mobile (in)security? @ mobile edge '14

20
Cláudio André / [email protected] /// Mobile (in)security ?

Upload: mobile-edge-event

Post on 11-Jul-2015

210 views

Category:

Mobile


3 download

TRANSCRIPT

Page 1: Mobile (in)security? @ Mobile Edge '14

Cláudio André / [email protected]

/// Mobile (in)security ?

Page 2: Mobile (in)security? @ Mobile Edge '14

2

/// MOBILE (IN)SECURITY ?

WHOAMI

•  Pentester at Integrity S.A.

•  Web applications, Mobile Applications and

Infrastructure

•  BSc in Management Information Technology

•  Offensive Security Certified Professional

Page 3: Mobile (in)security? @ Mobile Edge '14

3

/// MOBILE (IN)SECURITY ?

MOBILE EQUIPMENTS

http://www.idc.com/prodserv/smartphone-os-market-share.jsp

301.3 million shipments 2014Q2

Page 4: Mobile (in)security? @ Mobile Edge '14

4

/// MOBILE (IN)SECURITY ?

2014Q2 MARKETSHARE

84.7%

11.7%

2.5% 0.5% 0.7%

Android

iOS

Windows Phone

BlackBerry OS

Others

http://www.idc.com/prodserv/smartphone-os-market-share.jsp

Page 5: Mobile (in)security? @ Mobile Edge '14

5

/// MOBILE (IN)SECURITY ?

MOBILE PLATFORMS ON ENTERPRISE

BYOD & Mobile Security 2013 Survey Linkedin Information Security Group

Page 6: Mobile (in)security? @ Mobile Edge '14

6

/// MOBILE (IN)SECURITY ?

ENTERPRISES MAIN SECURITY CONCERNS

BYOD & Mobile Security 2013 Survey Linkedin Information Security Group

Page 7: Mobile (in)security? @ Mobile Edge '14

7

/// MOBILE (IN)SECURITY ?

ENTERPRISES MAIN SECURITY CONCERNS

I'm not a Hacker. Just a silly guy with a ski mask on. Don't know what I'm doing.

Page 8: Mobile (in)security? @ Mobile Edge '14

8

/// MOBILE (IN)SECURITY ?

SECURITY HORROR STORIES 2014 (SO FAR...)

Ebay - 145 million users and encrypted email address. JP Morgan Chase - Customer information of 76 million households and 7 million business. Home Depot - 56 million debit and credit cards. Target - 40 million credit and debit cards. Community Health Systems - Personal data of 4.5 million patients.

Page 9: Mobile (in)security? @ Mobile Edge '14

9

/// MOBILE (IN)SECURITY ?

ATTACK VECTORS

Page 10: Mobile (in)security? @ Mobile Edge '14

10

/// MOBILE (IN)SECURITY ?

ATTACK VECTORS

Device Network Server

Page 11: Mobile (in)security? @ Mobile Edge '14

11

/// MOBILE (IN)SECURITY ?

ATTACK VECTORS

•  Browser •  System •  Phone / SMS •  Apps •  Malware •  ...

Device

Page 12: Mobile (in)security? @ Mobile Edge '14

12

/// MOBILE (IN)SECURITY ?

ATTACK VECTORS

Tech details in: http://security.claudio.pt

Page 13: Mobile (in)security? @ Mobile Edge '14

13

/// MOBILE (IN)SECURITY ?

ATTACK VECTORS

Network •  Packet Sniffing •  Man-In-The-Middle (MITM) •  Rogue Access Point •  ...

Page 14: Mobile (in)security? @ Mobile Edge '14

14

/// MOBILE (IN)SECURITY ?

ATTACK VECTORS

Server •  Brute Force Attacks •  SQL Injections •  OS Command Execution •  ...

Page 15: Mobile (in)security? @ Mobile Edge '14

15

/// MOBILE (IN)SECURITY ?

A WAY TO...

Mobile Device Management; Mobile Application Management; Endpoint Security Tools; Network Access Control (NAC) Endpoint Malware Protections; …..

Page 16: Mobile (in)security? @ Mobile Edge '14

16

/// MOBILE (IN)SECURITY ?

MOBILE DEVICE MANAGEMENT

-  Focus on the Device -  Provisioning -  Security Policies Enforcement -  Reporting and Monitoring -  Software Distribution

Page 17: Mobile (in)security? @ Mobile Edge '14

17

/// MOBILE (IN)SECURITY ?

MOBILE APPLICATION MANAGEMENT

-  Focus on the Applications -  Same as previous but applied to the applications. -  Corporate App Store (wrapping)

Page 18: Mobile (in)security? @ Mobile Edge '14

18

/// MOBILE (IN)SECURITY ?

WHICH ONE TO CHOOSE ?

-  Depends on your objectives -  Mixed solution

Page 19: Mobile (in)security? @ Mobile Edge '14

19

/// MOBILE (IN)SECURITY ?

NOT ONLY *WARE APPROACH

-  Defense-In-Depth -  Raise User Awareness -  Secure Development Best Practises (OWASP) -  Threat Modeling -  Continuous Penetration Testing

Page 20: Mobile (in)security? @ Mobile Edge '14

20

Thank you.