Unit 2 Cyber Security
Unit 2 Cyber Security
Mobile and wireless devices are portable electronic gadgets that connect to networks (e.g., Wi-Fi,
cellular, Bluetooth) without physical cables. These devices have revolutionized how we communicate,
work, learn, and entertain ourselves. Common examples include smartphones, tablets, laptops,
smartwatches, fitness trackers, and IoT devices (e.g., smart speakers, security cameras). Their core
purpose is to provide on-the-go connectivity, convenience, and access to information or services.
1. Portability
o Compact, lightweight design for easy carrying (e.g., smartphones fit in pockets).
2. Wireless Connectivity
o Use technologies like Wi-Fi, 5G, Bluetooth, NFC, or satellite for internet access and data
transfer.
o Example: Paying via Apple Pay at a store using NFC (Near Field Communication).
3. Multifunctionality
o Example: A smartphone lets you video-call, stream movies, track fitness, and manage
emails.
4. Touchscreen Interfaces
o Built-in sensors like GPS, accelerometers, cameras, and biometric scanners (e.g.,
fingerprint readers).
o Example: A Fitbit tracks your heart rate and steps using optical sensors.
6. Cloud Integration
o Sync data to cloud storage (e.g., Google Drive, iCloud) for seamless access across
devices.
o Example: Editing a document on a laptop and resuming work on a smartphone via the
cloud.
o Optimized power consumption for extended use (e.g., e-readers like Kindle last weeks
on a charge).
8. App Ecosystem
o Support for millions of apps (e.g., productivity, gaming, health) via platforms like Google
Play or App Store.
1. Enhanced Communication
o Instant messaging, video calls, and social media keep people connected globally.
2. Boosted Productivity
3. Accessibility
4. Healthcare Advancements
o Wearables monitor health (e.g., glucose levels, ECG) and telemedicine apps connect
patients to doctors.
o Example: A diabetic patient uses a continuous glucose monitor (CGM) synced to their
phone.
6. Economic Growth
o Enable e-commerce, digital payments, and gig economy platforms (e.g., Uber, Swiggy).
o Example: A small business owner sells handmade crafts globally via Instagram.
7. Entertainment On-Demand
o Streaming services (Netflix, Spotify) and mobile gaming provide instant entertainment.
Features Used:
o Multifunctionality: Uses the same device for video calls (Zoom), invoicing (PayPal), and
relaxation (Netflix).
Importance:
"Proliferation" refers to the rapid increase and widespread adoption of mobile and wireless devices
globally. This growth is driven by advancements in technology, affordability, improved internet access,
and the increasing need for connectivity.
o Cheaper smartphones and data plans have made devices accessible even in developing
countries.
o Example: Companies like Xiaomi and Samsung offer budget smartphones with 4G/5G
support.
o Transition from 3G to 4G/LTE and now 5G has enabled faster, more reliable
connections.
o Smart home devices (e.g., Alexa, smart bulbs), wearables (e.g., Apple Watch), and
industrial IoT rely on wireless connectivity.
o Example: A smart thermostat (like Nest) adjusts home temperature remotely via Wi-Fi.
o The COVID-19 pandemic accelerated the need for mobile work solutions (Zoom,
Microsoft Teams).
o Example: Employees use tablets and smartphones for virtual meetings while traveling.
o Digital wallets (Google Pay, Apple Pay) and online shopping require mobile devices.
o Platforms like TikTok, Instagram, and YouTube drive demand for smartphones with
better cameras and displays.
o Example: A teenager records and edits videos on a smartphone for social media.
Real-Life Example: A Day in the Life of a College Student (2024 vs. 2010)
Smartphone: Uses a 5G-enabled device for video calls (WhatsApp), online classes (Google
Classroom), and gaming.
Smart Home: Adjusts room lights and AC via a mobile app before arriving home.
Cloud Storage: Accesses notes and assignments from any device via Google Drive.
This shift highlights how mobile and wireless devices have become essential in daily life compared to
just a decade ago.
Impact of Proliferation
✅ Positive Effects:
⚠️ Challenges:
Security Risks: More devices mean more hacking targets (e.g., phishing scams).
Trends in Mobility:
Mobility trends refer to the evolving ways in which mobile and wireless technologies are transforming
communication, work, healthcare, transportation, and daily life. These trends are driven by
advancements in 5G, AI, IoT, edge computing, and hybrid work models.
1. 5G and Hyper-Connectivity
Explanation:
5G networks provide faster speeds (up to 10 Gbps), ultra-low latency (<1ms), and massive device
connectivity, enabling real-time applications like autonomous vehicles, AR/VR, and remote surgery.
Real-Life Example:
Smart City Traffic Management: In Barcelona, 5G-connected sensors monitor traffic flow in real
time, adjusting traffic lights dynamically to reduce congestion.
Telemedicine: A surgeon in New York uses a 5G-connected robotic arm to perform a precision
surgery on a patient in a rural clinic.
Explanation:
Instead of sending all data to the cloud, edge computing processes data closer to the source (e.g.,
smartphones, IoT devices), reducing latency and bandwidth usage.
Real-Life Example:
Autonomous Drones: Amazon’s delivery drones analyze flight paths and obstacle avoidance in
real time using edge AI, without needing constant cloud connectivity.
Smart Security Cameras: A home security camera (like Nest) detects an intruder locally and
instantly alerts the homeowner without uploading footage to the cloud.
Real-Life Example:
Google Lens: A tourist points their smartphone at a foreign-language menu, and AI instantly
translates it into their preferred language.
ChatGPT Mobile Apps: Professionals use AI-powered mobile assistants to draft emails,
summarize reports, or generate code on the go.
Explanation:
Smartwatches and fitness bands now track heart rate, blood oxygen, sleep patterns, and even detect
medical emergencies (e.g., falls, irregular heartbeats).
Real-Life Example:
Apple Watch ECG Feature: A user’s watch detects an irregular heartbeat (atrial fibrillation) and
alerts them to seek medical help, potentially saving their life.
Fitness Gamification: Strava and Fitbit turn workouts into social competitions, encouraging
users to stay active.
Explanation:
The post-pandemic world has normalized remote work, requiring mobile-optimized collaboration tools
(Zoom, Slack, Microsoft Teams) and cloud-based workflows.
Real-Life Example:
Digital Nomads: A freelance graphic designer works from Bali using a 5G hotspot, cloud storage
(Google Drive), and a foldable smartphone for on-the-go editing.
AR Remote Assistance: A technician fixing industrial equipment uses AR glasses to get real-time
guidance from an expert thousands of miles away.
Real-Life Example:
Multitasking Professionals: A business traveler unfolds their phone into a mini-tablet to view
spreadsheets, take notes, and video conference simultaneously.
Mobile Gaming: Gamers use foldable phones for console-like experiences without carrying a
separate device.
Explanation:
Cashless transactions via NFC (Apple Pay, Google Pay), QR codes (PayTM, Alipay), and cryptocurrency
wallets are replacing physical cards.
Real-Life Example:
Street Vendors in India: A chai stall accepts payments via UPI QR codes, eliminating the need
for cash.
Contactless Transit: In London, commuters tap their smartphones (with NFC) to pay for subway
rides instead of using physical tickets.
Explanation:
Cars now integrate 5G, AI, and IoT for self-driving features, real-time traffic updates, and vehicle-to-
vehicle (V2V) communication.
Real-Life Example:
Tesla Autopilot: A driver uses AI-assisted navigation where the car adjusts speed, changes
lanes, and parks itself.
Smart Traffic Lights: In Singapore, traffic signals communicate with buses to extend green
lights if they’re running behind schedule.
Real-Life Example:
Banking Apps: HSBC uses AI-driven behavioral biometrics to detect if someone else is using
your phone for transactions.
Apple’s App Tracking Transparency: Users can now block apps from tracking their location,
enhancing privacy.
Brain-Computer Interfaces (BCI) (e.g., controlling devices with thoughts via Neuralink-like tech)
Drone Taxis & Flying Cars (e.g., Uber Air’s proposed air mobility solutions)
The rise of mobile and wireless technologies has revolutionized digital payments, but it has also led to a
surge in credit card fraud. Cybercriminals exploit vulnerabilities in mobile apps, wireless networks, and
payment systems to steal financial data.
How It Works: Scammers create fake banking or shopping apps that mimic legitimate ones to
steal login credentials and card details.
Example: A user downloads a fake "Amazon Shopping" app from a third-party site, enters their
credit card info, and the fraudster uses it for unauthorized purchases.
How It Works: Hackers intercept unencrypted data transmitted over public Wi-Fi (e.g., in cafes
or airports).
Example: A traveler logs into their bank account at an airport Wi-Fi hotspot, and a hacker
captures their credit card details.
How It Works: Fraudsters trick telecom providers into transferring a victim’s phone number to a
new SIM card, allowing them to bypass SMS-based two-factor authentication (2FA).
Example: A criminal impersonates a victim, convinces the mobile carrier to switch their number,
and resets banking passwords via SMS OTPs.
How It Works: Criminals use RFID skimmers to steal card details from contactless payments
(Apple Pay, Google Pay) in crowded places.
Example: A thief stands near a victim in a subway and wirelessly scans their wallet for NFC-
enabled card data.
How It Works: Malicious apps or infected links install spyware that logs keystrokes, screenshots,
and credit card details.
Example: A user clicks on a malicious link in a text message, unknowingly installing spyware that
steals saved card details in their mobile wallet.
How It Works: Stolen card details are used for online purchases where the physical card isn’t
required.
Example: A hacker buys a stolen credit card database from the dark web and makes multiple
online purchases before the victim notices.
What Happened? A hacker breached Uber’s internal systems via a phishing attack on an
employee’s mobile device, gaining access to sensitive financial data.
Impact: Over 500,000 users were charged unknowingly via their linked credit cards.
What Happened? Hackers injected malicious scripts into mobile checkout pages, stealing card
details during transactions.
Impact: Major retailers like British Airways and Ticketmaster suffered breaches, affecting
millions.
Mobile Wallets (Apple Pay/Google Pay) – Tokenization replaces card numbers with secure
digital tokens.
Virtual Cards – Services like Privacy.com generate disposable card numbers for online
purchases.
Use biometric authentication (Face ID, Fingerprint) instead of SMS-based OTPs when possible.
1. Data Leakage
Mobile devices often store sensitive data like emails, passwords, financial info, or corporate documents. This data can be
leaked:
🛡️ Example: An employee installs a flashlight app that secretly uploads contact data to an external server.
Physical loss or theft of a mobile device is one of the most common risks.
Weak or absent PINs, patterns, or biometric security can make access easy
Auto-login features in apps make it easy for thieves to access emails, social media, banking, etc.
Mobile users often connect to public Wi-Fi networks, which are common targets for:
Eavesdropping
🛡️ Solution: Use VPNs and discourage users from accessing sensitive services on public Wi-Fi.
🛡️ Example: A game app requesting SMS access could intercept 2FA codes.
5. Lack of Updates / OS Fragmentation
Many users don’t update their devices regularly. This leads to:
Unpatched vulnerabilities
Hardcoded credentials
🛡️ Example: A banking app that stores passwords in plain text on the device.
🛡️ Solution: Use MDM or implement containerization to separate work and personal data.
8. Phishing Attacks
SMS (Smishing)
🛡️ Example: A fake SMS claiming to be from a bank lures users into entering credentials.
🛡️ Solution: Disable Bluetooth/NFC when not in use; apply regular security patches.
10. Unauthorized Access to Cloud Services
Most mobile apps sync with cloud services. Without proper security:
An attacker gaining access to one app can potentially compromise cloud data
The Windows Registry is a centralized database used by Windows operating systems to store configuration settings. It acts
like the DNA of the system, controlling everything from system behavior to user preferences.
In mobile/portable devices running Windows (like Surface devices or business laptops), registry settings are often used to:
These settings are crucial for preventing unauthorized access, especially on mobile devices that are frequently taken
outside the office.
Key Uses:
Benefits:
Mobile devices constantly switch between different networks. Registry settings can control how and when they connect.
Key Uses:
Benefits:
Key Uses:
Benefits:
Key Uses:
Benefits:
On-the-go devices need to balance performance with battery life. Registry settings help manage this balance.
Key Uses:
Benefits:
Registry settings also control the look, feel, and behavior of the user interface.
Key Uses:
Benefits:
In enterprise environments, registry settings are often not changed manually. Instead, they are managed via:
Mobile Device Management (MDM) tools like Microsoft Intune or VMware Workspace ONE
These tools apply policies to devices remotely and ensure consistency across a fleet of laptops or tablets.