0% found this document useful (0 votes)
36 views16 pages

Unit 2 Cyber Security

note
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
36 views16 pages

Unit 2 Cyber Security

note
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 16

Introduction to Mobile and Wireless Devices

Mobile and wireless devices are portable electronic gadgets that connect to networks (e.g., Wi-Fi,
cellular, Bluetooth) without physical cables. These devices have revolutionized how we communicate,
work, learn, and entertain ourselves. Common examples include smartphones, tablets, laptops,
smartwatches, fitness trackers, and IoT devices (e.g., smart speakers, security cameras). Their core
purpose is to provide on-the-go connectivity, convenience, and access to information or services.

Key Features of Mobile and Wireless Devices

1. Portability

o Compact, lightweight design for easy carrying (e.g., smartphones fit in pockets).

o Example: A salesperson uses a tablet during client meetings to showcase product


catalogs.

2. Wireless Connectivity

o Use technologies like Wi-Fi, 5G, Bluetooth, NFC, or satellite for internet access and data
transfer.

o Example: Paying via Apple Pay at a store using NFC (Near Field Communication).

3. Multifunctionality

o Combine communication, computing, entertainment, and productivity tools in one


device.

o Example: A smartphone lets you video-call, stream movies, track fitness, and manage
emails.

4. Touchscreen Interfaces

o Intuitive touchscreens replace physical keyboards (e.g., swiping on a smartphone).

o Example: A student takes notes on an iPad using a stylus.

5. Sensors and Smart Capabilities

o Built-in sensors like GPS, accelerometers, cameras, and biometric scanners (e.g.,
fingerprint readers).

o Example: A Fitbit tracks your heart rate and steps using optical sensors.

6. Cloud Integration
o Sync data to cloud storage (e.g., Google Drive, iCloud) for seamless access across
devices.

o Example: Editing a document on a laptop and resuming work on a smartphone via the
cloud.

7. Long Battery Life

o Optimized power consumption for extended use (e.g., e-readers like Kindle last weeks
on a charge).

8. App Ecosystem

o Support for millions of apps (e.g., productivity, gaming, health) via platforms like Google
Play or App Store.

Importance of Mobile and Wireless Devices

1. Enhanced Communication

o Instant messaging, video calls, and social media keep people connected globally.

o Example: A migrant worker video-calls family daily using WhatsApp.

2. Boosted Productivity

o Enable remote work, real-time collaboration, and access to enterprise tools.

o Example: A project manager updates team tasks on Trello during a commute.

3. Accessibility

o Provide internet access to underserved regions via mobile networks.

o Example: Farmers in rural India check crop prices on smartphones.

4. Healthcare Advancements

o Wearables monitor health (e.g., glucose levels, ECG) and telemedicine apps connect
patients to doctors.

o Example: A diabetic patient uses a continuous glucose monitor (CGM) synced to their
phone.

5. Education and Learning

o E-learning apps and tablets make education accessible anytime, anywhere.


o Example: A student in a remote village attends online classes via a smartphone.

6. Economic Growth

o Enable e-commerce, digital payments, and gig economy platforms (e.g., Uber, Swiggy).

o Example: A small business owner sells handmade crafts globally via Instagram.

7. Entertainment On-Demand

o Streaming services (Netflix, Spotify) and mobile gaming provide instant entertainment.

o Example: Watching a movie on a tablet during a flight.

8. IoT and Smart Living

o Control smart homes (lights, thermostats) via mobile apps.

o Example: Using a smartphone to preheat an oven or check security cameras.

Real-Life Scenario Highlighting Features and Importance

Situation: A freelance graphic designer travels frequently.

 Features Used:

o Portability: Works on a lightweight laptop at cafés.

o 5G Connectivity: Uploads large design files quickly.

o Cloud Integration: Accesses client projects from Google Drive.

o Multifunctionality: Uses the same device for video calls (Zoom), invoicing (PayPal), and
relaxation (Netflix).

 Importance:

o Enables a flexible, location-independent career.

o Streamlines work-life balance through a single device.


What is Proliferation?

"Proliferation" refers to the rapid increase and widespread adoption of mobile and wireless devices
globally. This growth is driven by advancements in technology, affordability, improved internet access,
and the increasing need for connectivity.

Key Factors Driving Proliferation

1. Affordability & Accessibility

o Cheaper smartphones and data plans have made devices accessible even in developing
countries.

o Example: Companies like Xiaomi and Samsung offer budget smartphones with 4G/5G
support.

2. Advancements in Wireless Technology

o Transition from 3G to 4G/LTE and now 5G has enabled faster, more reliable
connections.

o Example: Streaming 4K videos on a smartphone without buffering due to 5G.

3. Internet of Things (IoT) Expansion

o Smart home devices (e.g., Alexa, smart bulbs), wearables (e.g., Apple Watch), and
industrial IoT rely on wireless connectivity.

o Example: A smart thermostat (like Nest) adjusts home temperature remotely via Wi-Fi.

4. Remote Work & Digital Transformation

o The COVID-19 pandemic accelerated the need for mobile work solutions (Zoom,
Microsoft Teams).

o Example: Employees use tablets and smartphones for virtual meetings while traveling.

5. E-Commerce & Mobile Payments

o Digital wallets (Google Pay, Apple Pay) and online shopping require mobile devices.

o Example: A street vendor in India accepts payments via UPI on a smartphone.

6. Social Media & Content Consumption

o Platforms like TikTok, Instagram, and YouTube drive demand for smartphones with
better cameras and displays.

o Example: A teenager records and edits videos on a smartphone for social media.
Real-Life Example: A Day in the Life of a College Student (2024 vs. 2010)

2010 Scenario (Limited Mobile Use)

 Communication: Uses a basic phone for calls/SMS; limited internet access.

 Studies: Relies on textbooks and a shared family desktop for research.

 Entertainment: Watches TV or uses an MP3 player for music.

 Payments: Carries cash or debit card for transactions.

2024 Scenario (Proliferation Impact)

 Smartphone: Uses a 5G-enabled device for video calls (WhatsApp), online classes (Google
Classroom), and gaming.

 Wearables: Tracks fitness and sleep with a smartwatch (e.g., Fitbit).

 Payments: Pays for meals via QR code scan (PayTM/UPI).

 Smart Home: Adjusts room lights and AC via a mobile app before arriving home.

 Cloud Storage: Accesses notes and assignments from any device via Google Drive.

This shift highlights how mobile and wireless devices have become essential in daily life compared to
just a decade ago.

Impact of Proliferation

✅ Positive Effects:

 Improved communication and global connectivity.

 Enhanced productivity (remote work, digital banking).

 Better healthcare (telemedicine, health trackers).

 Financial inclusion (mobile banking in rural areas).

⚠️ Challenges:

 Security Risks: More devices mean more hacking targets (e.g., phishing scams).

 Digital Divide: Not everyone has equal access to technology.


 E-Waste: Increased device turnover leads to environmental concerns.

Trends in Mobility:

Mobility trends refer to the evolving ways in which mobile and wireless technologies are transforming
communication, work, healthcare, transportation, and daily life. These trends are driven by
advancements in 5G, AI, IoT, edge computing, and hybrid work models.

1. 5G and Hyper-Connectivity

Explanation:
5G networks provide faster speeds (up to 10 Gbps), ultra-low latency (<1ms), and massive device
connectivity, enabling real-time applications like autonomous vehicles, AR/VR, and remote surgery.

Real-Life Example:

 Smart City Traffic Management: In Barcelona, 5G-connected sensors monitor traffic flow in real
time, adjusting traffic lights dynamically to reduce congestion.

 Telemedicine: A surgeon in New York uses a 5G-connected robotic arm to perform a precision
surgery on a patient in a rural clinic.

2. Edge Computing (Faster Data Processing)

Explanation:
Instead of sending all data to the cloud, edge computing processes data closer to the source (e.g.,
smartphones, IoT devices), reducing latency and bandwidth usage.

Real-Life Example:

 Autonomous Drones: Amazon’s delivery drones analyze flight paths and obstacle avoidance in
real time using edge AI, without needing constant cloud connectivity.

 Smart Security Cameras: A home security camera (like Nest) detects an intruder locally and
instantly alerts the homeowner without uploading footage to the cloud.

3. AI-Powered Mobile Experiences


Explanation:
AI is being integrated into mobile devices for personalized recommendations, voice assistants, and
predictive analytics.

Real-Life Example:

 Google Lens: A tourist points their smartphone at a foreign-language menu, and AI instantly
translates it into their preferred language.

 ChatGPT Mobile Apps: Professionals use AI-powered mobile assistants to draft emails,
summarize reports, or generate code on the go.

4. Wearable Technology & Health Monitoring

Explanation:
Smartwatches and fitness bands now track heart rate, blood oxygen, sleep patterns, and even detect
medical emergencies (e.g., falls, irregular heartbeats).

Real-Life Example:

 Apple Watch ECG Feature: A user’s watch detects an irregular heartbeat (atrial fibrillation) and
alerts them to seek medical help, potentially saving their life.

 Fitness Gamification: Strava and Fitbit turn workouts into social competitions, encouraging
users to stay active.

5. Hybrid & Remote Work Mobility

Explanation:
The post-pandemic world has normalized remote work, requiring mobile-optimized collaboration tools
(Zoom, Slack, Microsoft Teams) and cloud-based workflows.

Real-Life Example:

 Digital Nomads: A freelance graphic designer works from Bali using a 5G hotspot, cloud storage
(Google Drive), and a foldable smartphone for on-the-go editing.

 AR Remote Assistance: A technician fixing industrial equipment uses AR glasses to get real-time
guidance from an expert thousands of miles away.

6. Foldable & Flexible Displays


Explanation:
Phones and tablets with foldable screens (like Samsung Galaxy Z Fold) offer larger displays in pocket-
sized devices, blending smartphone and tablet functionality.

Real-Life Example:

 Multitasking Professionals: A business traveler unfolds their phone into a mini-tablet to view
spreadsheets, take notes, and video conference simultaneously.

 Mobile Gaming: Gamers use foldable phones for console-like experiences without carrying a
separate device.

7. Mobile Payments & Digital Wallets

Explanation:
Cashless transactions via NFC (Apple Pay, Google Pay), QR codes (PayTM, Alipay), and cryptocurrency
wallets are replacing physical cards.

Real-Life Example:

 Street Vendors in India: A chai stall accepts payments via UPI QR codes, eliminating the need
for cash.

 Contactless Transit: In London, commuters tap their smartphones (with NFC) to pay for subway
rides instead of using physical tickets.

8. Autonomous & Connected Vehicles

Explanation:
Cars now integrate 5G, AI, and IoT for self-driving features, real-time traffic updates, and vehicle-to-
vehicle (V2V) communication.

Real-Life Example:

 Tesla Autopilot: A driver uses AI-assisted navigation where the car adjusts speed, changes
lanes, and parks itself.

 Smart Traffic Lights: In Singapore, traffic signals communicate with buses to extend green
lights if they’re running behind schedule.

9. Privacy & Security Innovations


Explanation:
As mobility increases, so do security risks. Biometric authentication (Face ID, fingerprint), blockchain-
based security, and on-device AI for fraud detection are growing trends.

Real-Life Example:

 Banking Apps: HSBC uses AI-driven behavioral biometrics to detect if someone else is using
your phone for transactions.

 Apple’s App Tracking Transparency: Users can now block apps from tracking their location,
enhancing privacy.

Future Trends in Mobility (2025 & Beyond)

 6G Networks (faster than 5G, expected by 2030)

 AI-Generated Virtual Assistants (e.g., fully autonomous AI agents handling tasks)

 Brain-Computer Interfaces (BCI) (e.g., controlling devices with thoughts via Neuralink-like tech)

 Drone Taxis & Flying Cars (e.g., Uber Air’s proposed air mobility solutions)

Credit Card Frauds in the Mobile and Wireless Computing Era

The rise of mobile and wireless technologies has revolutionized digital payments, but it has also led to a
surge in credit card fraud. Cybercriminals exploit vulnerabilities in mobile apps, wireless networks, and
payment systems to steal financial data.

Types of Credit Card Frauds in Mobile & Wireless Computing

1. Phishing & Fake Mobile Apps

 How It Works: Scammers create fake banking or shopping apps that mimic legitimate ones to
steal login credentials and card details.

 Example: A user downloads a fake "Amazon Shopping" app from a third-party site, enters their
credit card info, and the fraudster uses it for unauthorized purchases.

2. Man-in-the-Middle (MITM) Attacks on Public Wi-Fi

 How It Works: Hackers intercept unencrypted data transmitted over public Wi-Fi (e.g., in cafes
or airports).
 Example: A traveler logs into their bank account at an airport Wi-Fi hotspot, and a hacker
captures their credit card details.

3. SIM Swapping (Port-Out Fraud)

 How It Works: Fraudsters trick telecom providers into transferring a victim’s phone number to a
new SIM card, allowing them to bypass SMS-based two-factor authentication (2FA).

 Example: A criminal impersonates a victim, convinces the mobile carrier to switch their number,
and resets banking passwords via SMS OTPs.

4. NFC & Contactless Payment Skimming

 How It Works: Criminals use RFID skimmers to steal card details from contactless payments
(Apple Pay, Google Pay) in crowded places.

 Example: A thief stands near a victim in a subway and wirelessly scans their wallet for NFC-
enabled card data.

5. Malware & Spyware in Mobile Devices

 How It Works: Malicious apps or infected links install spyware that logs keystrokes, screenshots,
and credit card details.

 Example: A user clicks on a malicious link in a text message, unknowingly installing spyware that
steals saved card details in their mobile wallet.

6. Card-Not-Present (CNP) Fraud in E-Commerce

 How It Works: Stolen card details are used for online purchases where the physical card isn’t
required.

 Example: A hacker buys a stolen credit card database from the dark web and makes multiple
online purchases before the victim notices.

Real-Life Case Studies

Case 1: The 2022 Uber Data Breach

 What Happened? A hacker breached Uber’s internal systems via a phishing attack on an
employee’s mobile device, gaining access to sensitive financial data.

 Impact: Thousands of drivers’ and riders’ payment details were exposed.

Case 2: Joker Malware on Google Play Store (2021)


 What Happened? Fraudulent apps with "Joker" malware bypassed Google’s security,
subscribing victims to premium services without consent.

 Impact: Over 500,000 users were charged unknowingly via their linked credit cards.

Case 3: Magecart Attacks on Mobile Shopping Apps

 What Happened? Hackers injected malicious scripts into mobile checkout pages, stealing card
details during transactions.

 Impact: Major retailers like British Airways and Ticketmaster suffered breaches, affecting
millions.

How to Protect Yourself from Mobile Credit Card Fraud?

1. Use Secure Payment Methods

 Mobile Wallets (Apple Pay/Google Pay) – Tokenization replaces card numbers with secure
digital tokens.

 Virtual Cards – Services like Privacy.com generate disposable card numbers for online
purchases.

2. Avoid Public Wi-Fi for Transactions

 Use a VPN or mobile data instead of unsecured Wi-Fi.

3. Enable Multi-Factor Authentication (MFA)

 Use biometric authentication (Face ID, Fingerprint) instead of SMS-based OTPs when possible.

4. Monitor Bank Statements Regularly

 Set up real-time transaction alerts to detect unauthorized purchases.

5. Download Apps Only from Official Stores

 Avoid third-party app stores to reduce malware risks.

6. Keep Devices & Apps Updated

 Regular updates patch security vulnerabilities.

Future of Fraud Prevention in Mobile Payments


 AI-Powered Fraud Detection – Banks use machine learning to detect unusual spending patterns.

 Blockchain-Based Security – Decentralized ledgers can reduce payment fraud.

 Behavioral Biometrics – Analyzes typing speed, swipe patterns to detect imposters.

🔐 Security Challenges Posed by Mobile Devices

1. Data Leakage

Mobile devices often store sensitive data like emails, passwords, financial info, or corporate documents. This data can be
leaked:

 Through malicious apps accessing data they shouldn’t

 Via cloud backups without proper encryption

 From unauthorized access if the device is lost or stolen

🛡️ Example: An employee installs a flashlight app that secretly uploads contact data to an external server.

2. Loss and Theft

Physical loss or theft of a mobile device is one of the most common risks.

 Devices often lack full-disk encryption

 Weak or absent PINs, patterns, or biometric security can make access easy

 Auto-login features in apps make it easy for thieves to access emails, social media, banking, etc.

🛡️ Solution: Implement remote wipe and strong authentication mechanisms.

3. Unsecured Wi-Fi and Network Attacks

Mobile users often connect to public Wi-Fi networks, which are common targets for:

 Man-in-the-middle (MITM) attacks

 Eavesdropping

 Rogue hotspots impersonating legitimate networks

🛡️ Solution: Use VPNs and discourage users from accessing sensitive services on public Wi-Fi.

4. Malware and Malicious Apps

Mobile OS platforms (especially Android) can be vulnerable to:

 Malicious apps from third-party stores or even official ones

 Spyware, adware, and ransomware

 Apps with excessive permissions

🛡️ Example: A game app requesting SMS access could intercept 2FA codes.
5. Lack of Updates / OS Fragmentation

Many users don’t update their devices regularly. This leads to:

 Unpatched vulnerabilities

 Inconsistent security policies, especially in Android devices due to fragmentation

🛡️ Solution: Encourage automatic updates or implement Mobile Device Management (MDM).

6. Insecure App Development

Many mobile apps are not developed with security in mind:

 Poor encryption practices

 Hardcoded credentials

 Lack of input validation, leading to injection attacks

🛡️ Example: A banking app that stores passwords in plain text on the device.

7. BYOD (Bring Your Own Device) Risks

Letting employees use personal devices for work:

 Makes security policy enforcement difficult

 Increases risk of data mixing between personal and professional content

 Inconsistent antivirus or security apps

🛡️ Solution: Use MDM or implement containerization to separate work and personal data.

8. Phishing Attacks

Mobile devices are vulnerable to phishing through:

 SMS (Smishing)

 Emails and fake websites

 Messaging apps (e.g., WhatsApp, Telegram)

🛡️ Example: A fake SMS claiming to be from a bank lures users into entering credentials.

9. Bluetooth and NFC Vulnerabilities

Wireless communication features like Bluetooth and NFC can be exploited:

 Bluejacking, Bluesnarfing, or Bluetooth-based malware

 NFC skimming for contactless payments

🛡️ Solution: Disable Bluetooth/NFC when not in use; apply regular security patches.
10. Unauthorized Access to Cloud Services

Most mobile apps sync with cloud services. Without proper security:

 An attacker gaining access to one app can potentially compromise cloud data

 Improper logout mechanisms leave sessions open

🛡️ Solution: Use strong multi-factor authentication (MFA) and session management.

📘 What Are Registry Settings?

The Windows Registry is a centralized database used by Windows operating systems to store configuration settings. It acts
like the DNA of the system, controlling everything from system behavior to user preferences.

In mobile/portable devices running Windows (like Surface devices or business laptops), registry settings are often used to:

 Enforce security policies

 Control network settings

 Manage power and display behaviors

 Define application access

 Configure system updates

🔐 1. Security and Access Control Settings

These settings are crucial for preventing unauthorized access, especially on mobile devices that are frequently taken
outside the office.

Key Uses:

 Enforcing password policies (like minimum length, complexity)

 Disabling USB ports to prevent data theft

 Controlling screen lock and auto-logout times

Benefits:

 Protects sensitive information

 Minimizes risk if the device is lost or stolen

 Complies with regulatory standards like GDPR or HIPAA

🌐 2. Network and Connectivity Settings

Mobile devices constantly switch between different networks. Registry settings can control how and when they connect.

Key Uses:

 Defining Wi-Fi and proxy settings

 Enabling or disabling VPN auto-connect


 Setting preferred DNS servers

Benefits:

 Improves data security over public networks

 Ensures consistent internet performance

 Helps enforce company networking rules

📵 3. Application and Software Control

These settings govern what software can or cannot be installed or run.

Key Uses:

 Blocking unapproved apps

 Allowing only specific business apps

 Preventing installations from external sources

Benefits:

 Reduces malware and bloatware risks

 Ensures that only secure, authorized tools are used

 Helps maintain device performance

🔄 4. Update and Patch Management

Keeping mobile devices up to date is critical, especially for security.

Key Uses:

 Controlling when updates are installed

 Deferring or pausing updates during work hours

 Allowing only certain updates to be installed

Benefits:

 Minimizes disruption from unexpected reboots

 Ensures the system is protected against known vulnerabilities

 Supports compliance with IT patching policies

🔋 5. Power and Display Settings

On-the-go devices need to balance performance with battery life. Registry settings help manage this balance.

Key Uses:

 Setting screen timeout and sleep modes

 Managing brightness and power-saving features


 Defining behavior when closing the lid or unplugging

Benefits:

 Extends battery life

 Prevents unnecessary battery drain

 Enhances user experience and device longevity

🧑💼 6. User Experience and Personalization

Registry settings also control the look, feel, and behavior of the user interface.

Key Uses:

 Disabling unnecessary UI elements (like Cortana or ads)

 Standardizing start menu layouts in business environments

 Locking desktop background to a corporate theme

Benefits:

 Promotes a clean, distraction-free environment

 Enhances brand consistency

 Reduces user error or tampering

🧑 Role of Registry in Mobile Device Management (MDM)

In enterprise environments, registry settings are often not changed manually. Instead, they are managed via:

 Group Policy Objects (GPOs) in Windows domains

 Mobile Device Management (MDM) tools like Microsoft Intune or VMware Workspace ONE

These tools apply policies to devices remotely and ensure consistency across a fleet of laptops or tablets.

🧑 Risks of Misconfigured Registry Settings

 Security Vulnerabilities: Missteps can disable essential protections

 System Instability: Incorrect settings can lead to crashes or failures

 User Frustration: Overly strict policies can affect usability

 Compliance Issues: Failure to align with data protection regulations

You might also like