Cybercrime Mobile Wireless devices draft
Cybercrime Mobile Wireless devices draft
[Unit 2-
Cybercrime Mobile & Wireless devices: Security challenges posted by mobile devices, cryptographic
Security for mobile devices, Attacks on mobile/cell phones, Theft, Virus, Hacking. Bluetooth;
Different viruses on laptop [8L]
Introduction
In this modern era, the rising importance of electronic gadgets (i.e., mobile hand-held devices) – which
became an integral part of business, providing connectivity with the Internet outside the office – brings
many challenges to secure these devices from being a victim of cybercrime.
By the end of 2008 around 1.5 billion individuals around the world had the Internet access.
y of managing these devices outside the walls of the office is something that the nformation
technology (IT) departments in the organizations need to address.
have converged
into a new category of mobile phone device: the Smartphone.
Smartphones combine the best aspects of mobile and wireless technologies and blend them into a useful
business tool.
clearly, these technological developments present a new set of security challenges to the global
organizations.
-held mobile device provides enough computing power to run small applications, play
games and music, and make voice calls.
device‖ includes many products. We first provide a clear distinction among the key
terms: mobile computing, wireless computing and hand-held devices.
Mobile computing
Mobile computing is ―taking a computer and all necessary files and software out into the field.‖ Many types
of mobile computers have been introduced since 1990s.
1. Portable computer: It is a general-purpose computer that can be easily moved from one place to
another, but cannot be used while in transit, usually because it requires some ―setting-up‖ and an AC power
source.
2. Tablet PC: It lacks a keyboard, is shaped like a slate or a paper notebook and has features of a touch
screen with a stylus and handwriting recognition software. Tablets may not be best suited for applications
requiring a physical keyboard for typing, but are otherwise capable of carrying out most tasks that an
ordinary laptop would be able to perform.
3. Internet tablet: It is the Internet appliance in tablet form. Unlike a Tablet PC, the Internet tablet does not
have much computing power and its applications suite is limited. Also it cannot replace a general-purpose
computer. The Internet tablets typically feature an MP3 and video player, a Web browser, a chat application
and a picture viewer.
4. Personal digital assistant (PDA): It is a small, usually pocket-sized, computer with limited functionality.
It is intended to supplement and synchronize with a desktop computer, giving access to contacts, address
book, notes, E-Mail and other features.
6. Smartphone: It is a PDA with integrated cell phone functionality. Current Smartphones have a wide
range of features and installable applications.
8. Fly Fusion Pentop computer: It is a computing device with the size and shape of a pen. It functions as a
writing utensil, MP3 player, language translator, digital storage device and calculator.
Wireless computing
(such as a PDA)
and a data source (such as an agency database server) without a physical connection.
nologies are mobile. For example, lasers are used in wireless data
transfer between buildings, but cannot be used in mobile communications at this time.
-helds are defined as hand-held or pocket-sized devices that connect to a wireless or cellular
network, and can have software installed on them; this includes networked PDAs and Smartphones.
Trends in Mobility
technology is rapidly gaining popularity and the attackers (hackers and crackers) are
among its biggest fans.
Seriousness of cyber
security issues in the mobile computing domain.
1. Malwares, viruses and worms: Although many users are still in the transient process of switching from
2G, 2.5G to 3G, it is a growing need to educate the community people and provide awareness of such threats
that exist while using mobile devices. Here are few examples of malware(s) specific to mobile devices
:
• Skull Trojan: It targets Series 60 phones equipped with the Symbian mobile OS.
• Cabir Worm: It is the first dedicated mobile-phone worm; infects phones running on Symbian OS and
scans other mobile devices to send a copy of itself to the first vulnerable phone it finds through Bluetooth
Wireless technology. The worst thing about this worm is that the source code for the Cabir-H and Cabir-I
viruses is available online.
• Mosquito Trojan: It affects the Series 60 Smart phones and is a cracked version of―Mosquitos‖ mobile
phone game.
• Brador Trojan: It affects the Windows CE OS by creating a svchost.exe file in the Windows start-up
folder which allows full control of the device. This executable file is conductive to traditional worm
propagation vector such as E-Mail file attachments
• Lasco Worm: It was released first in 2005 to target PDAs and mobile phones running the Symbian OS.
Lasco is based on Cabir’s source code and replicates over Bluetooth connection. Unavailable to the intended
users. Virus attacks can be used to damage the system to make the system unavailable.
3. Overbilling attack: Overbilling involves an attacker hijacking a subscriber’s IP address and then using it
(i.e., the connection) to initiate downloads that are not ―Free downloads‖ or simply use it for his/her own
purposes. In either case, the legitimate user is charged for the activity which the user did not conduct.
4. Spoofed policy development process (PDP): These types of attacks exploit the vulnerabilities in the
GTP [General Packet Radio Service (GPRS) Tunnelling Protocol].
5. Signaling-level attacks: The Session Initiation Protocol (SIP) is a signalling protocol used in IP
multimedia subsystem (IMS) networks to provide Voice Over Internet Protocol (VoIP) services. There are
several vulnerabilities with SIP-based VoIP systems.
e now becoming commonplace given the ever- increasing power and the ever-
reducing prices of the mobile hand-held devices, factors that result in easy availability of these gadgets to
almost anyone.
Mobile credit card transactions are now very common; new technologies combine low cost mobile phone
technologies with the capabilities of a point-of-sale (POS) terminal.
process
transactions from mobile locations quickly, efficiently and professionally.
cards.
Credit card companies, normally, do a good job of helping consumers resolve identity(ID) theft problems
once they occur. But they could reduce ID fraud even more if they give consumers better tools to monitor
their accounts and limit high-risk transactions
1. Merchant sends a transaction to bank;
2. The bank transmits the request to the authorized cardholder[not short message service (SMS)];
3. The cardholder approves or rejects (password protected);
4. The bank/merchant is notified;
5. The credit card transaction is completed.
Do’s
2. Make the photocopy of both the sides of your card and preserve it at a safe place to remember the card
number, expiration date in case of loss of card.
3. Change the default personal identification number (PIN) received from the bank beforedoing any
transaction.
4. Always carry the details about contact numbers of your bank in case of loss of your card.
5. Carry your cards in a separate pouch/card holder than your wallet.
6. Keep an eye on your card during the transaction, and ensure to get it back immediately.
7. Preserve all the receipts to compare with credit card invoice.
8. Reconcile your monthly invoice/statement with your receipts.
9. Report immediately any discrepancy observed in the monthly invoice/statement.
10. Destroy all the receipts after reconciling it with the monthly invoice/statement.
11. Inform your bank in advance, about any change in your contact details such as home address, cell phone
number and E-Mail address.
12. Ensure the legitimacy of the website before providing any of your card details.
13. Report the loss of the card immediately in your bank and at the police station, if necessary.
Dont’s
o first, on the hand-held devices, information is being taken outside the physically controlled environment
and
o second remote access back to the protected environment is being granted.
-known technical challenges in mobile security are: managing the registry settings and
configurations, authentication service security, cryptography security, Lightweight Directory Access
Protocol (LDAP) security, remote access server (RAS) security, media player control security, networking
application program interface (API) security, etc.
le:
o ActiveSync acts as the gateway between Windows-powered PC and Windows mobile-powered device,
enabling the transfer of applications such as Outlook information, Microsoft Office documents, pictures,
music, videos and applications from a user’s desktop to his/her device.
o In addition to synchronizing with a PC, ActiveSync can synchronize directly with the Microsoft exchange
server so that the users can keep their E-Mails, calendar, notes and contacts updated wirelessly when they
are away from their PCs.
o In this context, registry setting becomes an important issue given the ease with which various
applications allow a free flow of information.
Wireless and mobile devices have become ubiquitous in today’s society, and with this increased usage
comes the potential for security threats. Wireless and mobile device attacks are a growing concern for
individuals, businesses, and governments.
Below are some of the most common types of Wireless and Mobile Device Attacks
Our smartphones are always an arm’s length away, but how many of us are wise to the risks of using them?
Mobile security threats are on the rise: Mobile devices now account for more than 60 percent of digital
fraud, from phishing attacks to stolen passwords. Using our phones for sensitive business such as banking
makes security even more essential. ―The more you depend on your phone for everyday tasks, the more it
will impact you if your device is compromised,‖ says Randy Pargman, senior director for Binary Defense, a
cybersecurity company. That’s also one of the reasons you should never store certain things on your
smartphone.
Luckily, you can still use your phone safely by staying informed and taking precautions. To that end, we
rounded up this year’s biggest threats to smartphone security, as well as some expert tips that will help you
protect yourself, your phone, and your info.
Data leaks
Before installing a new app on your smartphone, you might want to read the fine print. Nearly every
smartphone app collects data from your phone, according to Pargman. That info could include your name,
date of birth, credit card and bank account information, location history, contact list, photos, and more. ―It’s
a little scary when you realize just how much of your activity is collected on servers maintained by the app
developers,‖ Pargman says. If those servers are hacked or if a technical error leaves them vulnerable, all of
that data can be stolen and used by criminals for fraud. Pargman suggests adjusting the security controls on
your device to limit the data collected by each app and thinking twice before downloading any new app that
requests a lot of permissions. FYI, if these apps are on your phone, someone may be spying on you.
Open WiFi
Connecting to open WiFi networks that do not require a password or use encryption is convenient when
you’re in a pinch. But doing so could allow anyone nearby to easily spy on all of your online activity,
Pargman says. Even worse, a cybercriminal can create a phony WiFi hotspot in order to trick users to
connect to it and steal their data. For example, instead of going to your bank’s website, the WiFi network
could direct you to a page that looks just like it and swipe your password when you try to log in. ―The safest
approach is to only connect to WiFi access points that you know and trust,‖ Pargman says. ―Don’t just
connect to anything you find.‖ If you really have no choice, make sure you never do these things when using
public Wi-Fi.
Phishing attacks
Cybercriminals often use email, text messages, and even voice calls to fool their targets into giving up a
password, clicking on a link to download malware, or confirming a transaction—a practice known as
phishing. ―Phishing remains one of the most often-used and successful tricks that cybercriminals use to
compromise victims,‖ Pargman says of this mobile security threat. To avoid falling for a phishing scam,
always verify who is contacting you for your personal information. For example, Pargman recommends
telling the caller claiming to be your bank that you’ll call back using the bank’s official phone number. You
should also delete these texts immediately because they are likely scams.
Spyware
Beware of apps that promise to monitor the activity of your loved ones and children—in reality, they
are spyware that is ―designed to allow extremely invasive digital surveillance through a smartphone,‖
Pargman says. Abusers can use these apps to read texts and emails, track the phone’s location, secretly listen
to nearby conversations, and take pictures, among other activities. Even less insidious apps can still collect
data about what you do on your smartphone, Pargman says. While making your phone impossible to
track can be hard, it’s still quite possible to do it to a certain extent to ensure safety. He suggests avoiding
apps that request a lot of permissions or any permission having to do with accessibility. ―Those permissions
give apps the ability to read the text in other apps or control other apps—that’s a lot of power that can be
abused,‖ he explains. Watch out for these red flags someone is spying on your computer, too.
Malicious apps
If you think an app is too good to be true, it probably is, according to Pargman. He calls this the Trojan
Horse trick: An app may appear to be beneficial—offering free access to something that should cost
money—but it actually contains a virus. ―People who take the bait and install these malicious apps are often
surprised to find that instead of the promised free material they were hoping for, their entire smartphone is
locked, or their data is stolen, and they are faced with threats,‖ Pargman says. Other times, the virus might
secretly transfer money to the attacker’s accounts through the phone’s online banking app. ―The best cure
for these malicious apps is prevention,‖ notes Pargman. Steer clear of apps that promise free access to
premium content, aren’t listed in well-known app stores, and don’t have a history of reviews. These are
the apps security experts would never have on their phone.
Without strong security standards, many smartphone apps can make your information vulnerable to
malicious actors. App developers might use weak encryption algorithms that are easy to hack, or
unintentionally share digital ―tokens‖ that allow hackers to impersonate real people online. Unfortunately,
there is ―very little that the average person can do to know which apps don’t do a good job with security,‖
according to Pargman. A good guideline is to be smart about the data you want to entrust to each app, he
says. While you may feel comfortable allowing an app to save your email address, you should be more
cautious about giving an app permission to access your contacts or store sensitive information such as your
Social Security Number or date of birth. You can check out these mobile security apps to help protect your
information.
More than half of Americans reuse passwords across multiple accounts, a 2019 Google/Harris poll found.
Those passwords are catnip for cybercriminals, who can gain access to hundreds of accounts by purchasing
massive lists of hacked and leaked passwords on the dark web. To protect your accounts from hackers,
Pargman suggests setting up multi-factor authentication, as well as using a password manager app to
generate and store unique passwords for every account. ―That way, you don’t need to use your pet’s name as
your only form of protection to keep your money where it belongs and out of the pockets of thieves,‖ he
says. As you secure your accounts, avoid the password mistakes hackers hope you make.
Out-of-date devices
When was the last time you updated your phone? It may be key to protecting your device against malware
and other cyberattacks. Phones that are too old to receive security updates should be replaced, according to
Pargman. ―Even if it seems to still run, there’s risk in using an old phone that hasn’t received the latest
security updates,‖ he says. You can find out how long your device will be updated by checking the ―end of
life‖ or ―end of support‖ date on the manufacturer’s website. Samsung updates devices for up to four years,
Apple provides regular updates for iPhones for about five to six years, and Google supports its Pixel line of
phones for at least three years. FYI, that’s not the only warning sign it’s time for a new cell phone.
Identity theft
Reports of identity theft have sharply increased in the past few years, with millions of cases detected since
March 2020 alone. Recently, thieves have used stolen identities to open new mobile phone accounts, or
hijack an existing account and upgrade phones or add phone lines. Victims may receive large bills from their
carrier or charges from accounts with other carriers that identity thieves opened without the victims’
knowledge. Secure your mobile phone account by creating a password or PIN with your carrier, which will
be required to make any changes to your account in the future. Hackers can also do these scary things with
your cellphone number.
In addition to taking specific precautions for each of the mobile security threats listed above, Pargman
recommends downloading anti-virus programs for your smartphone. Apps like Norton Security and
Antivirus, McAfee Mobile Security, and Kaspersky Antivirus and Security can help to spot malicious apps
if they have been installed. You should also make sure to keep your smartphone’s operating system
(Android or iOS) up to date at all times, he says. Here are more tips to protect your phone from viruses.
Cryptographically Generated Addresses (CGA) is Internet Protocol version 6 (IPv6) that addresses up to
64 address bits that are generated by hashing owner’s public-key address.
and to sign
messages sent from the address without a public-key infrastructure (PKI) or other security infrastructure.
PKI provides many benefits for users to secure their financial transactions initiated from
mobile devices.
-based authentication can be used to protect IP-layer signalling protocols including neighbour
discovery (as in context-aware mobile computing applications) and mobility protocols.
Palms (devices
that can be held in one’s palm) are one of the most common hand-held devices used in mobile computing.
these capabilities,
allowing the encryption of only selected data or of all data and resources on the device.
LDAP (Lightweight Directory Access Protocol) Security for Hand-Held Mobile Computing Devices.
cyber security, mobile devices are sensitive. Figure below organizations sensitive data can
happen through mobile hand-held devices carried by employees.
In addition to being vulnerable to unauthorized access on their own, mobile devices alsoprovide a route into
the systems with which they connect.
port scanning.
File Transfer Protocol (FTP) transmissions are typically assigned to port 21.
are many examples to show how a media player can turn out to be a source of
threat to information held on mobile devices.
hat a series of flaws in itsWindows Media
Player could allow a malicious hacker to hijack people’s computer systems and perform a variety of actions.
Web services and their use in mobile computing applications, the API
becomes an important consideration.
transformed
from being a luxury to a bare necessity.
number of false
claims.
her mobile phone, more than anything ―Contact List‖ and Personally Identifiable
Information (PII)‖, that really matter, are lost
often attacked by
viruses; however, criminals made this thought as false statement.
being the
increasing usage of cell phones and availability of Internet using cell phones.
ng demand for Wi-Fi zones in the metropolitans and extensive usage of cell
phones in the youths with lack of awareness/knowledge about the vulnerabilities of the technology.
2. Enough functionality: The expanded functionality ie. office functionality and applications also increases
the probability of malware.
3. Enough connectivity: Smartphones offer multiple communication options, such as SMS, MMS,
synchronization, Bluetooth, infrared (IR) and WLAN connections.
-digit
number and can be obtained by entering *#06# from the keypad.
therefore can be used to stop
a stolen phone from accessing the network in that country.
service provider and instruct them
to ―lock‖ the phone using its IMEI number.
untry, even if a SIM is changed.
about your cell phone such as manufacturer, model type and country of approval of a handset.
Mobile Viruses
Following are some tips to protect mobile from mobile malware attacks:
1. Download or accept programs and content (including ring tones, games, video clips andphotos) only from
a trusted source.
2. If a mobile is equipped with Bluetooth, turn it OFF or set it to non-discoverable mode when it is not in use
and/or not required to use.
3. If a mobile is equipped with beam (i.e., IR), allow it to receive incoming beams, only from the trusted
source.
4. Download and install antivirus software for mobile devices.
Mishing
-Commerce is fast becoming a part of everyday life. If you use your mobile phone forpurchasing
goods/services and for banking, you could be more vulnerable to a Mishingscam.
Vishing or message (SMS) known as Smishing.
r organization and willclaim a need for
your personal details.
they need this
information from you.
Vishing
usually used to steal credit card numbers or other related data used in ID theft
schemes from individuals.
depends upon
information gathered by a criminal and criminal’s will to reach a particularaudience.
1. Internet E-Mail:
2. Mobile text messaging:
3. Voicemail:
4. Direct phone call:
Following are the steps detailing on how direct phone call works:
• The criminal gathers cell/mobile phone numbers located and steals mobile phone numbers after accessing
cellular company.
• The criminal often uses a dialer to call phone numbers of people from a specific region, and that to from
the gathered list of phone numbers.
• When the victim answers the call, an automated recorded message is played to alert the victim that his/her
credit card has had fraudulent activity and/or his/her bank account has had unusual activity.
The message instructs the victim to call one phone number immediately.
The same phone number is often displayed in the spoofed caller ID, under the name of the financial
company the criminal is pretending to represent.
• When the victim calls on the provided number, he/she is given automated instructions to enter his/her
credit card number or bank account details with the help of phone keypad.
• Once the victim enters these details, the criminal (i.e., visher) has the necessary information to make
fraudulent use of the card or to access the account.
• Such calls are often used to gain additional details such as date of birth, credit cardexpiration date, etc.
Some of the examples of vished calls, when victim calls on the provided number after
receiving phished E-Mail and/or after listening voicemail, are as follows:
1. Automated message: Thank you for calling (name of local bank). Your business isimportant to us. To
help you reach the correct representative and answer your query fully,please press the appropriate number
on your handset after listening to options.• Press 1 if you need to check your banking details and live
balance.
• Press 2 if you wish to transfer funds.
• Press 3 to unlock your online profile.
• Press 0 for any other query.
2. Regardless of what the victim enters (i.e., presses the key), the automated system promptshim to
authenticate himself: ―The security of each customer is important to us. To proceedfurther, we require that
you authenticate your ID before proceeding. Please type your bankaccount number, followed by the pound
key.‖
3. The victim enters his/her bank account number and hears the next prompt: “Thank you.Now please type
your date of birth, followed by the pound key. For example 01 January 1950
press 01011950.‖
4. The caller enters his/her date of birth and again receives a prompt from the automatedsystem: “Thank
you. Now please type your PIN, followed by the pound key.‖
5. The caller enters his PIN and hears one last prompt from the system: “Thank you.We will now transfer
you to the appropriate representative.‖ At this stage, the phone call getsdisconnected, and the victim thinks
there was something wrong with the telephone line; orvisher may redirect the victim to the real customer
service line, and the victim will not beable to know at all that his authentication was appropriated by the
visher.
Smishing
to Phishing.
SMS PhISHING.‖
gathering under
cybercrime.
reveal his/her PI.
provide a phone number to force the victim to call or provide a website URL to force the victim to access
the URL, wherein, the victim gets connected with bogus website (i.e., duplicate but fake site created by the
criminal) and submitshis/her PI.
ng.
1. Do not answer a text message that you have received asking for your PI. Even if the message seems to be
received from your best friend, do not respond, because he/she may not be the one who has actually sent it.
2. Avoid calling any phone numbers, as mentioned in the received message, to cancel a membership and/or
confirming a transaction which you have not initiated but mentioned in the message. Always call on the
numbers displayed on the invoice and/or appearing in the bank statements/passbook.
3. Never click on a hot link received through message on your Smartphone or PDA. Hotlinks are links
that you can click, which will take you directly to the Internet sites.Smishing messages may have hot links,
wherein you click on the link and download Spyware to your phone without knowing. Once this software
has been downloaded, criminals can easily steal any information that is available on your cell phone and
have access to everything that you do on your cell phone.
Hacking Bluetooth
short distances (i.e., using short length radio waves) between fixed and/or mobile device.
-range wireless communication service/technology that uses the 2.4- GHz frequency
range for its transmission/communication.
– Bluetooth 1.0 has a maximum transfer speed of 1 Mbps (megabit per second)
compared with 3 Mbps by Bluetooth 2.0.
Once the software tool used by the attacker finds and connects to a vulnerable Bluetooth enabled cell phone,
it can do things like download address book information, photos,calendars, SIM card details, make long-
distance phone calls using the hacked device, bug phone calls and much more.
1. BlueScanner: This tool enables to search for Bluetooth enable device and will try toextract as much
information as possible for each newly discovered device afterconnecting it with the target.
2. BlueSniff: This is a GUI-based utility for fi nding discoverable and hidden Bluetooth enabled devices.
3. BlueBugger: The buggers exploit the vulnerability of the device and access the images, phonebook,
messages and other personal information.
4. Bluesnarfer: If a Bluetooth of a device is switched ON, then Bluesnarfing makes it possible to connect to
the phone without alerting the owner and to gain access to restricted portions of the stored data.
It implements attacks like Bluebug and BlueSnarf.Bluejacking, Bluesnarfing, Bluebugging and Car
Whisperer are common attacks that have emerged as Bluetooth-specific security issues.
1. Bluejacking: It means Bluetooth + Jacking where Jacking is short name for hijack – act oftaking
over something. Bluejacking is sending unsolicited messages over Bluetooth toBluetooth-enabled
devices such as mobile phones, PDAs or computers (within 10-m radius),Bluejacking is harmless, as
bluejacked users generally do not understand what has happenedand hence they may think that their
phone is malfunctioning.
2. Bluesnarfing: It is the unauthorized access from a wireless device through a Bluetooth connection
between cell phones, PDAs and computers. This enables the attacker to access a calendar, contact
list, SMS and E-Mails as well as enables attackers to copy pictures and private videos.\
3. Bluebugging: It allows attackers to remotely access a user’s phone and use its features without user’s
attention.
4. Car Whisperer: It is a piece of software that allows attackers to send audio to and receive audio from a
Bluetooth-enabled car stereo.
Among the four above-mentioned attacks, Bluesnarfing is claimed to be much more serious than
Bluejacking.
These vulnerabilities are an inevitable result of technological innovation, and device manufacturers’
continuously research and release firmware upgrades to address new challenges/problems as they arise.
organization networks.
viruses, worms and Trojans get into the organization network, but can also destroy
valuable data in the organization network.
unattended
computer and will be able to download confidential data or upload harmful viruses.
1. Monitor which users or groups can access USB Ports, Wi-Fi and Bluetooth adapters, CD read-only
memories (CD-ROMs) and other removable devices.
2. Control the access to devices depending on the time of the day and day of the week.
3. Create the white list of USB devices which allows you to authorize only specific devices that will not be
locked regardless of any other settings.
cyber security.
en mobile hand-held devices are lost while people are on the move.
mobile device:
Rijndael
(pronounced rain-dahl or Rhine-doll), a block encryption algorithm, chosen as the new Advanced
Encryption Standard (AES) for block ciphers by the National Institute of Standards and Technology
(NIST).
-Dimensional
Space Rotation (MDSR) algorithm developed by Casio.The term ―strong encryption‖ is used here to
describe these technologies in contrast to the simple encryption.
Strong encryption means that it is much harder to break, but it also has a significant impact on
performance.
the machine a
special message.
-powered processors that will support 128-bitencryption.
1. Implement strong asset management, virus checking, loss prevention and other controls for mobile
systems that will prohibit unauthorized access and the entry of corrupted data.
2. Investigate alternatives that allow a secure access to the company information through a firewall, such as
mobile VPNs.
3. Develop a system of more frequent and thorough security audits for mobile devices.
4. Incorporate security awareness into your mobile training and support programs so that everyone
understands just how important an issue security is within a company’s overall IT strategy.
5. Notify the appropriate law-enforcement agency and change passwords. User accounts are closely
monitored for any unusual activity for a period of time.
1. Determine whether the employees in the organization need to use mobile computing devices or not.
2. Implement additional security technologies like strong encryption, device passwords and physical locks.
3. Standardize the mobile computing devices and the associated security tools being used with them.
5. Maintain an inventory so that you know who is using what kinds of devices.
10. Provide education and awareness training to personnel using mobile devices.
Laptops
ness functions.
they are
portable.
cyber security concerns when the information being
transmitted over other, which makes it hard to detect.
cyber security industry and
insurance company statistics.
profit in the black
market.
, thereby avoiding cyber
security exposures.
information, no matter
where they travel.
laptops.
1. Cables and hardwired locks: The most cost-efficient and ideal solution to safeguard any mobile device
is securing with cables and locks, specially designed for laptops.
2. Laptop safes: Safes made of polycarbonate – the same material that is used in bulletproof windows,
police riot shields and bank security screens – can be used to carry and safeguard the laptops
3. Motion sensors and alarms: Alarms and motion sensors are very efficient in securing laptops.
4. Warning labels and stamps: Warning labels containing tracking information andidentification details
can be fixed onto the laptop to deter aspiring thieves. These labels
cannot be removed easily and are a low-cost solution to a laptop theft
Spy Phone software is installed on the mobile/cell phone of employees, if the employers wants to monitor
phone usage. The Spy Phone software is completely hidden from the user,once it is installed and collects all
the available data such as SMS messages, ingoing/outgoing call history, location tracking, GPRS usage and
uploads the collected data to a remote server.
The employer can simply access the designated website hosted by Spy Phone vendor, andafter entering
his/her account details, he/she can have full access to all the data collected 24hours a day, 7 days a week.
The employer can access this website through the Internet; hence,he/she can keep an eye on their employees,
regardless where he/she is in the world. The employer can read all SMS messages (both incoming and
outgoing), know who they(employees) are calling or who is calling them and where they were when the call
was received.