SlideShare a Scribd company logo
1
Mobile Phone Security and Privacy
2
LIST OF RESEARCH PAPERS
 Real World smartphone based gait recognition (2020)
 Authentication of Portable Devices for Security(2017)
 Adaptive Cross-Device Gait Recognition Using a Mobile Accelerometer(2019)
 Smartphone Security and Protection Practices(2020)
 Mobile Security: Threats and Best Practices(2021)
3
Smartphone Security and Protection
Practices
 JOURNAL
 VOLUME 2020
 Gdansk University of Technology, Narutowicza 11/12, Gdansk, Poland
4
GROUP NUMBER:12
SAVERA AYUB
SUBMITTED TO
DR. ASMA
AHAMAD
5
Contents
 Introduction
 Focused points
 Problem statement
 Methodology
 Solution
 Summary
 Conclusion
6
Paper Sections
 Section 1 taking a RQs.
 Section 2 presents the research background and motivation.
 Section 3 provides a summary of the identified mobile security threats.
 Section 4, in the same manner, reviews the best practices.
 Section 5 shows a comprehensive report from the conducted survey.
 Section 6 presents general discussion, along with the theoretical and practical
implications, as well a the study limitations and future work agenda.
 Finally, Section 7 concludes the paper.
7
INTRODUCTION
 Communicating mobile security threats and best practices has become a central
objective due to the ongoing discovery of new vulnerabilities of mobile devices.
 To cope with this overarching issue, the goal of this paper is to identify and
analyze existing threats and best practices in the domain of mobile security.
 These devices, based on a specific operating system, enable users to install a
vast variety of applications, commonly referred to as “apps,” from online sources
called markets: Apple App Store, and Google Play.
8
Detail...
 The app markets allow users to perform a quick search and installation of new
apps, but at the same time, they are also a source of different kinds of malware
disguised as normal apps.
 Nowadays, mobile devices are subject to a wide range of security challenges and
malicious threats.
 we can observe rapid growth in the domains of both mobile developers and users.
 Mobile devices are treated by their users as very personal tools, mainly used to
facilitate everyday operations, but they also serve to store very sensitive personal
information.
9
Problem Statement
 Hence, we can observe rapid growth in the domains of both mobile developers
and users.
 Mobile devices are treated by their users as very personal tools, mainly used to
facilitate everyday operations, but they also serve to store very sensitive personal
information.
 The app markets allow users to perform a quick search and installation of new
apps, but at the same time, they are also a source of different kinds of malware
disguised as normal apps.
10
Focused points
 The goal of this study is to identify and analyze security threats to mobile
applications on the one hand and contemporary best practices on the other
hand. Therefore, we put forward the three following research questions:
 RQ1. What are the security threats to mobile applications?
 RQ2. What are the best practices to protect mobile applications?
 RQ3. Which best practices are in use and to what extent by mobile application
users?
11
Detail....
 To answer RQ1 and RQ2, we performed a literature review based on a
combination of the keywords “mobile application,” “threat,” and “best practice” in
an electronic search with Google web search engine and Google Scholar.
 These two platforms promptly rose to become dominant providers of information
and scholarly literature. While the former, in 2019, was a search engine leader
worldwide, accounting for 88.5 percent of global market share.
12
Detail...
 To answer RQ3, we conducted an anonymous survey and asked mobile
application users to fill in a questionnaire which was divided into two parts.
 where the first directly referred to the subject of the research and the second
collected demographic data.
 In total, we examined the responses from 167 users regarding their adoption of
ten mobile security best practices by users in Poland.
13
Mobile Security Threats
 Users of mobile devices or so-called mobile users are increasingly subject to
malicious activity, mainly concerning pushing malware apps to smartphones,
tablets, or other devices using a mobile OS.
 These handheld devices, carried in our pockets, are used to store and protect
sensitive information.
 Even though Google and Apple offer distribution environments that are closed
and controlled, users are still exposed to different kinds of attacks.
14
Detail...
A few of them are given in the following
 Phishing in an app
 Supply chain compromise
 Crypto miner code in games or utilities
 Click-fraud advertising embedded in apps
15
10 Crucial Web Application
It is also crucial to mention top 10 web application security risks according to the most prominent
security community worldwide named OWASP Foundation.
 Injection
 Broken Authentication
 Sensitive Data Exposure
 XML External Entities
 Broken Access Control
 Security Misconfiguration
 Cross-Site Scripting XSS
 Insecure Deserialization
 Using Components with Known Vulnerabilities
 Insufficient Logging & Monitoring
16
Mobile Security Best Practices
Mobile security best practices are recommended guidelines and safeguards for
protecting mobile devices and users’ data.
 Make user authentication the highest priority
 Update mobile operating systems
 Back up user data on a regular basis
 Utilize encryption
 Enable remote data wipe
 Disable Bluetooth and Wi-Fi when not needed
 Be sure not to grant unnecessary permissions to applications
 Install mobile security and antivirus applications
17
The Survey Design and Settings
 The survey consisted of two parts.
 The first part included ten questions that addressed the best practice usage by
the mobile application users.
 The second part, including five questions, aimed at collecting demographic data
(gender and age), as well as the level of education, professional experience (in
years), and the sector of professional activity (also in years). We used Google
Forms to collect the data since they have the benefits of being user-friendly and
free of charge.
18
Findings and Discussion
 Q1. Which authentication method do you use to secure your smartphone?
I. Fingerprint scanner: 53.3% (89)
II. PIN: 12.6% (21)
III. Pattern lock: 12% (20)
IV. Facial recognition: 10.2% (17)
V. Password: 4.8% (8)
VI. Iris scanner: 1.2% (2)
VII. None: 6% (10)
19
Detail...
 Q2. Do you update the mobile applications installed on your mobile device?
I. Yes, but at a convenient time for me (e.g., Wi-Fi availability): 50.9% (85).
II. Yes, immediately after being informed by the relevant notification: 21% (35).
III. Updates are automatically installed: 21% (35).
IV. No. I intentionally block all updates: 5.4% (9).
V. I do not know: 1.8% (3).
20
DETAIL...
 Q3. Do you perform backups of the app data collected on your smartphone?
I. Yes, data backups are automatically performed: 47.3% (79)
II. Yes, I manually perform data backups: 19.2% (32)
III. No: 31.1% (52)
IV. I do not know: 2.4% (4)
21
The Survey Report
 We selected this type of research method for three reasons:
 First, due to the descriptive nature of the question, which simply aims to
describe the variables intended to be measured.
 Second, the survey is claimed to be a good instrument for obtaining empirical
descriptions about people’s attitudes and opinions.
 Third, our target respondents were geographically dispersed and working at
home because of the restrictions in force due to the COVID-19 epidemic.
22
Results
23
Summary
 Security is always an arms race between attackers and defenders. Since the
mobile application market is growing, at the same time, mobile security will
continue to deliver a plethora of issues to face.
 In other words, security is often a matter of balancing risk and reward, defense
versus convenience. In this line of thinking, the potential risks and benefits, and
their tradeoffs, undoubtedly deserve further and deeper investigation.
 The outcome of this paper is a holistic picture of this phenomenon, which
examines the negative events, conditions and circumstances that have the
potential to cause the loss of assets, and the countermeasures that aim to
eliminate them and provide adequate and effective protection for a user.
24
Conclusion
 The conclusion that the past ten years mark only the start of the global cyber
security journey. New architectures and cooperation are still required as we
stand at the brink of a new era of cybercrime, which will be empowered by new
and emergent technology.
 These three technologies, namely, 5G networks and infrastructure convergence,
artificial intelligence, and biometrics, are going to define the next ten years of
global cyber security.
25
OTHER PAPERS
 How do I protect smartphone from security issues?
 Passcodes, fingerprint authentication and facial recognition technology
 Which is More Important, Privacy or Security
 What are the pros and cons of online privacy
26
27
ANY QUESTIONS
28

More Related Content

PPTX
Mobile security
PPTX
Mobile protection
PDF
Survey On Mobile User’s Data Privacy Threats And Defence Mechanism
PPT
Mobile app Unit 1 best notes for students .ppt
PDF
Mobile security chess board - attacks & defense
DOCX
MUC -Summary - Lessons.docx
PDF
Mobile Security Report 2009
PDF
Enhancing Cybersecurity for Mobile Applications A Comprehensive Analysis, Thr...
Mobile security
Mobile protection
Survey On Mobile User’s Data Privacy Threats And Defence Mechanism
Mobile app Unit 1 best notes for students .ppt
Mobile security chess board - attacks & defense
MUC -Summary - Lessons.docx
Mobile Security Report 2009
Enhancing Cybersecurity for Mobile Applications A Comprehensive Analysis, Thr...

Similar to presentation (20)

PPTX
Mobile Device Security
ODP
Mobile Apps Security Testing -1
PDF
Securing Mobile Apps - Appfest Version
PDF
Mobile Application Security Testing, Testing for Mobility App | www.idexcel.com
PDF
Unicom Conference - Mobile Application Security
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Securing 3-Mode Mobile Banking
PPTX
Mobile security in Cyber Security
PPTX
Security as a top of mind issue for mobile application development
PDF
Why You’ll Care More About Mobile Security in 2020 - Tom Bain
PDF
Why You'll Care More About Mobile Security in 2020
PDF
C0c0n 2011 mobile security presentation v1.2
PDF
Mobile App Security: Best Practices for Protecting User Data
DOCX
Absolutely no plagiarism  Topic Mobile users and d.docx
PPTX
Mobile security trends
PDF
CNIT 128 8: Mobile development security
PDF
Cn35499502
DOCX
Running head SECURING NATIVE APPLICATIONSSECURING NATIVE APPLIC.docx
PPTX
Owasp top-10-mobile-risks-v-1-3 publish
PDF
Securing Your Mobile Applications
Mobile Device Security
Mobile Apps Security Testing -1
Securing Mobile Apps - Appfest Version
Mobile Application Security Testing, Testing for Mobility App | www.idexcel.com
Unicom Conference - Mobile Application Security
Mobile App Security Testing_ A Comprehensive Guide.pdf
Securing 3-Mode Mobile Banking
Mobile security in Cyber Security
Security as a top of mind issue for mobile application development
Why You’ll Care More About Mobile Security in 2020 - Tom Bain
Why You'll Care More About Mobile Security in 2020
C0c0n 2011 mobile security presentation v1.2
Mobile App Security: Best Practices for Protecting User Data
Absolutely no plagiarism  Topic Mobile users and d.docx
Mobile security trends
CNIT 128 8: Mobile development security
Cn35499502
Running head SECURING NATIVE APPLICATIONSSECURING NATIVE APPLIC.docx
Owasp top-10-mobile-risks-v-1-3 publish
Securing Your Mobile Applications
Ad

More from SaveraAyub2 (7)

PPTX
DLD Lecture No 22 Decoder Circuit and Types of Decoder.pptx
PPTX
DLD Lecture No 21 BCD Multiplier and Magnitude Comparator.pptx
PPTX
DLD Lecture No 20 Look Ahead Carry Generator, Binary Subtractors and BCD Add...
PPTX
DLD Lecture No 19 Binary adders.pptx
PPTX
DLD Lecture No 18 Analysis and Design of Combinational Circuit.pptx
PPTX
DLD Lecture No 16 Don't `Care Conditions, Nand gate Implementation.pptx
PPTX
DLD Lecture No 15 Prime and Essential Implicants, Five Variable Map.pptx
DLD Lecture No 22 Decoder Circuit and Types of Decoder.pptx
DLD Lecture No 21 BCD Multiplier and Magnitude Comparator.pptx
DLD Lecture No 20 Look Ahead Carry Generator, Binary Subtractors and BCD Add...
DLD Lecture No 19 Binary adders.pptx
DLD Lecture No 18 Analysis and Design of Combinational Circuit.pptx
DLD Lecture No 16 Don't `Care Conditions, Nand gate Implementation.pptx
DLD Lecture No 15 Prime and Essential Implicants, Five Variable Map.pptx
Ad

Recently uploaded (20)

PDF
Mega Projects Data Mega Projects Data
PPTX
Major-Components-ofNKJNNKNKNKNKronment.pptx
PPTX
Database Infoormation System (DBIS).pptx
PPTX
IBA_Chapter_11_Slides_Final_Accessible.pptx
PDF
Introduction to Business Data Analytics.
PPTX
MODULE 8 - DISASTER risk PREPAREDNESS.pptx
PPTX
Introduction to Firewall Analytics - Interfirewall and Transfirewall.pptx
PPTX
DISORDERS OF THE LIVER, GALLBLADDER AND PANCREASE (1).pptx
PDF
Clinical guidelines as a resource for EBP(1).pdf
PPTX
ALIMENTARY AND BILIARY CONDITIONS 3-1.pptx
PPTX
Acceptance and paychological effects of mandatory extra coach I classes.pptx
PPTX
iec ppt-1 pptx icmr ppt on rehabilitation.pptx
PPTX
STUDY DESIGN details- Lt Col Maksud (21).pptx
PDF
BF and FI - Blockchain, fintech and Financial Innovation Lesson 2.pdf
PPT
Miokarditis (Inflamasi pada Otot Jantung)
PDF
TRAFFIC-MANAGEMENT-AND-ACCIDENT-INVESTIGATION-WITH-DRIVING-PDF-FILE.pdf
PDF
.pdf is not working space design for the following data for the following dat...
PPTX
Data_Analytics_and_PowerBI_Presentation.pptx
PPTX
Business Acumen Training GuidePresentation.pptx
PDF
Fluorescence-microscope_Botany_detailed content
Mega Projects Data Mega Projects Data
Major-Components-ofNKJNNKNKNKNKronment.pptx
Database Infoormation System (DBIS).pptx
IBA_Chapter_11_Slides_Final_Accessible.pptx
Introduction to Business Data Analytics.
MODULE 8 - DISASTER risk PREPAREDNESS.pptx
Introduction to Firewall Analytics - Interfirewall and Transfirewall.pptx
DISORDERS OF THE LIVER, GALLBLADDER AND PANCREASE (1).pptx
Clinical guidelines as a resource for EBP(1).pdf
ALIMENTARY AND BILIARY CONDITIONS 3-1.pptx
Acceptance and paychological effects of mandatory extra coach I classes.pptx
iec ppt-1 pptx icmr ppt on rehabilitation.pptx
STUDY DESIGN details- Lt Col Maksud (21).pptx
BF and FI - Blockchain, fintech and Financial Innovation Lesson 2.pdf
Miokarditis (Inflamasi pada Otot Jantung)
TRAFFIC-MANAGEMENT-AND-ACCIDENT-INVESTIGATION-WITH-DRIVING-PDF-FILE.pdf
.pdf is not working space design for the following data for the following dat...
Data_Analytics_and_PowerBI_Presentation.pptx
Business Acumen Training GuidePresentation.pptx
Fluorescence-microscope_Botany_detailed content

presentation

  • 1. 1
  • 2. Mobile Phone Security and Privacy 2
  • 3. LIST OF RESEARCH PAPERS  Real World smartphone based gait recognition (2020)  Authentication of Portable Devices for Security(2017)  Adaptive Cross-Device Gait Recognition Using a Mobile Accelerometer(2019)  Smartphone Security and Protection Practices(2020)  Mobile Security: Threats and Best Practices(2021) 3
  • 4. Smartphone Security and Protection Practices  JOURNAL  VOLUME 2020  Gdansk University of Technology, Narutowicza 11/12, Gdansk, Poland 4
  • 6. Contents  Introduction  Focused points  Problem statement  Methodology  Solution  Summary  Conclusion 6
  • 7. Paper Sections  Section 1 taking a RQs.  Section 2 presents the research background and motivation.  Section 3 provides a summary of the identified mobile security threats.  Section 4, in the same manner, reviews the best practices.  Section 5 shows a comprehensive report from the conducted survey.  Section 6 presents general discussion, along with the theoretical and practical implications, as well a the study limitations and future work agenda.  Finally, Section 7 concludes the paper. 7
  • 8. INTRODUCTION  Communicating mobile security threats and best practices has become a central objective due to the ongoing discovery of new vulnerabilities of mobile devices.  To cope with this overarching issue, the goal of this paper is to identify and analyze existing threats and best practices in the domain of mobile security.  These devices, based on a specific operating system, enable users to install a vast variety of applications, commonly referred to as “apps,” from online sources called markets: Apple App Store, and Google Play. 8
  • 9. Detail...  The app markets allow users to perform a quick search and installation of new apps, but at the same time, they are also a source of different kinds of malware disguised as normal apps.  Nowadays, mobile devices are subject to a wide range of security challenges and malicious threats.  we can observe rapid growth in the domains of both mobile developers and users.  Mobile devices are treated by their users as very personal tools, mainly used to facilitate everyday operations, but they also serve to store very sensitive personal information. 9
  • 10. Problem Statement  Hence, we can observe rapid growth in the domains of both mobile developers and users.  Mobile devices are treated by their users as very personal tools, mainly used to facilitate everyday operations, but they also serve to store very sensitive personal information.  The app markets allow users to perform a quick search and installation of new apps, but at the same time, they are also a source of different kinds of malware disguised as normal apps. 10
  • 11. Focused points  The goal of this study is to identify and analyze security threats to mobile applications on the one hand and contemporary best practices on the other hand. Therefore, we put forward the three following research questions:  RQ1. What are the security threats to mobile applications?  RQ2. What are the best practices to protect mobile applications?  RQ3. Which best practices are in use and to what extent by mobile application users? 11
  • 12. Detail....  To answer RQ1 and RQ2, we performed a literature review based on a combination of the keywords “mobile application,” “threat,” and “best practice” in an electronic search with Google web search engine and Google Scholar.  These two platforms promptly rose to become dominant providers of information and scholarly literature. While the former, in 2019, was a search engine leader worldwide, accounting for 88.5 percent of global market share. 12
  • 13. Detail...  To answer RQ3, we conducted an anonymous survey and asked mobile application users to fill in a questionnaire which was divided into two parts.  where the first directly referred to the subject of the research and the second collected demographic data.  In total, we examined the responses from 167 users regarding their adoption of ten mobile security best practices by users in Poland. 13
  • 14. Mobile Security Threats  Users of mobile devices or so-called mobile users are increasingly subject to malicious activity, mainly concerning pushing malware apps to smartphones, tablets, or other devices using a mobile OS.  These handheld devices, carried in our pockets, are used to store and protect sensitive information.  Even though Google and Apple offer distribution environments that are closed and controlled, users are still exposed to different kinds of attacks. 14
  • 15. Detail... A few of them are given in the following  Phishing in an app  Supply chain compromise  Crypto miner code in games or utilities  Click-fraud advertising embedded in apps 15
  • 16. 10 Crucial Web Application It is also crucial to mention top 10 web application security risks according to the most prominent security community worldwide named OWASP Foundation.  Injection  Broken Authentication  Sensitive Data Exposure  XML External Entities  Broken Access Control  Security Misconfiguration  Cross-Site Scripting XSS  Insecure Deserialization  Using Components with Known Vulnerabilities  Insufficient Logging & Monitoring 16
  • 17. Mobile Security Best Practices Mobile security best practices are recommended guidelines and safeguards for protecting mobile devices and users’ data.  Make user authentication the highest priority  Update mobile operating systems  Back up user data on a regular basis  Utilize encryption  Enable remote data wipe  Disable Bluetooth and Wi-Fi when not needed  Be sure not to grant unnecessary permissions to applications  Install mobile security and antivirus applications 17
  • 18. The Survey Design and Settings  The survey consisted of two parts.  The first part included ten questions that addressed the best practice usage by the mobile application users.  The second part, including five questions, aimed at collecting demographic data (gender and age), as well as the level of education, professional experience (in years), and the sector of professional activity (also in years). We used Google Forms to collect the data since they have the benefits of being user-friendly and free of charge. 18
  • 19. Findings and Discussion  Q1. Which authentication method do you use to secure your smartphone? I. Fingerprint scanner: 53.3% (89) II. PIN: 12.6% (21) III. Pattern lock: 12% (20) IV. Facial recognition: 10.2% (17) V. Password: 4.8% (8) VI. Iris scanner: 1.2% (2) VII. None: 6% (10) 19
  • 20. Detail...  Q2. Do you update the mobile applications installed on your mobile device? I. Yes, but at a convenient time for me (e.g., Wi-Fi availability): 50.9% (85). II. Yes, immediately after being informed by the relevant notification: 21% (35). III. Updates are automatically installed: 21% (35). IV. No. I intentionally block all updates: 5.4% (9). V. I do not know: 1.8% (3). 20
  • 21. DETAIL...  Q3. Do you perform backups of the app data collected on your smartphone? I. Yes, data backups are automatically performed: 47.3% (79) II. Yes, I manually perform data backups: 19.2% (32) III. No: 31.1% (52) IV. I do not know: 2.4% (4) 21
  • 22. The Survey Report  We selected this type of research method for three reasons:  First, due to the descriptive nature of the question, which simply aims to describe the variables intended to be measured.  Second, the survey is claimed to be a good instrument for obtaining empirical descriptions about people’s attitudes and opinions.  Third, our target respondents were geographically dispersed and working at home because of the restrictions in force due to the COVID-19 epidemic. 22
  • 24. Summary  Security is always an arms race between attackers and defenders. Since the mobile application market is growing, at the same time, mobile security will continue to deliver a plethora of issues to face.  In other words, security is often a matter of balancing risk and reward, defense versus convenience. In this line of thinking, the potential risks and benefits, and their tradeoffs, undoubtedly deserve further and deeper investigation.  The outcome of this paper is a holistic picture of this phenomenon, which examines the negative events, conditions and circumstances that have the potential to cause the loss of assets, and the countermeasures that aim to eliminate them and provide adequate and effective protection for a user. 24
  • 25. Conclusion  The conclusion that the past ten years mark only the start of the global cyber security journey. New architectures and cooperation are still required as we stand at the brink of a new era of cybercrime, which will be empowered by new and emergent technology.  These three technologies, namely, 5G networks and infrastructure convergence, artificial intelligence, and biometrics, are going to define the next ten years of global cyber security. 25
  • 26. OTHER PAPERS  How do I protect smartphone from security issues?  Passcodes, fingerprint authentication and facial recognition technology  Which is More Important, Privacy or Security  What are the pros and cons of online privacy 26
  • 27. 27