mobile_security_tutorial.pdf - Let Mobile Security About...

  • No School
  • AA 1
  • BrigadierHawk9026
  • 80
  • 100% (1) 1 out of 1 people found this document helpful

This preview shows page 1 - 5 out of 80 pages.

Let
Image of page 1
Mobile Security i About the Tutorial Mobile security is a concept that has gained a lot of importance ever since the launch of the first mobile OS, Symbian, which was launched by Nokia. It is continuing to gain significance with the massive use of Android OS. This tutorial will take you through the simple and practical approaches to implement mobile security techniques. Audience This tutorial has been prepared for beginners to IT administrators to help them understand the basic-to-advanced concepts related to mobile security that they can use in daily life and in their organizations. Prerequisites This is a very basic tutorial that should be useful for most users. Before you start practicing the various types of security options given in this tutorial, we assume that you are well- aware of the various features available in a standard smartphone. Disclaimer & Copyright Copyright 2016 by Tutorials Point (I) Pvt. Ltd. All the content and graphics published in this e-book are the property of Tutorials Point (I) Pvt. Ltd. The user of this e-book is prohibited to reuse, retain, copy, distribute or republish any contents or a part of contents of this e-book in any manner without written consent of the publisher. We strive to update the contents of our website and tutorials as timely and as precisely as possible, however, the contents may contain inaccuracies or errors. Tutorials Point (I) Pvt. Ltd. provides no guarantee regarding the accuracy, timeliness or completeness of our website or its contents including this tutorial. If you discover any errors on our website or in this tutorial, please notify us at [email protected]
Image of page 2
Mobile Security ii Table of Contents About the Tutorial .................................................................................................................................. i Audience ................................................................................................................................................ i Prerequisites .......................................................................................................................................... i Disclaimer & Copyright ........................................................................................................................... i Table of Contents .................................................................................................................................. ii 1. MOBILE SECURITY − IN TRODUCTION ................................................................................. 1 2. MOBILE SECURITY − AT TACK VECTORS ............................................................................... 3 Consequences of Attack Vectors ............................................................................................................ 4 Anatomy of a Mobile Attack .................................................................................................................. 4 OWASP Mobile Top 10 Risks .................................................................................................................. 6 3. MOBILE SECURITY − AP P STORES & SECURITY ISSUES ........................................................ 9 App Sandboxing Issues .......................................................................................................................... 9 4. MOBILE SECURITY − MO BILE SPAM .................................................................................. 10 Why SMS Phishing is Effective? ........................................................................................................... 10 SMS Phishing Attack Examples ............................................................................................................ 11 Prevention and Solutions .................................................................................................................... 15 Pairing Mobile Devices on Open Bluetooth and Wi-Fi Connections ..................................................... 15 5. MOBILE SECURITY − AN DROID OS .................................................................................... 17 Android OS Architecture ...................................................................................................................... 17 Android Device Administration API ..................................................................................................... 18 6. MOBILE SECURITY − AN DROID ROOTING ......................................................................... 21 Android Rooting Tools ......................................................................................................................... 21 Rooting Android Phones using SuperOneClick Rooting ........................................................................ 23
Image of page 3
Mobile Security iii Rooting Android Phones Using Superboot ........................................................................................... 24 Android Trojan .................................................................................................................................... 25 7. MOBILE SECURITY − SE CURING ANDROID DEVICES .......................................................... 29 Google Apps Device Policy ................................................................................................................... 29 Remote Wipe Service .......................................................................................................................... 30 8. MOBILE SECURITY − AN DROID SECURITY TOOLS .............................................................. 32 DroidSheep Guard ............................................................................................................................... 32 TrustGo Mobile Security and Sophos Mobile Security ......................................................................... 33 Sofo ..................................................................................................................................................... 33 360 Security & Avira Antivirus Security ................................................................................................ 34 Android Vulnerability Scanner: X-Ray .................................................................................................. 35 Android Device Tracking Tools ............................................................................................................. 36 9. MOBILE SECURITY − AP PLE IOS ........................................................................................ 39 Jailbreaking iOS ................................................................................................................................... 39 Types of Jailbreaking ........................................................................................................................... 40 Jailbreaking Techniques ....................................................................................................................... 40 App Platform for Jailbroken Devices: Cydia ......................................................................................... 41 Jailbreaking Tools ................................................................................................................................ 42 10.
Image of page 4
Image of page 5

You've reached the end of your free preview.

Want to read all 80 pages?

  • Fall '19
  • Windows Mobile, Mobile operating system

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture