Uploaded by Paul Castillo

Computer and Mobile Device Security Threats

advertisement
Computer and Mobile Device
Security Threats
Paul S. Castillo
Introduction
• Linking communities and dissolving geographic boundaries.
• New avenues for crime and fraud.
Literature Review
Advancements in digital technologies have altered many aspects of
Philippine society. The impressive economic growth from 2010–2020
was parallel to tremendous advances in digital technologies, opening
opportunities in new sectors. The opportunities from digital
innovations were accelerated by the COVID-19 pandemic as
limitations on mobility prompted citizens to accelerate migration to
digital spaces[1]. Recent years have shown a significant increase in the
popularity and ubiquity of mobile devices among users all around the
globe[2] Mobile devices are treated by their users as very personal
tools, mainly used to facilitate everyday operations, but they also
serve to store very sensitive personal information[3].
Security
versus
Theory Concept
Discussion
• The worldwide information security market is forecast to reach
$170.4 billion in 2022 (3)
1) Data leakage: 71% of breaches were motivated by financial
aspect and 25% by espionage
2) Malware or malicious software: among most malicious e-mail
attachments are .doc and .dot which make 37%, and the
second highest is .exe
3) Phishing and social engineering: 62% of business experienced
this type of attack in 2018
P. Weichbroth and Ł. Łysik
Discussion
4) Direct hacker attack: data breaches exposed 4.1 billion
records in the first half of 2019
5) Intercepting communication: hackers globally attack every
39 seconds which makes, on average, 2244 times per day
6) Stolen and lost phones: by 2020, the estimated number of
passwords used by users will grow to 3000 billion
7) User behavior: 64% of Americans have never checked to see
if they were affected by data breach
Discussion
• According to Kaspersky Resource Center (Top 7 Mobile
Device Threats)
1) Data Leakage
2) Unsecured Wi-Fi
3) Network Spoofing
4) Phishing Attacks
5) Spyware
6) Broken Cryptography
7) Improper Session Handling
Discussion
•
Y. Murat, Y. Yalman, Security Threats on
Mobile Devices and their Effects:
Estimations for the Future, International
Journal of Security and Its Applications
Conclusion
Security is always an arms race between
attackers and defenders. Since the mobile
application market is growing, at the same
time, mobile security will continue to
deliver a plethora of issues to face.
Recommendations
1) Make user authentication the highest priority.
2) Update mobile operating systems and on-board
applications with security patches.
3) Back up user data on a regular basis.
4) Utilize encryption.
5) Enable remote data wipe.
6) Disable Bluetooth and Wi-Fi when not needed.
7) Be aware of social engineering techniques.
Recommendations
8) Be sure not to jailbreak your device.
9) Be sure not to grant unnecessary permissions to
applications.
10) Install mobile security and antivirus applications.
References
• Cybersecurity in the Philippines: Global Context and Local
Challenges A Report by Secure Connections-An Initiative of The Asia
Foundation 2022
• Statista, Smartphones—Statistics & Facts, Statista, Hamburg,
Germany, 2020, https://www.statista.com/topics/840/
smartphones/.
• A. Papageorgiou, M. Strigkos, E. Politou, E. Alepis, A. Solanas, and C.
Patsakis, “Security and privacy analysis of mobile health
applications: the alarming state of practice,” IEEE Access, vol. 6, pp.
9390–9403, 2018.
References
• E. Kim, D. Gardner, S. Deshpande, R. Contu, D. Kish, and C. Canales,
“Forecast analysis: information security, worldwide, 2Q18 update,”
2020, https://www.gartner.com/ en/documents/3889055.
• Y. Murat, Y. Yalman, Security Threats on Mobile Devices and their
Effects: Estimations for the Future, International Journal of Security and
Its Applications Vol. 10, No. 2 (2016), pp.13-26
• P. Weichbroth and Ł. Łysik, Mobile Security: Threats and Best Practices,
Hindawi Mobile Information Systems Volume 2020, Article ID 8828078,
15 pages
• N. Thompson, TJ McGill, X Wang, “Security Begins at Home”:
Determinants of home computer and mobile device security behavior
https://doi.org/10.1016/j.cose.2017.07.003
Salamat!
Download