SlideShare a Scribd company logo
Mobile security
concepts and
technologies I.
Page 2
Instructor, PACE-IT Program – Edmonds Community College
Areas of Expertise Industry Certifications
 PC Hardware
 Network Administration
 IT Project Management
 Network Design
 User Training
 IT Troubleshooting
Qualifications Summary
Education
 M.B.A., IT Management, Western Governor’s University
 B.S., IT Security, Western Governor’s University
Entrepreneur, executive leader, and proven manger
with 10+ years of experience turning complex issues
into efficient and effective solutions.
Strengths include developing and mentoring diverse
workforces, improving processes, analyzing
business needs and creating the solutions
required— with a focus on technology.
Page 3
– Mobile device security.
– Mobile application security.
PACE-IT.
Page 4
Mobile security concepts and technologies I.
Page 5
Since the introduction of the
mobile device, loss and theft
have been a concern.
Just about everyone has either lost a mobile device
or had one stolen. In the early years, the major
concern was that a cell phone was going to be used
to call some foreign country or toll number and the
owner would get stuck with a large bill.
Now—with the rise in popularity of smartphones and
tablets and the greater portability of data—much
more may be at stake. This is especially true with
the advent of bring your own device (BYOD) policies
in the workplace.
Mobile security concepts and technologies I.
Page 6
– Screen locks.
» All mobile devices (e.g., phones, tablets, and laptops) should
have the screen lock set. The timer should be set for a
relatively short period of time.
– Lockout settings.
» In the case of loss or theft, configuring lockouts will help to
prevent unauthorized access to the device. After a specified
number of attempts to log in, the device will not allow any
further attempts until administrative action is taken.
– GPS.
» Many mobile devices have GPS capabilities, allowing the
device to be located if it is lost or stolen.
• Asset tracking utilizes GPS capabilities to pinpoint a device’s
location.
– Remote wiping.
» Some mobile devices allow for the device to be wiped (all data
and applications are removed) remotely. This can be used if a
device is unrecoverable.
Mobile security concepts and technologies I.
Page 7
– Full device encryption.
» Whenever possible, full device encryption should be used to
prevent a malicious entity from reading the contents of the
device. This is especially vital for laptops.
– Disabling unused features.
» Unused features may represent a security risk and should be
disabled to prevent their exploitation.
– Removable storage.
» In some situations, it may be necessary to disable a mobile
device’s ability to use removable storage capabilities.
– Application controls.
» Many mobile applications attempt to access unnecessary user
information (e.g., the location of the device). Controls should be
used to limit the data that applications can access and to
restrict the actions that applications may undertake.
Mobile security concepts and technologies I.
Page 8
– Storage segmentation.
» Some mobile devices allow for the segmentation of storage,
which allows for controls to be put in place to limit how data can
be accessed on the device.
– Inventory control.
» All mobile devices should be inventoried and tracked.
– Mobile device management.
» Software that is used to manage features that are available on
mobile devices.
• It usually also has a feature that will remotely wipe a device.
– Device access control.
» Implement any device access controls that can be used to
restrict who can access the mobile device and/or any features
on the mobile device.
Mobile security concepts and technologies I.
Page 9
Mobile security concepts and technologies I.
Page 10
– Encryption.
» Ensure that mobile applications are encrypting sensitive data
that is stored on the device.
• Encryption keys must also be created and stored securely.
– Credentials management.
» Security credentials used by applications must be implemented
in a secure manner, including storing the credentials in an
encrypted format.
– Authentication.
» A best practice is for the mobile application to authenticate the
user and to base access to data on the user’s authentication
level.
Mobile security concepts and technologies I.
Page 11
– Geotagging.
» Some mobile applications store geographical information when
they are used. A determination must be made as to whether or
not to allow it.
• Geotagging may present a privacy concern.
– Application whitelisting.
» Some mobile applications allow for whitelisting—a list of
allowed applications that can access features in the original
application.
• Any whitelisting capabilities should be managed.
– Transitive trust/authentication.
» An application will trust an unknown security environment if it is
trusted by a security environment that the application trusts.
• For example, application Z trusts environment T. Environment
T trusts environment U. Application Z, therefore, trusts
environment U.
• This may or may not represent a security issue.
Mobile security concepts and technologies I.
Page 12
Mobile security concepts and technologies I.
As the popularity of mobile devices has increased, so has the security
concerns for those devices. Some steps that can be taken to secure mobile
devices include: screen locks, lockout settings, GPS, remote wiping, full
device encryption, disabling unused features, disabling removable storage,
application controls, storage segmentation, inventory control, mobile device
management, and device access controls.
Topic
Mobile device security.
Summary
Security controls should be put in place on applications that either reside on
mobile devices or are accessed by mobile devices. Some of these controls
include: encryption, credentials management, authentication, geotagging,
application whitelisting, and transitive trust/authentication controls.
Mobile application security.
Page 13
THANK YOU!
This workforce solution was 100 percent funded by a $3 million grant awarded by the
U.S. Department of Labor's Employment and Training Administration. The solution was
created by the grantee and does not necessarily reflect the official position of the U.S.
Department of Labor. The Department of Labor makes no guarantees, warranties, or
assurances of any kind, express or implied, with respect to such information, including
any information on linked sites and including, but not limited to, accuracy of the
information or its completeness, timeliness, usefulness, adequacy, continued availability
or ownership. Funded by the Department of Labor, Employment and Training
Administration, Grant #TC-23745-12-60-A-53.
PACE-IT is an equal opportunity employer/program and auxiliary aids and services are
available upon request to individuals with disabilities. For those that are hearing
impaired, a video phone is available at the Services for Students with Disabilities (SSD)
office in Mountlake Terrace Hall 159. Check www.edcc.edu/ssd for office hours. Call
425.354.3113 on a video phone for more information about the PACE-IT program. For
any additional special accommodations needed, call the SSD office at 425.640.1814.
Edmonds Community College does not discriminate on the basis of race; color; religion;
national origin; sex; disability; sexual orientation; age; citizenship, marital, or veteran
status; or genetic information in its programs and activities.

More Related Content

PPTX
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PPTX
PACE-IT, Security + 5.3: Security Controls for Account Management
PPTX
PACE-IT, Security+3.6: Security Enhancement Techniques
PPTX
PACE-IT, Security+ 4.1: Application Security Controls and Techniques
PPTX
PACE-IT, Security+ 4.5: Mitigating Risks in Alternative Environments
PPTX
PACE-IT, Security+ 6.2: Cryptographic Methods (part 2)
PPTX
PACE-IT, Security+3.7: Overview of Security Assessment Tools
PPTX
PACE-IT, Security + 5.1: Summary of Authentication Services
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security + 5.3: Security Controls for Account Management
PACE-IT, Security+3.6: Security Enhancement Techniques
PACE-IT, Security+ 4.1: Application Security Controls and Techniques
PACE-IT, Security+ 4.5: Mitigating Risks in Alternative Environments
PACE-IT, Security+ 6.2: Cryptographic Methods (part 2)
PACE-IT, Security+3.7: Overview of Security Assessment Tools
PACE-IT, Security + 5.1: Summary of Authentication Services

What's hot (20)

PPTX
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)
PPTX
PACE-IT, Security+3.5: Types of Application Attacks (part 1)
PPTX
PACE-IT, Security+ 4.3: Solutions to Establish Host Security
PPTX
PACE-IT, Security+3.2: Summary of Types of Attacks (part 1)
PPTX
PACE-IT, Security+1.2: Secure Network Administration Concepts
PPTX
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)
PPTX
PACE-IT, Security+3.4: Summary of Wireless Attacks
PPTX
PACE-IT, Security+ 6.2: Cryptographic Methods (part 1)
PPTX
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)
PPTX
PACE-IT, Security+1.3: Cloud Concepts
PPTX
PACE-IT, Security+1.1: Introduction to Network Devices (part 2)
PPTX
PACE-IT, Security+2.6: Security Related Awareness and Training
PPTX
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 2)
PPTX
PACE-IT, Security+1.3: Secure Network Design Elements and Components
PPTX
Pace IT - Common Security Threats
PPTX
PACE-IT: Physical Network Security Control
PPTX
PACE-IT: Risk and Security Related Concepts
PPTX
PACE-IT, Security+3.8: Vulnerability Scanning vs Pen Testing
PPTX
PACE-IT: IT Security Measures
PPTX
PACE-IT: Common Threats (part 2)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)
PACE-IT, Security+3.5: Types of Application Attacks (part 1)
PACE-IT, Security+ 4.3: Solutions to Establish Host Security
PACE-IT, Security+3.2: Summary of Types of Attacks (part 1)
PACE-IT, Security+1.2: Secure Network Administration Concepts
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)
PACE-IT, Security+3.4: Summary of Wireless Attacks
PACE-IT, Security+ 6.2: Cryptographic Methods (part 1)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)
PACE-IT, Security+1.3: Cloud Concepts
PACE-IT, Security+1.1: Introduction to Network Devices (part 2)
PACE-IT, Security+2.6: Security Related Awareness and Training
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 2)
PACE-IT, Security+1.3: Secure Network Design Elements and Components
Pace IT - Common Security Threats
PACE-IT: Physical Network Security Control
PACE-IT: Risk and Security Related Concepts
PACE-IT, Security+3.8: Vulnerability Scanning vs Pen Testing
PACE-IT: IT Security Measures
PACE-IT: Common Threats (part 2)
Ad

Viewers also liked (9)

PPTX
PACE-IT, Security+3.3: Summary of Social Engineering Attacks
PPTX
PACE-IT, Security+3.2: Summary of Types of Attacks (part 2)
PPTX
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)
PPTX
PACE-IT, Security+ 4.4: Controls to Ensure Data Security
PPTX
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 1)
PPTX
PACE-IT, Security+3.1: Types of Malware
PPTX
Cloud Computing
PPTX
PACE-IT, Security+3.5: Types of Application Attacks (part 2)
PPTX
PACE-IT, Security+2.9: Goals of Security Controls
PACE-IT, Security+3.3: Summary of Social Engineering Attacks
PACE-IT, Security+3.2: Summary of Types of Attacks (part 2)
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)
PACE-IT, Security+ 4.4: Controls to Ensure Data Security
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 1)
PACE-IT, Security+3.1: Types of Malware
Cloud Computing
PACE-IT, Security+3.5: Types of Application Attacks (part 2)
PACE-IT, Security+2.9: Goals of Security Controls
Ad

Similar to PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1) (20)

PPTX
Pace IT - Secure Mobile Devices
PDF
Pete Wassell (Augmate Corportation) Security in the Enterprise Smart Glasses
PPTX
Isaca tech session 19 feb 2013 securing mobile devices rev
PPTX
Practical steps for assessing tablet & mobile device security
PPTX
mobile application security
PDF
Mbs t17 o'neil-mbs-t17 rsa-realizing-mobile-enterprise
PDF
Service2Media: Webinar Security & Management (17 March 2014) by Derk Tegeler
PDF
880 st011
PPTX
Pace IT - Basic Mobile Device
PPTX
ISACA smart security for smart devices
PDF
F-LOCKER: An Android Face Recognition Applocker Using Local Binary Pattern Hi...
DOC
report on Mobile security
PPTX
Tips for creating Effective & HIPPA compliant mobile.pptx
PDF
INFORMATION AND COMMUNICATIONS TECHNOLOGY PROGRAM
PDF
Tips and Tricks for Building Secure Mobile Apps
PDF
WEBINAR - August 9, 2016: New Legal Requirements for Mobile Security
PPTX
Mobile application securitry risks ISACA Silicon Valley 2012
PPTX
Mobile Application Security
PDF
3 steps security
PDF
The Internet of Things: the 4 security dimensions of smart devices
Pace IT - Secure Mobile Devices
Pete Wassell (Augmate Corportation) Security in the Enterprise Smart Glasses
Isaca tech session 19 feb 2013 securing mobile devices rev
Practical steps for assessing tablet & mobile device security
mobile application security
Mbs t17 o'neil-mbs-t17 rsa-realizing-mobile-enterprise
Service2Media: Webinar Security & Management (17 March 2014) by Derk Tegeler
880 st011
Pace IT - Basic Mobile Device
ISACA smart security for smart devices
F-LOCKER: An Android Face Recognition Applocker Using Local Binary Pattern Hi...
report on Mobile security
Tips for creating Effective & HIPPA compliant mobile.pptx
INFORMATION AND COMMUNICATIONS TECHNOLOGY PROGRAM
Tips and Tricks for Building Secure Mobile Apps
WEBINAR - August 9, 2016: New Legal Requirements for Mobile Security
Mobile application securitry risks ISACA Silicon Valley 2012
Mobile Application Security
3 steps security
The Internet of Things: the 4 security dimensions of smart devices

Recently uploaded (20)

PPTX
Renaissance Architecture: A Journey from Faith to Humanism
PDF
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
PDF
STATICS OF THE RIGID BODIES Hibbelers.pdf
PDF
VCE English Exam - Section C Student Revision Booklet
PDF
RMMM.pdf make it easy to upload and study
PDF
Supply Chain Operations Speaking Notes -ICLT Program
PDF
O7-L3 Supply Chain Operations - ICLT Program
PPTX
Week 4 Term 3 Study Techniques revisited.pptx
PDF
Abdominal Access Techniques with Prof. Dr. R K Mishra
PDF
TR - Agricultural Crops Production NC III.pdf
PDF
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
PDF
Pre independence Education in Inndia.pdf
PDF
01-Introduction-to-Information-Management.pdf
PPTX
Introduction to Child Health Nursing – Unit I | Child Health Nursing I | B.Sc...
PPTX
Pharmacology of Heart Failure /Pharmacotherapy of CHF
PPTX
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
PDF
FourierSeries-QuestionsWithAnswers(Part-A).pdf
PDF
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
PDF
Anesthesia in Laparoscopic Surgery in India
PDF
Mark Klimek Lecture Notes_240423 revision books _173037.pdf
Renaissance Architecture: A Journey from Faith to Humanism
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
STATICS OF THE RIGID BODIES Hibbelers.pdf
VCE English Exam - Section C Student Revision Booklet
RMMM.pdf make it easy to upload and study
Supply Chain Operations Speaking Notes -ICLT Program
O7-L3 Supply Chain Operations - ICLT Program
Week 4 Term 3 Study Techniques revisited.pptx
Abdominal Access Techniques with Prof. Dr. R K Mishra
TR - Agricultural Crops Production NC III.pdf
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
Pre independence Education in Inndia.pdf
01-Introduction-to-Information-Management.pdf
Introduction to Child Health Nursing – Unit I | Child Health Nursing I | B.Sc...
Pharmacology of Heart Failure /Pharmacotherapy of CHF
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
FourierSeries-QuestionsWithAnswers(Part-A).pdf
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
Anesthesia in Laparoscopic Surgery in India
Mark Klimek Lecture Notes_240423 revision books _173037.pdf

PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)

  • 2. Page 2 Instructor, PACE-IT Program – Edmonds Community College Areas of Expertise Industry Certifications  PC Hardware  Network Administration  IT Project Management  Network Design  User Training  IT Troubleshooting Qualifications Summary Education  M.B.A., IT Management, Western Governor’s University  B.S., IT Security, Western Governor’s University Entrepreneur, executive leader, and proven manger with 10+ years of experience turning complex issues into efficient and effective solutions. Strengths include developing and mentoring diverse workforces, improving processes, analyzing business needs and creating the solutions required— with a focus on technology.
  • 3. Page 3 – Mobile device security. – Mobile application security. PACE-IT.
  • 4. Page 4 Mobile security concepts and technologies I.
  • 5. Page 5 Since the introduction of the mobile device, loss and theft have been a concern. Just about everyone has either lost a mobile device or had one stolen. In the early years, the major concern was that a cell phone was going to be used to call some foreign country or toll number and the owner would get stuck with a large bill. Now—with the rise in popularity of smartphones and tablets and the greater portability of data—much more may be at stake. This is especially true with the advent of bring your own device (BYOD) policies in the workplace. Mobile security concepts and technologies I.
  • 6. Page 6 – Screen locks. » All mobile devices (e.g., phones, tablets, and laptops) should have the screen lock set. The timer should be set for a relatively short period of time. – Lockout settings. » In the case of loss or theft, configuring lockouts will help to prevent unauthorized access to the device. After a specified number of attempts to log in, the device will not allow any further attempts until administrative action is taken. – GPS. » Many mobile devices have GPS capabilities, allowing the device to be located if it is lost or stolen. • Asset tracking utilizes GPS capabilities to pinpoint a device’s location. – Remote wiping. » Some mobile devices allow for the device to be wiped (all data and applications are removed) remotely. This can be used if a device is unrecoverable. Mobile security concepts and technologies I.
  • 7. Page 7 – Full device encryption. » Whenever possible, full device encryption should be used to prevent a malicious entity from reading the contents of the device. This is especially vital for laptops. – Disabling unused features. » Unused features may represent a security risk and should be disabled to prevent their exploitation. – Removable storage. » In some situations, it may be necessary to disable a mobile device’s ability to use removable storage capabilities. – Application controls. » Many mobile applications attempt to access unnecessary user information (e.g., the location of the device). Controls should be used to limit the data that applications can access and to restrict the actions that applications may undertake. Mobile security concepts and technologies I.
  • 8. Page 8 – Storage segmentation. » Some mobile devices allow for the segmentation of storage, which allows for controls to be put in place to limit how data can be accessed on the device. – Inventory control. » All mobile devices should be inventoried and tracked. – Mobile device management. » Software that is used to manage features that are available on mobile devices. • It usually also has a feature that will remotely wipe a device. – Device access control. » Implement any device access controls that can be used to restrict who can access the mobile device and/or any features on the mobile device. Mobile security concepts and technologies I.
  • 9. Page 9 Mobile security concepts and technologies I.
  • 10. Page 10 – Encryption. » Ensure that mobile applications are encrypting sensitive data that is stored on the device. • Encryption keys must also be created and stored securely. – Credentials management. » Security credentials used by applications must be implemented in a secure manner, including storing the credentials in an encrypted format. – Authentication. » A best practice is for the mobile application to authenticate the user and to base access to data on the user’s authentication level. Mobile security concepts and technologies I.
  • 11. Page 11 – Geotagging. » Some mobile applications store geographical information when they are used. A determination must be made as to whether or not to allow it. • Geotagging may present a privacy concern. – Application whitelisting. » Some mobile applications allow for whitelisting—a list of allowed applications that can access features in the original application. • Any whitelisting capabilities should be managed. – Transitive trust/authentication. » An application will trust an unknown security environment if it is trusted by a security environment that the application trusts. • For example, application Z trusts environment T. Environment T trusts environment U. Application Z, therefore, trusts environment U. • This may or may not represent a security issue. Mobile security concepts and technologies I.
  • 12. Page 12 Mobile security concepts and technologies I. As the popularity of mobile devices has increased, so has the security concerns for those devices. Some steps that can be taken to secure mobile devices include: screen locks, lockout settings, GPS, remote wiping, full device encryption, disabling unused features, disabling removable storage, application controls, storage segmentation, inventory control, mobile device management, and device access controls. Topic Mobile device security. Summary Security controls should be put in place on applications that either reside on mobile devices or are accessed by mobile devices. Some of these controls include: encryption, credentials management, authentication, geotagging, application whitelisting, and transitive trust/authentication controls. Mobile application security.
  • 14. This workforce solution was 100 percent funded by a $3 million grant awarded by the U.S. Department of Labor's Employment and Training Administration. The solution was created by the grantee and does not necessarily reflect the official position of the U.S. Department of Labor. The Department of Labor makes no guarantees, warranties, or assurances of any kind, express or implied, with respect to such information, including any information on linked sites and including, but not limited to, accuracy of the information or its completeness, timeliness, usefulness, adequacy, continued availability or ownership. Funded by the Department of Labor, Employment and Training Administration, Grant #TC-23745-12-60-A-53. PACE-IT is an equal opportunity employer/program and auxiliary aids and services are available upon request to individuals with disabilities. For those that are hearing impaired, a video phone is available at the Services for Students with Disabilities (SSD) office in Mountlake Terrace Hall 159. Check www.edcc.edu/ssd for office hours. Call 425.354.3113 on a video phone for more information about the PACE-IT program. For any additional special accommodations needed, call the SSD office at 425.640.1814. Edmonds Community College does not discriminate on the basis of race; color; religion; national origin; sex; disability; sexual orientation; age; citizenship, marital, or veteran status; or genetic information in its programs and activities.