Вы находитесь на странице: 1из 20

By :-

Ujas Patel
L.D.College of Engineering Ahmedabad

Cell-Phone Virus

INTRODUCTION
A cell-phone virus is basically the same thing as a computer virus an unwanted executable file that

"infects" a device and then copies itself to other devices. The most common type of cell- phone infection right now occurs when a cell phone downloads an infected file from a PC or the Internet, but phone-to-phone viruses are on the rise.

SPREADING OF VIRUS
These viruses spread primarily in three ways:
1. Internet downloads 2. Bluetooth wireless

3. Multimedia Messaging

VIRUS ACTIONS
subsequently, the virus could do damage by either deleting or modifying the phone book, or by starting to make phone calls to pay-per-minute

numbers.

MOTIVES TO CREATE VIRUS


Viruses are written for a variety of reasons, such as curiosity, a challenge, or to gain wider attention.
Some virus writer groups are known to target any

new platform just is able to say they were the first to write a virus for this platform.

Symptoms of Cell Phone Viruses


Disable all the cell phone functionality except call sending and receiving. Your mobile may send auto-SMS to everyone listed in your phone book. Cell phone memory might be crashed.

PC VIRUS VS CELLPHONE VIRUS


A computer virus or worm spreads through e-mail attachments and Internet downloads.

A cell-phone virus or worm spreads via Internet downloads, MMS (multimedia messaging service)

attachments and Bluetooth transfers.

MOBILE (IN)SECURITY

MOBILE SECURITY PROCESSING SYSTEM

1. SW Architecture

At the top level, the SW architecture provides a generic interface using which security protocols and applications can be ported to the platform. The design of each SW layer can proceed concurrently, leading to drastic reductions in design times. Custom instructions can be developed for the basic operations layer without waiting for the SW implementation of higher layers to become available.

1. HW Platform Architecture

The added instructions are executed by custom hardware, which is tightly integrated into the processor execution pipeline.

Developers Responsibility
Mobile application developers must learn how best to manage mobile application security risks
1. Limited memory and CPU

2. Multiple security models


3. Always on network

Knowing the risks and how to respond to them is the only hope for creating secure software

WAP SECURITY
In case of WAP security ,From the outset, vendors of mobile phones and WAP servers have ensured that much consideration was given to

confidentiality and privacy issues for WAP data, as well as to user authentication. Add this to the fact that data integrity checking has been taken into account, and one could be forgiven for thinking that the WAP infrastructure WAS already secure enough.

Different Kind of Eavesdropping


Anyone can install eavesdropping software on your smart

phone, as long as they have access to your phone even for a few minutes Subtle signs that could suggest someone is secretly tapping your cell phone
Cell phone battery is warm even when your phone has not

been used
Cell phone lights up at unexpected times, including

occasions when phone is not in use


Unexpected beep or click during phone conversation

Layered Security Easy Steps


Enable passcode and auto-lock features
Dont store sensitive data Verify independently before you click on any unknown

text or email message, game, application, or security update

Avoid Cell Phone Viruses and Security Troubles by Taking Simple Precautions

Lock Your Phone Avoid Illegal Downloads

Read Privacy Policies


Turn Bluetooth Off

Don't Open Unsolicited Files


Don't Keep Personal Information on Your Phone Always use a PIN to Access Your Voice Mail Keep your Computer Virus Free

CONCLUSION
Install some type of security software on your phone.

Numerous companies are developing security software for cell phones, some for free download, some for user purchase and some intended for cell-phone service providers.
Never open anything if you don't know what it is, haven't

requested it or have any suspicions whatsoever that it's not what it claims to be.

THANK YOU

Вам также может понравиться