Importance of Mobile Security

Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with
or

Already have an account? Sign In »

Time
1 hour 1 minute
Difficulty
Beginner
CEU/CPE
1
Video Transcription
00:00
welcome tune and user mobile security course. And in this listen, I'm going to talk about importance of mobile security.
00:08
So first of all, let's talk about what is considered to be a mobile device on the first place. It's a mobile phone because almost everybody owns it, and we have all kind of mobile phones we have. The majority is based on Android operating system and your worldwide.
00:28
You have Apple mobile phones. You still have some phones in there in use that are based on Windows Mobile.
00:37
They're slightly slowly fading away,
00:40
and there are some new operating system popping up now and then. But majority of what we have today and what I'm going to talk about in this course is android and ah, IOS or Apple's mobile phones.
00:56
Then we have tablets and tablets come in all shapes and sizes and ah, and operating systems as well. So we have Windows tablets. We have ah and, uh, android tablets. We even have ah, home OS tablets.
01:15
And of course, we have tablets based on
01:19
Apple's operating system. So and those three basically run the show. So
01:26
so there are differences in security approaches for each of these are braking systems, regardless off. If your tablet has a keyboard or doesn't attachable keyboard, it really doesn't matter.
01:42
Ah, and of course, we have no book PCs
01:44
and notebook PC's when you look it from a business perspective, they comprise the majority off devices in which date a stored and which are essentially being attacked to extract data. Of course, you can extract mobile phones to extract
02:00
attack mobile phones to extract, for example, passwords for e banking. Because people used mobile phones to pay
02:07
their bills on, they can have access to their money
02:13
on what is important and wise. Aled. This talk about mobile device security is so important
02:20
is that when you look at the recent data for 2019
02:25
that's the PC's represent only 22.6% of computing device sales. Now, when you look at historical data, it wasn't so low just a couple of years ago. So when you little get to the number of devices used today, desktop PC's are still
02:45
important part off what is in use for, especially for business purposes. But
02:51
the trend is going towards mobile devices, and if you're looking at the company knee level or corporate level users. Even if they're using pieces, they're most likely getting a Snoopy. See. An old book is, except for some
03:08
very specific situations, like if you're working on a counter, if you're teller in a bank, then you will have ah, desktop PC. Otherwise, if you're some kind off individual contributors or just the manager, but in a major contributor in the company, that's doing
03:27
whatever and you will probably get a noble cause. Is your work PC
03:32
if not for any other reason, so that you can work from home?
03:39
So why security of mobile devices so important? And, um,
03:46
like I said,
03:47
it is there being used more and more,
03:51
and, uh, because they're being used more and more and absolutely every location in the plant on the planet, it is more and more difficult to track them and to secure them.
04:06
Then that's the PC's.
04:09
So when you look all of these devices,
04:14
uh, you see, the people are you know, the business is getting faster and you work for many
04:20
point
04:23
and you're connecting to unsecure public networks all the time, So this is a huge risk
04:29
whether you have a mobile phone. Whether you have ah, notebook, whether you have a tablet,
04:34
it is always easy. And of course, jeepers. So you're saving money if you're connecting to WiFi instead of using your mobile plan,
04:44
especially if you're using get a lot.
04:47
So this is what people are doing,
04:50
and the main reason is wise. Security of mobile devices so important is because of mobile devices are more and more being used for security breaches by cyber criminals. This is very important.
05:04
So these people are essentially,
05:08
uh, looking at the weakest link seen in I t chain in the company,
05:15
and you create very weakling when you connect to on secure public for just to read your mail.
05:25
So, um,
05:26
it's a different approach when somebody wants to take you on a mobile device. Not so much about what type of devices, mobile phone or a tablet or notebook, but what
05:40
operating system are you using?
05:42
So android devices today are by definition, most vulnerable. Of course, there are anti virus programs, anti malware programs for android.
05:50
But the way that android is an operating system was conceived from Start is that it wasn't very secure. Of course, Google is working on making it more secure. But still it has Bean confirmed in practice that these things are really, really open.
06:10
No, I always devices, or Apple's devices are little harder toe hack,
06:14
and they're not safe.
06:16
The fact that you are basically able to, uh, install laps only from Apple Store makes it a little bit more secure, but
06:27
not really so. If you're it just takes more time to crack Apple phone, for example, than Android. For
06:34
now, Windows based notebooks and tablets, they can be very secure as Windows is ah, main operating system, used by big corporations by big banks, even government institutions in security services. So they have found a way to
06:51
secure these devices. It doesn't mean that if you own a PC or automatically secure,
06:58
because quite a lot of things have to be done in order to make your mobile device like no book secure
07:08
and of course, hacking approach also difference depending on the type of device. So there are some things that you can use to, For example, hack mobile phones, which connect to mobile network, then that you cannot use when you are trying to hack a notebook because
07:27
it's not using mobile network, so
07:29
there is one less channel toe
07:31
use.
07:33
So I hope you have learned about importance off
07:40
mobile devices on Duh. What you
07:45
I have learned in this lesson is what constitutes is more, well, the rice
07:49
wise mobile devices the security so important. So
07:55
because they're used everywhere, it is difficult to control the communication channel they're using, and therefore they're more much more prone to attacks than
08:07
the stop or species that are located only in the company building or your home.
08:16
And you have learned some details about how hacking off mobile devices can differ depending on the type off operating system used and also depending on a different type of device you're using.
Up Next
End User Mobile Security

This course should give you basic ideas on importance of mobile device security, what needs to be protected on mobile device, who should be responsible for mobile device security and what are basic thing you need to do in order to reach that goal.

Instructed By