UNIT-2 (Part-1)
UNIT-2 (Part-1)
UNIT-2 (Part-1)
The trends in mobility reflect the way people move around is always changing, showing how things in mobility are always
shifting and getting more innovative in mobile computing and related technologies.
Some prominent trends in mobility are:
1) 5G Technology: 5G networks are spreading quickly, bringing much faster internet, less waiting time, and better
connections. This means we can look forward to new things like cooler augmented reality, virtual reality, self-
driving cars, and smart devices connected to the internet.
2) Internet of Things (IoT) Integration: More and more, we're seeing IoT (Internet of Things) technology being
used in our daily lives, from smart homes and cities to industries. This surge in IoT means there are now lots of
devices connected to the internet, giving us useful data and making things work more efficiently and conveniently.
3) Edge Computing: Edge computing means dealing with data closer to where it comes from, making things happen
faster and allowing instant analysis. This is super important for things like self-driving cars, remote healthcare, and
smart industrial devices.
4) Mobile App Development for Multiple Platforms: Cross-platform app development frameworks like Flutter and
React Native were gaining popularity, they help create apps that work on both Android and iPhone. This is
happening because it's a cost-effective and efficient way to build apps.
5) Augmented Reality (AR) and Virtual Reality (VR): AR and VR technologies were evolving and finding
applications in various sectors, including gaming, education, healthcare and retail. The development of AR glasses
and headsets was a notable focus, offering new possibilities for interactive experiences.
6) Mobile Security and Privacy: As more people use phones for important stuff, like transactions and saving data,
keeping them secure becomes a big deal. This includes using fingerprints or other biometrics, making sure messages
are private, and controlling what apps can do on your phone.
7) Mobile Commerce (m-Commerce): The growth of mobile commerce continued, with more users making
purchases through mobile apps. Integration of secure payment gateways, personalized shopping experiences and
convenient payment options were driving this trend.
8) Mobile Health (m-Health): Using mobile devices for health, like talking to doctors online, tracking health, fitness
apps, and getting reminders for medications, has become really popular. The COVID-19 situation made people
adopt these mobile health solutions even faster.
9) Sustainability and Eco-Friendly Initiatives: More people caring about the environment means paying attention
to making mobile devices in a way that's good for the planet. This includes using materials that can be recycled,
making devices that use less energy, and being responsible when making them.
10) Artificial Intelligence (AI) Integration: Al and machine learning were being integrated into mobile apps to
enhance user experiences, personalize content and provide intelligent automation. Voice assistants and chatbots
were common Al-driven features.
11) Mobile-First Design and User Experience (UX): When creating apps, it's smart to think first about how they
work on phones and tablets. This is because a lot of people use their mobile devices a ton for browsing and using
apps, so making them work well on those devices is important.
12) Remote Work and Collaboration Tools: More people working from home means needing tools on mobiles for
teamwork. This includes apps for video meetings, managing projects, and sharing documents to make remote work
efficient.
2. Web-based threat: According to the widespread usage of mobile phones, which we carry with us all the time and remain
connected to the Internet, so while doing so, they are exposed to a multitude of distinctive web-based threats in addition to
the common risks associated with general Internet usage.
Phishing Attacks: Cybercriminals create fake websites or e-mails that mimic legitimate ones to trick users into
providing sensitive information such as login credentials, financial data, or personal details.
Drive-By Downloads: Visiting malicious websites can trigger automatic downloads of malware or unwanted
applications without the user's consent.
3. Network-based threat:
Mobile devices are often connected to three types of networks—cellular, Wi-Fi, and Bluetooth—making them
vulnerable to various network-based threats.
Man-in-the-Middle (MitM) Attacks: Attackers intercept and potentially alter communication between the mobile
device and the network, allowing them to eavesdrop, steal data, or inject malicious content.
Wi-Fi Eavesdropping: Hackers can set up fake or unsecured Wi-Fi networks to intercept users' data transmitted
over the network.
Network exploits: Network exploits refer to the utilization of vulnerabilities or weaknesses in a network's security
infrastructure or software to gain unauthorized access, control, or manipulate the network. These exploits can be
executed by cyber attackers to compromise the confidentiality, integrity, or availability of the network, its resources
and the data transmitted across it.
Wi-Fi sniffing: Wi-Fi sniffing, also known as Wi-Fi packet sniffing or wireless sniffing, is a practice used to capture
and analyze data packets transmitted over a Wi-Fi network. This technique allows someone to intercept, read and
sometimes manipulate the data being sent between devices and access points on a wireless network. While this can
be done for legitimate purposes (e.g., network diagnostics), it can also be used maliciously for capturing sensitive
information.
4. Physical Threats:
It can happen at any time. Unlike a desktop fixed at your workstation or a laptop stowed in your bag, a mobile
device is vulnerable to various common physical threats.
Loss or Theft: Losing a mobile device or falling victim to theft can result in unauthorized access to personal data,
financial information, and sensitive accounts unless the device is sufficiently safeguarded.
Tampering: Manipulating the device physically, including actions like SIM card swapping or hardware tampering,
can provide unauthorized access and potentially compromise the device's security.
Some other Threats: Below are the most common examples of these threats, as well as steps organisations can take to
protect themselves from them:
1. Social Engineering Attacks: Social engineering attacks are when bad actors send fake e-mails (phishing attacks) or
text messages (smishing attacks) to your employees to trick them into handing over private information like their
passwords or downloading malware onto their devices. Reports by cybersecurity firm Lookout and Verizon show a
37% increase in enterprise mobile phishing attacks and that phishing attacks were the top cause of data breaches globally
in 2020.
Phishing/Social engineering Attack/Counter measures: The best defense for phishing and other social engineering
attacks is to teach employees how to spot phishing e-mails and SMS messages that look suspicious and avoid falling
prey to them altogether. Reducing the number of people who have access to sensitive data or systems can also help
protect your organization against social engineering attacks because it reduces the number of access points attackers
must gain access to critical systems or information.
2. Data Leakage via Malicious Apps: Malicious apps are a big worry for mobile security because they pretend to be
helpful but can actually harm your device and steal your data. These apps might look real, but they can secretly send
your information to others, like a competitor, putting your business at risk. Even if the app seems fine, it could be
mining your company data. To stay safe, be careful about giving apps too many permissions, stay informed about risks,
and use security tools to protect against data leaks from these harmful apps.
How to Protect Against Data Leakage: The best way to protect your organization against data leakage through
malicious or unsecured applications is by using mobile application management (MAM) tools. These tools allow IT
admins to manage corporate apps (wipe or control access permissions) on their employees' devices without disrupting
employees' personal apps or data.
3. Unsecured Public WiFi: Using public WiFi can be risky because it's not as safe as your home or work internet. We
don't always know who set it up, if it's protected, or who else is using it. When employees use public WiFi, like in
coffee shops, to connect to work servers, it could be a danger to the company.
For example, cybercriminals often set up WiFi networks that look authentic but are actually a front to capture data
that passes through their system (a 'man in the middle' attack). Here's what that looks like:
How to Reduce Risks Posed By Unsecured Public Wi-Fi: The best way for you to protect your organisation against
threats over public Wi-Fi networks is by requiring employees to use a VPN to access company systems or files. This
will ensure that their session stays private and secure, even if they use a public network to access your systems.
4. End-to-End Encryption Gaps: Think of encryption gaps like a leak in a water pipe. Even if the start (your users'
devices) and end (your systems) of the pipe are safe, a hole in the middle lets bad actors get to the water flowing in
between. Unprotected public Wi-Fi is a common example of this gap, making it risky for organizations. When your
employees use unsecured Wi-Fi, cybercriminals might sneak in and grab the information passing between devices and
your systems. It's not just Wi-Fi; any unprotected app or service can be an entry point for these bad actors. For example,
using unsecured messaging apps for work discussions could be a way in for cybercriminals to access important company
data.
Ensure everything is Encrypted: For any sensitive work information, end-to-end encryption is a must. This includes
ensuring any service providers you work with encrypt their services to prevent unauthorized access, as well as ensuring
your users' devices and your systems are encrypted as well.
5. Poor Password Habits: A 2020 study by Balbix found that 99% of the people surveyed reused their passwords between
work accounts or between work and personal accounts. Unfortunately, the passwords that employees are reusing are often
weak as well. For example, a 2019 study by Google found that 59% of the people they surveyed used a name or a birthday
in their password and 24% admitted to using a password like one of these below:
These bad password habits present a threat to organizations whose employees use their personal devices to access company
systems. Since both personal and work accounts are accessible from the same device with the same password, it simplifies
the work a bad actor must do to breach your systems.
2. Two-factor Authentication: In this authentication system, the user must give a username, password and other
information. There are various types of authentication systems that are used by the user for securing the system. Some of
them are: - wireless tokens and virtual tokens. OTP and more.
Advantages of the Two-Factor Authentication
The Two-Factor Authentication System provides better security than the Single- factor Authentication system.
The productivity and flexibility increase in the two-factor authentication system.
Two-Factor Authentication prevents the loss of trust.
Disadvantages of Two-Factor Authentication:
It is time-consuming.
3. Multi-factor authentication system: In this type of authentication, more than one factor of authentication is needed.
This gives better security to the user. Any type of keylogger or phishing attack will not be possible in a Multi-Factor
Authentication system. This assures the user, that the information will not get stolen from them.
The advantage of the Multi-Factor Authentication System are:
No risk of security.
No information could get stolen.
No risk of any key-logger activity.
No risk of any data getting captured.
The disadvantage of the Multi-Factor Authentication System are:
It is time-consuming.
It can rely on third parties.
The main objective of authentication is to allow authorised users to access the computer and to deny access to unauthorised
users. Operating Systems generally identify/authenticates users using the following 3 ways: Passwords, Physical
identification and Biometrics.
These are explained as following below.
1. Passwords: Password verification is the most popular and commonly used authentication technique. A password
is a secret text that is supposed to be known only to a user. In a password-based system, each user is assigned a
valid username and password by the system administrator. The system stores all usernames and Passwords. When
a user logs in, their user's name and password are verified by comparing them with the stored login name and
password. If the contents are the same then the user is allowed to access the system otherwise it is rejected.
2. Physical Identification: This technique includes machine-readable badges (symbols), cards, or smart cards. In
some companies, badges are required for employees to gain access to the organisation's gate. In many systems,
identification is combined with the use of a password i.e. the user must insert the card and then supply his/her
password. This kind of authentication is commonly used with ATMs. Smart cards can enhance this scheme by
keeping the user password within the card itself. This allows authentication without the storage of passwords in the
computer system. The loss of such a card can be dangerous.
3. Biometrics: This method of authentication is based on the unique biological characteristics of each user such as
fingerprints, voice or face recognition, signatures and eyes.
4. Facial Characteristics: Humans are differentiated based on facial characteristics such as eyes, nose, lips, eyebrows
and chin shape.
5. Fingerprints: Fingerprints are believed to be unique across the entire human population.
6. Hand Geometry: Hand geometry systems identify features of the hand that includes the shape, length and width
of fingers.
7. Retinal pattern: It is concerned with the detailed structure of the eye.
8. Signature: Every individual has a unique style of handwriting and this feature is reflected in the signatures of a
person.
9. Voice: This method records the frequency pattern of the voice of an individual speaker
3. OAuth2:
OAuth2 is an authorization framework that enables users to grant limited access to their accounts through an HTTP
service. When a user wants access to certain resources, an API call is made, and an authentication token is passed.
In OAuth 2.0, which stands for Open Authorization 2.0, third-party applications can access user data without needing
the user's login credentials. This protocol is commonly used to securely and selectively provide access to resources in
client-server applications, particularly over the internet.
OAuth 2.0 sets up a structure for authorization, allowing applications to interact securely and access specific user data
without exposing sensitive login information.
Some advantages of OAuth2:
It is a simple protocol and is easy to implement.
It provides server-side authorisation of code.
Some disadvantages of OAuth2:
It is vulnerable to manage different sets of code.
It shows serious effects on sites connected to another affected system.
5. Radius:
RADIUS stands for Remote Authentication Dial-In User Service. It's a networking protocol that centrally manages
Authentication, Authorization, and Accounting (AAA) for users connecting to network services.
RADIUS is like a gatekeeper for network access. It ensures that only authorized users can connect to a network and
defines what they're allowed to do.
When a user wants to access network resources (like logging into a Wi-Fi network or a VPN):
o The user provides their credentials (username and password).
o RADIUS server encrypts these credentials for security.
The encrypted credentials are then sent to the RADIUS server. The RADIUS server checks these credentials against
a local database to verify the user's identity.
If the credentials are valid, the RADIUS server informs the network device (like a router or switch) to grant access.
If invalid, access is denied.
RADIUS manages AAA:
o Authentication: Verifying the user's identity.
o Authorization: Determining what the user is allowed to do.
o Accounting: Keeping track of usage for billing or auditing purposes.
RADIUS is widely used in networking, especially for controlling access to network resources. It's commonly
employed in scenarios like Wi-Fi authentication, VPN access, or securing access to enterprise networks.
RADIUS provides a centralized system for managing user access across different network devices. This makes it
efficient for large-scale network management.
RADIUS is a protocol that ensures secure and controlled access to network resources by authenticating users,
authorizing their actions, and accounting for their usage. It plays a crucial role in maintaining the security and
efficiency of network services.