software available for various mobile devices. An example of this is FlexiSpy, a legitimate commercial spyware program that cost over $300 (United States Computer Emergency Readiness Team, 2010). FlexiSpy can: • Listen to actual phone calls as they happen; • Secretly read Short Message Service (SMS) texts, call logs, and emails; • Listen to the phone surroundings (use as remote bugging device); • View phone GPS location; • Forward all email events to another inbox; • Remotely control all phone functions via SMS; • Accept or reject communication based on predetermined lists; and • Evade detection during operation (United States Computer Emergency Readiness Team, 2010).
  • 12. Process for mobile device hardening GOLD IMAGE. Release OS image to phone for x days Create a VM image of OS for testing Test against CWEs and other application security reqiuriements PASS FAIL Determine the OS for phone Apply requirements from DISA STIGS, RMF ICD, Best Practices & etc. Review failed requirements and develop appropriate mitigations Create a VM image of OS for testing
  • 13. Contact Information Dr. Maurice Dawson Assistant Professor of Information Systems University of Missouri - St. Louis +1-314-224-5882 dawsonmau@umsl.edu