Send the link below via email or IMCopy
Present to your audienceStart remote presentation
- Invited audience members will follow you as you navigate and present
- People invited to a presentation do not need a Prezi account
- This link expires 10 minutes after you close the presentation
- A maximum of 30 users can follow your presentation
- Learn more about this feature in our knowledge base article
Do you really want to delete this prezi?
Neither you, nor the coeditors you shared it with will be able to recover it again.
Make your likes visible on Facebook?
Connect your Facebook account to Prezi and let your likes appear on your timeline.
You can change this under Settings & Account at any time.
Security That Might Fly Under Your Radar
Transcript of Security That Might Fly Under Your Radar
loss of sensitive data
loss of privacy Threat Social engineering Example
Computer-based. Possible consequences
loss of sensitive data Malware Malicious code usually embedded in genuine applications with the aim of compromising your device. Downloading applications for your devices!! Possible consequences
deviations in the way your device function.
Your mobile device may turn into a platform for launching attacks. Information theft on an open network Example Possible Consequences
Loss of control over your device (stub-net)
Loss of sensitive information.
Loss of privacy Best Practice i. Be alert and keep your mobile devices close to you.
ii. Be aware of what is happening in the surrounding.
iii. Install anti-virus on mobile device. iv. Do not connect your mobile device to unsafe devices (laptop/ workstation).
v. Transmit sensitive information over encryted network channel. vi. Backup your important information.
vii. Do not download applications from unknown/untrusted sources. Future of Mobile Devices
Security Concern Near Field Technology New technology that is based on short-range wireless connectivity technology.
Turn your mobile device into a mobile wallet or more. Conclusion Question and Feedback By
Emma Johns, Chee Seng, Vo Nhu Tuan
Teo Swee Kiat, Rayden Goh Kah Yong the act of manipulating people into performing actions or divulging confidential information. Zeus Malware Targets Mobile Phone Users http://www.facebook.com/pages/Smartphone-Security/126687924069372 Join Summary A banking Trojan, mainly targets Windows machines and users.
Spreading towards mobile users under the name SymbOS/Zitmo.
Zeus can stop and redirect confirmation SMS of online banking -> hackers can approve transactions by themselves! Scenario You click an unknown/malicious link or get a spam email, redirected to websites having the malware.
Zeus asks for your mobile phone number.
It uses your credential to send a SMS having some rouge.
It keeps track of your incoming SMS and opens backdoor to snatch your credential Example
Loss of Mobile Device Intruders can use software tools to view, modify and disrupt network communication on open network. Mobile threats are real and getting increasingly serious.
Be careful, protect yourselves by following best practices
Facebook fan page : news on mobile security and tips. Bluetooth Threat: All information gather in one place, risk of loss everything if mobile device get compromised. We aim to increase YOUR awareness towards security issues concerning mobile devices! Tutorial group 2 Team 4