Network Security Report
Network Security Report
Network Security Report
TECHNOLOGY
School of Information And Communication Technology
PROJECT REPORT
SECURITY RISKS ON MOBILE DEVICES USED
FOR REMOTE WORK
Hanoi, 1/2023
TABLE OF CONTENT
PROJECT REPORT................................................................................1
A. INTRODUCTION.............................................................................2
B. Mobile devices in remote work..........................................................3
C. Vulnerability......................................................................................5
D. Type of attack mobile devices can face.............................................7
E. Some attack in practice......................................................................8
I. Phishing attack................................................................................8
i. An simple phishing attack:...........................................................9
ii. Some tips for protecting yourself from phishing attacks:...........10
iii. Anti-phishing solutions..............................................................11
II. Man-in-the-middle attack..............................................................13
i. Key Concepts of a Man-in-the-Middle Attack...........................14
ii. An example MitM attack:...........................................................14
iii. MitM Prevention........................................................................19
A. INTRODUCTION
In a world reshaped by technology, the office desk has shrunk to fit in our
pockets. Laptops have migrated to coffee shops, tablets nestle between bedtime
stories, and smartphones hum with the pulse of work emails and conference
calls. The mobility revolution has redefined productivity, granting us the
freedom to work anytime, anywhere. But with this untethered access comes a
chilling undercurrent of anxiety: the vulnerability of our digital lives on slender
screens held in our palms. The security risks lurking in the mobile workplace
threaten not just personal data, but the very fabric of corporate trust and
professional success.
This essay delves into the labyrinthine world of mobile device security in the
remote work era, exploring the treacherous pathways of malware infestations,
phishing scams, and unauthorized access, while illuminating the beacons of
defense through proactive policies, vigilant awareness, and robust technological
solutions. Prepare to navigate the intricate dance between convenience and
caution, where securing our mobile devices becomes the paramount skill in the
game of digital survival.
Project management apps: Tools like Asana, Trello, and Monday.com help
you organize your tasks, set deadlines, and track your progress, keeping you
on top of your workload.
Time management apps: Utilize apps like RescueTime and Toggl Track to
monitor your time spent on different tasks, identify areas for improvement,
and stay focused.
Note-taking apps: Evernote, OneNote, and Google Keep let you capture ideas,
jot down notes, and create to-do lists, keeping your thoughts organized and
readily accessible.
News and media apps: Stay updated with industry news, market trends, and
relevant information through news apps and online publications.
Learning and development apps: Platforms like LinkedIn Learning, Coursera,
and Udemy offer online courses and training programs to help you expand
your skills and knowledge.
Company intranet and internal communication apps: Access company
documents, policies, and announcements, and stay connected with internal
updates and communications.
Mind mapping apps: Tools like Mindly and XMind help you visually
organize your thoughts, ideas, and connections, fostering creative problem-
solving and brainstorming sessions.
Design and editing apps: Mobile apps like Canva and Adobe Spark allow you
to create presentations, graphics, and social media content on the go.
Music and audio creation apps: If your work involves audio editing or music
production, mobile apps like GarageBand and FL Studio offer powerful tools
for on-the-go creativity.
Scanning apps: Scan documents, receipts, and contracts using your mobile
camera, convert them to PDFs, and store them digitally for easy access and
reference.
E-signature apps: Sign documents electronically with apps like DocuSign and
Adobe Sign, streamlining workflows and eliminating the need for printing and
physical signatures.
C. Vulnerability
The convenience of working from anywhere with your mobile device comes
with a hidden cost: increased vulnerability. Compared to traditional
desktops, these pocket-sized workhorses often have limitations that make
them more susceptible to security threats. Let's explore some key areas of
concern:
Limited Storage: With less storage space, mobile devices are more likely to
run out of memory, which can lead to performance issues and
vulnerabilities. Think of it like a cluttered desk – the more stuff you have
piled up, the easier it is for something important to get lost or stolen.
Both official and third-party app stores may contain malicious apps. These
apps can steal data, track your activities, or even compromise your device
security. Imagine a supermarket where some products are intentionally
poisoned – you wouldn't know which ones to avoid unless you're very
careful. Malicious apps often disguise themselves as legitimate productivity
tools or games, making it even harder to spot them.
1. Malware:
This malicious software can sneak onto your device through various means,
like infected apps, phishing links, or even unsecured Wi-Fi. Once installed,
malware can steal your data, hijack your device, send spam, or even harm
your device's functionality.
2. Phishing:
These deceptive attempts lure you into revealing personal information or
clicking malicious links, often disguised as legitimate sources like banks or
social media platforms. Be wary of suspicious messages, typos, and urgent
requests for information.
3. Social engineering:
Attackers exploit human psychology to trick you into compromising your
security. This could involve convincing you to download malware, share
sensitive information, or disable security features. Stay vigilant and never
share personal details with unverified sources.
5. Zero-day attacks:
These exploit previously unknown vulnerabilities in software or operating
systems, making them particularly dangerous as no security patches exist yet.
Keep your software and apps updated to minimize this risk.
Step 1: Send an message to the target that contain the link to a website that is
similar to an Google sign in form.
Step 2: The victim go to the website through the link.
The victim is send to the real Google website and will not notice that they
just send their information to attacker.
Step5: The attacker use victim’s credential to perform illegal actions.
Even though the user has being careful, there is a chance that the
user can be deceived by the phisher to visit the phishing web page.
2. User authentication.
Password management
Interface verification
QR code-based authentication
3. SMS interception: The goal is creating a native SMS application that has
two receivers that are static in which third-party applications cannot
haveaccess to particular secure SMS.
4. Cloud security service: The host application will gather files from the
mobile device and will deliverthem to the network service so it can
determine whether they contain malicious code or objects.
5. Visual similarity: detecting repackaged applications that appear similar
using an application database for applications that are stored in a
depository.
You can think of this type of attack as similar to the game of telephone
where one person's words are carried along from participant to participant
until it has changed by the time it reaches the final person. In a man-in-the-
middle attack, the middle participant manipulates the conversation unknown
to either of the two legitimate participants, acting to retrieve confidential
information and otherwise cause damage.
Step 2: Using Ettercap to place ourselves between the two targets systems
Now all their traffic must flow through us. we can now delete, manipulate,
impersonate and view all their traffic.
Analyze the packet to get the information abbout the web page that mobile
device just connect.
Use HTTPS and SSL: HTTPS encrypts the data and ensures its
integrity and authenticity, while SSL verifies the identity of the server
and the client.
Use VPN: This encryption stops the MITM attack from infiltrating
your network traffic. Even if a criminal manages to access your
network, the encrypted data blocks them from reading your messages
or knowing which websites you’re going to.