Unit 1 MWS
Unit 1 MWS
Unit 1 MWS
Mobile Computing faces many improper and unethical practices and problems such as
hacking, industrial espionage, pirating, online fraud and malicious destruction etc. The
threats and security issues of mobile computing can be divided into two categories:
o The security issues that are related to the transmission of information over
wireless networks.
o The security issues and threats that are related to information and data residing
on mobile devices.
GENERAL SECURITY ISSUES
There are mainly five fundamental goals of security used in the information system to
deal with security issues. They are:
Confidentiality
This is used to prevent unauthorized users from gaining access to any particular user's
critical and confidential information.
Integrity
Availability
The availability is used to ensure that authorized users get the required access whenever
they need it.
Legitimate
This is used to ensure that only authorized, and legitimate users have access to the
services.
Accountability
Accountability is used to ensure that the users will be responsible for their security-
related activities by arranging the users and their activities in a linked form.\
We have to achieve these goals according to the security policy used by the service
providers.
The denial of services or DOS attacks is one of the most common attacks on all kinds of
networks, especially in a wireless network. It prevents users from using network services
because the attacker sends a large amount of unnecessary data or connection requests
to the communication server. It causes a slow network, and therefore the users cannot
get benefitted from using its service.
Traffic Analysis
Traffic analysis is used to identify and monitor communication between users. In this
process, the service provider listens to the traffic flowing in the wireless channel to
access the private information of users affected by the attacker.
Eavesdropping
It specifies that the attacker can log on to the wireless network and access sensitive data
if the wireless network was not secure enough. This can also be done if the information
is not encrypted.
It specifies that the attacker can intercept the session and modify the transmitted data in
this session. This scenario is called "man in the middle." It inserts the attacker's host
between the sender and receiver host.
Spoofing
In this security issue, the attacker impersonates him as an authorized account of another
user and tries to access the sensitive data and unauthorized services.
In this security issue, the attacker can get some of the network services by getting
unauthorized access. After capturing the message, he/she can reply to it with some
modifications to the same destination or another.
Following is a list of some mobile computing security issues we face using mobile
devices:
Push Attacks
In the push attack, the attacker creates a malicious code at the user's mobile device by
hacking it and then he/she may spread it to affect other elements of the network.
Pull Attacks
The pull attack is a type of attack where the attacker controls the device and handles it
in his/her way. He can decide which emails they want to receive. In this attack, the user
can decide about the obtained data by the device itself.
Forced De-authentication
In this security issue, the attackers convince the mobile end-point or the mobile user to
drop its connection and re-connection to get a new signal. Within this process, they
insert their device between the mobile device and the network and steal the information
or do the fraud.
Multi-protocol Communication
Mobility
This security issue may occur because of the mobility of the users and the mobile
devices. You may face these security threats due to a user's location, so you must
replicate the user profiles at different locations to allow roaming via different places
without any concern regarding access to personal and sensitive data in any place and at
any time. This repetition of sensitive data on different sites can increase seethe chances
of security threats.
Disconnections
These types of security issues occur when mobile devices go to different places. It
occurs in the form of frequent disconnections caused by external parties resulting in the
handoff.
In view of its importance, it is often worth looking at how this all came about - the history of
mobile phones, mobile communications and their technology is fascinating, and it often pays to
see how far mobile communications technology has progressed since its early beginnings.
In fact the first cellular phone system was demonstrated by Motorola in 1973 with a called
between John F. Mitchell and Martin Cooper.
However the first commercial cellular network was launched in 1979 in Japan by Nippon
Telegraph and Telephone. This was followed two years later with the launch of the Nordic
Mobile Telephone, NMT, which had been jointly developed by companies in these countries.
Accordingly it was simultaneously launched in Denmark, Finland, Norway, and Sweden.
Early 1G vintage mobile phone with carry
handle and separate handset
Many other countries followed these launches - some used systems that had already been
developed, but others developed their own system. As a result, a number of different non-
compatible systems were deployed and this gave rise to a number of problems and issues.
Wired Networks
Confidentiality Only the destined user must be allowed to read data. It should be hidden from all
other parties. (Encryption is a method used to solve it)
Integrity Data integrity is concerned with the correctness of data. The data needs to have
integrity or else user receives a manipulated message.
Availability Attacks similar to denial of service can block the availability of data at the user
end. (E.g. an intermediate router can be configured to attack packets and stop
them or re-route them.)
Non- It means that the sender cannot deny that he has send a message from his
repudiation device.
Pre-keying In case of encrypted system, key exchange is necessary before the actual data
transfer. Now if this key (esp. if private-key) is send via a wireless network, there
can be an issue of key-trapping
Resource An attack may sometimes cripple the resources available to a mobile system like
constraint limited battery, slower CPUs, exhausting memory due to caching, etc. Such
resources may get drained or may sometimes be not be strong enough to fight
back.
Intercepted Wireless signals, since being transferred via open-air can be intercepted.
Replaying After carefully analysing the authentication requests and client responses, an
attacker can replay such a similar sequence again.
Stealing If a miscreant steals the user-id and password of a subscriber, or gets his SIM
card, he/she will be able to enjoy the user’s subscriptions.
Mobility When a MS moves from one cell to another, the connection will be routed though
concerns different paths which cannot be relied upon.
Eavesdropping Peeping into someone else’s conversation is called eavesdropping. (e.g. is phone
tapping )
Direct We can use directed signals which are just sufficient to reach the user’s device and
Signaling establish a proper-link with him., This helps prevent security risks coming from other
directions and also at farther distances in same line.
Hashing Hashing is a method employed to check the data integrity. A hash function is applied
on the actual data resulting in some bits of data (integer value). In case of a
manipulation by a third-party, the hash value will be altered.
MAC Message Authentication Code is a combination of hash and secret key. For extra
added security
Encryption Encryption is conversion of code into a cipher text understood only by a person
having the decryption key. It includes both the public key (used nowadays.) and
private key method. Some examples are DES, AES, Ceaser-cipher, RSA etc.
Direct We can use directed signals which are just sufficient to reach the user’s device and
Signaling establish a proper-link with him., This helps prevent security risks coming from other
directions and also at farther distances in same line.
Checksum These are the basic methods used for checking data integrity (counting the total 1’s
or Parity or 0’s)
SSL A very famous feature used in today’s communication systems is SSL. SSL stands for
secure socket layer. It is a protocol that runs between HTTP and TCP for secure
transaction between client and Web server. Links using SSL protocols starts with
HTTPS (https://www...) The sub layers of SSL include handshake and record
protocols. SSL supports hash function MD5 and SHA, digital signatures, RSA, various
encryption algorithms.
IPsec IPSec (internet protocol for security) contains various features for providing
enhanced security. It includes an Authentication Header (AH- Packet Header
focusing on Security) , Encapsulating Security Payload (for confidentiality purposes)
and Internet Key Exchange (IKE) (for secure exchange of keys used for encryption)
RADIUS Remote Authentication Dial In User Service (RADIUS) is a networking protocol that
provides centralized authentication, authorization, and Accounting (AAA)
management for devices to connect and use a network service.
Whether it’s a home or business network, the risks to an unsecured wireless network
are the same. Some of the risks include:
Piggybacking
If you fail to secure your wireless network, anyone with a wireless-enabled computer
in range of your access point can use your connection. The typical indoor broadcast
range of an access point is 150–300 feet. Outdoors, this range may extend as far as
1,000 feet. So, if your neighborhood is closely settled, or if you live in an apartment or
condominium, failure to secure your wireless network could open your internet
connection to many unintended users. These users may be able to conduct illegal
activity, monitor and capture your web traffic, or steal personal files.
Wardriving
In an evil twin attack, an adversary gathers information about a public network access
point, then sets up their system to impersonate it. The adversary uses a broadcast
signal stronger than the one generated by the legitimate access point; then,
unsuspecting users connect using the stronger signal. Because the victim is connecting
to the internet through the attacker’s system, it’s easy for the attacker to use
specialized tools to read any data the victim sends over the internet. This data may
include credit card numbers, username and password combinations, and other
personal information. Always confirm the name and password of a public Wi-Fi
hotspot prior to use. This will ensure you are connecting to a trusted access point.
Wireless Sniffing
Many public access points are not secured and the traffic they carry is not encrypted.
This can put your sensitive communications or transactions at risk. Because your
connection is being transmitted “in the clear,” malicious actors could use sniffing
tools to obtain sensitive information such as passwords or credit card numbers. Ensure
that all the access points you connect to use at least WPA2 encryption.
An unsecured public wireless network combined with unsecured file sharing could
allow a malicious user to access any directories and files you have unintentionally
made available for sharing. Ensure that when you connect your devices to public
networks, you deny sharing files and folders. Only allow sharing on recognized home
networks and only while it is necessary to share items. When not needed, ensure that
file sharing is disabled. This will help prevent an unknown attacker from accessing
your device’s files.
Shoulder Surfing
In public areas malicious actors can simply glance over your shoulder as you type. By
simply watching you, they can steal sensitive or personal information. Screen
protectors that prevent shoulder-surfers from seeing your device screen can be
purchased for little money. For smaller devices, such as phones, be cognizant of your
surroundings while viewing sensitive information or entering passwords.
Not all attackers rely on gaining access to your data via wireless means. By physically
stealing your device, attackers could have unrestricted access to all of its data, as well
as any connected cloud accounts. Taking measures to protect your devices from loss
or theft is important, but should the worst happen, a little preparation may protect the
data inside. Most mobile devices, including laptop computers, now have the ability to
fully encrypt their stored data—making devices useless to attackers who cannot
provide the proper password or personal identification number (PIN). In addition to
encrypting device content, it is also advisable to configure your device’s applications
to request login information before allowing access to any cloud-based information.
Last, individually encrypt or password-protect files that contain personal or sensitive
information. This will afford yet another layer of protection in the event an attacker is
able to gain access to your device.
Security has always been a major concern for businesses. And this concern is even
greater when it comes to mobile apps.
Today every business has a mobile app to connect more easily with their
customers. And if that business does not take proper security protections it can put
their brand at risk.
Mobile devices span multiple operating systems and, given the distributed nature
of components, mobile app security often experiences problems.
I hope your business is properly secured and you are just looking for a mobile app
security checklist for the future. If that's the case, good for you – being a business
owner means you must take care of mobile app security.
But according to a survey, more than 75% of mobile applications will fail
basic security tests.
Many employees download apps from app stores and use mobile applications that
can access enterprise assets or perform business functions. And unfortunately,
these applications have little or no security assurances. They are exposed to attacks
and violations of enterprise security policies all the time.
I know that nobody wants to be a part of this failure. That is why you need to
follow a proper mobile app security checklist.
ENFORCE STRONG AUTHENTICATION
To prevent unauthorized access and password guessing attacks, you should
implement multi-factor authentication. The three main factors for authentication
are
something that a user knows, such as a password or PIN
something the user has, such as a mobile device
or something the user is, such as a fingerprint.
Combining password-based authentication with a client certificate, device ID, or
one-time password significantly reduces the risk of unauthorised access. You can
also implement time-of-day and location-based restrictions to prevent fraud.
ENCRYPT MOBILE COMMUNICATIONS
With threats like snooping and man-in-the-middle attacks over WiFi and cellular
networks, IT should make sure that all communications between mobile apps and
app servers are encrypted.
Strong encryption that leverages 4096-bit SSL keys and session-based key
exchanges can prevent even the most determined hackers from decrypting
communications.
Besides encrypting traffic, IT should confirm that data at rest—the sensitive data
stored on users' phones—is also encrypted. For ultra-sensitive data, IT might want
to prevent data from ever being downloaded to the end user device at all.
PATCH APP AND OPERATING SYSTEM VULNERABILITIES
Recent Android and iOS vulnerabilities such as Stagefright and XcodeGhost have
exposed mobile users to attack.
In addition to mobile OS flaws, IT must contend with a never-ending succession of
app updates and fixes.
To protect mobile users from attack, IT should check mobile devices and ensure
that the latest patches and updates have been applied.
PROTECT AGAINST DEVICE THEFT
Every year, millions of mobile devices are lost or stolen. To ensure sensitive data
does not end up in the wrong hands, IT should provide a way to remotely wipe
sensitive data Or—better yet—make sure data is never stored on mobile devices in
the first place.
For employee-owned devices, IT should lock or wipe corporate information while
leaving personal apps and files intact. When the device is found or replaced, IT
should be able to quickly restore users’ apps and data.
SCAN MOBILE APPS FOR MALWARE
Eliminate malware and adware by testing apps for malicious behaviour. Malware
can be detected using virtual sandboxing or signature-based scanning tools. For
mobile workspace or virtual mobile solutions, perform malware scans on the
server.
PROTECT APP DATA ON YOUR DEVICE
Make sure developers are not storing any sensitive data on their devices. If you
must store data on device for some reason, first make sure it's encrypted/protected.
And then only store it in files, data stores, and databases.
If you use the latest encryption technologies, you can get a higher level of security.
SECURE THE PLATFORM
Your platform should be properly secured and controlled. This process consists of
detecting jailbroken phones and preventing access to other services when needed.
PREVENT DATA LEAKS
To avoid data leaks while still allowing users to install personal apps on their
mobile devices, IT must separate business apps from personal apps.
Creating secure mobile workspaces helps prevent malware from accessing
corporate apps and stops users from copying, saving, or distributing sensitive data.
////
Advantages with Apps
Staying ‘front of mind’ with customers – your app on someone’s home screen
can help reinforce you as the answer to their needs when they require what you
offer: especially if your app is helpful in other ways.
Ease of access – for the user, clicking your app is far quicker and easier than
accessing yours or a competitor’s website even if they’ve bookmarked it.
Data capture – valuable data can be gathered from apps concerning use, activity
and buying habits.
Communication – it’s easier to interact with your customers and prospects with an
app including the immediacy of being able to attract their attention and maybe
prompt action through, for example, push notifications.
Staff interaction – information can be passed quickly and easily to staff whether
for those accessing an internal company portal or people working in remote
locations.
Productivity – app-based interactions can streamline communications with staff
and outside contractors. And then you can ditch labour intensive paper-based
reporting.
Disadvantages with Apps
Lack of focus – Simply ‘having an app’ for the sake of it could prove counter-
productive and a waste of financial resources: it’s vital to know exactly what you
want your app to achieve and have a business case to support it.
Cost – naturally developing an app carries a price tag, but your app could boost
your bottom line by improving productivity (if a business app) or (if a customer
based app) enhancing customer engagement and increasing sales.
Also, working with an experienced mobile app development company means they
can appraise you of what’s possible within your budget and develop your app
accordingly.
Complicated – developing an app isn’t as easy as it may appear, but trusting in an
experienced mobile apps for business expert will ensure much of the heavy lifting
is done for you.
Updating – your app will require regular updates in line with revisions from
platform providers such as Apple (iOS) and Google (Android). Again, companies
providing mobile app development services know this and would put a package
together incorporating ongoing updates.
As you can see above, all the potential disadvantages to having an app can be
addressed by using the services of experts in developing mobile apps for business.
////end