BCY402 Module 2
BCY402 Module 2
Module-II
Security Threats-Challenges
Mobile devices need additional, specialized protection measures beyond those implemented for other
client devices, such as desktop and laptop devices that are used only within the organization’s
facilities and on the organization’s networks.
1. Lack of Physical Security controls: Mobile devices are typically under the complete control
of the user, and are used and kept in a variety of locations outside the organization’s control,
including off premises. Even if a device is required to remain on premises, the user may move
the device within the organization between secure and non-secured locations. Thus, theft and
tampering are realistic threats. The security policy for mobile devices must be based on the
assumption that any mobile device may be stolen or at least accessed by a malicious party.
The threat is twofold: A malicious party may attempt to recover sensitive data from the device
itself, or may use the device to gain access to the organization’s resources.
2. Use of untrusted mobile devices: In addition to company-issued and company controlled
mobile devices, virtually all employees will have personal smartphones and/or tablets. The
organization must assume that these devices are not trustworthy. That is, the devices may not
employ encryption and either the user or a third party may have installed a bypass to the built-
in restrictions on security, operating system use, and so on.
3. Use of Untrusted Networks: However, for off-premises use of mobile devices, the user will
typically access organizational resources via Wi-Fi or cellular access to the Internet and from
the Internet to the organization. Thus, traffic that includes an off-premises segment is
potentially susceptible to eavesdropping or man-in-the-middle types of attacks. Thus, the
security policy must be based on the assumption that the networks between the mobile device
and the organization are not trustworthy.
4. Use of Applications Created By Unknown Parties: It is easy to find and install third-party
applications on mobile devices. This poses the risk of installing malicious software. An
organization has several options for dealing with this threat, as described subsequently.
5. Interaction with Other Systems: A common feature found on smartphones and tablets is the
ability to automatically synchronize data, apps, contacts, photos, and so on with other
computing devices and with cloud-based storage. Unless an organization has control of all the
devices involved in synchronization, there is considerable risk of the organization’s data
being stored in an unsecured location, plus the risk of the introduction of malware.
6. Use of Untrusted Content: Mobile devices may access and use content that other computing
devices do not encounter. An example Quick Response (QR) code, which is a two-
dimensional barcode.
Dept. of CSE (CY), RNSIT Page 3
Module-II BCY402: ECS
QR codes are designed to be captured by a mobile device camera and used by the mobile
device. The QR code translates to a URL, so that a malicious QR code could direct the mobile
device to malicious Web sites.
7. Use of Location Services: The GPS capability on mobile devices can be used to maintain
knowledge of the physical location of the device. While this feature might be useful to an
organization as part of a presence service, it creates security risks. An attacker can use the
location information to determine where the device and user are located, which may be of use
to the attacker.
1. Device Security: A number of organizations will supply mobile devices for employee use
and preconfigured those devices to conform to the enterprise security policy. However, many
organizations will find it convenient or even necessary to adopt a bring-your-own-device
(BYOD) policy that allows the personal mobile devices of employees to have access to
corporate resources. IT managers should be able to inspect each device before allowing
network access. IT will want to establish configuration guidelines for operating systems and
applications. For example, “rooted” or “jail-broken” devices are not permitted on the network,
and mobile devices cannot store corporate contacts on local storage. Whether a device is
owned by the organization or BYOD, the organization should configure the device with
security controls, including the following:
Enable auto-lock, which causes the device to lock if it has not been used for a given
amount of time, requiring the user to re-enter a four-digit PIN or a pass word to re-
activate the device.
Enable password or PIN protection. The PIN or password is needed to unlock the device.
In addition, it can be configured so that email and other data on the device are encrypted
using the PIN or password and can only be retrieved with the PIN or password.
Avoid using auto-complete features that remember user names or passwords.
Enable remote wipe.
Ensure that SSL protection is enabled, if available.
Make sure that software, including operating systems and applications, is up to date.
Install antivirus software as it becomes available.
Either sensitive data should be prohibited from storage on the mobile device or it should
be encrypted.
IT staff should also have the ability to remotely access devices, wipe the device of all
data, and then disable the device in the event of loss or theft.
The organization may prohibit all installation of third-party applications, implement
whitelisting to prohibit installation of all unapproved applications, or implement a secure
sandbox that isolates the organization’s data and applications from all other data and
applications on the mobile device. Any application that is on an approved list should be
accompanied by a digital sig nature and a public-key certificate from an approved
authority.
The organization can implement and enforce restrictions on what devices can
synchronize and on the use of cloud-based storage.
To deal with the threat of untrusted content, security responses can include training of
personnel on the risks inherent in untrusted content and disabling camera use on
corporate mobile devices.
To counter the threat of malicious use of location services, the security policy can dictate
that such service is disabled on all mobile devices.
2. Traffic Security: Traffic security is based on the usual mechanisms for encryption and
authentication. All traffic should be encrypted and travel by secure means, such as SSL or
IPv6. Virtual private networks (VPNs) can be configured so that all traffic between the
mobile device and the organization’s network is via a VPN. A strong authentication protocol
should be used to limit the access from the device to the resources of the organization. Often,
a mobile device has a single device-specific authenticator; because it is assumed that the
device has only one user. A preferable strategy is to have a two-layer authentication
mechanism, which involves authenticating the device and then authenticating the user of the
device.
3. Barrier Security The organization should have security mechanisms to protect the network
from unauthorized access. The security strategy can also include firewall policies specific to
mobile device traffic. Firewall policies can limit the scope of data and application access for
all mobile devices. Similarly, intrusion detection and intrusion prevention systems can be
configured to have tighter rules for mobile device traffic.
Wireless and mobile devices have become ubiquitous in today’s society, and with this increased
usage comes the potential for security threats. Wireless and mobile device attacks are a growing
concern for individuals, businesses, and governments.
Below are some of the most common types of Wireless and Mobile Device Attacks:
SMiShing: Smishing become common now as smartphones are widely used. SMiShing uses Short
Message Service (SMS) to send fraud text messages or links. The criminals cheat the user by
calling. Victims may provide sensitive information such as credit card information, account
information, etc. Accessing a website might result in the user unknowingly downloading malware
that infects the device.
War driving : War driving is a way used by attackers to find access points wherever they can be.
With the availability of free Wi-Fi connection, they can drive around and obtain a very huge
amount of information over a very short period of time.
WEP attack: Wired Equivalent Privacy (WEP) is a security protocol that attempted to provide a
wireless local area network with the same level of security as a wired LAN. Since physical
security steps help to protect a wired LAN, WEP attempts to provide similar protection for data
transmitted over WLAN with encryption. WEP uses a key for encryption. There is no provision
for key management with Wired Equivalent Privacy, so the number of people sharing the key will
continually grow. Since everyone is using the same key, the criminal has access to a large amount
of traffic for analytic attacks.
WPA attack: Wi-Fi Protected Access (WPA) and then WPA2 came out as improved protocols to
replace WEP. WPA2 does not have the same encryption problems because an attacker cannot
recover the key by noticing traffic. WPA2 is susceptible to attack because cyber criminals can
analyze the packets going between the access point and an authorized user.
Bluejacking: Bluejacking is used for sending unauthorized messages to another Bluetooth device.
Bluetooth is a high-speed but very short-range wireless technology for exchanging data between
desktop and mobile computers and other devices.
Replay attacks: In a Replay attack an attacker spies on information being sent between a sender
and a receiver. Once the attacker has spied on the information, he or she can intercept it and
retransmit it again thus leading to some delay in data transmission. It is also known as playback
attack.
Bluesnarfing : It occurs when the attacker copies the victim’s information from his device. An
attacker can access information such as the user’s calendar, contact list, e-mail and text messages
without leaving any evidence of the attack.
There are several types of attacks that target these devices, each with its own
advantages and disadvantages:
Wi-Fi Spoofing: Wi-Fi spoofing involves setting up a fake wireless access point to trick users
into connecting to it instead of the legitimate network. This attack can be used to steal sensitive
information such as usernames, passwords, and credit card numbers. One advantage of this attack
is that it is relatively easy to carry out, and the attacker does not need sophisticated tools or skills.
However, it can be easily detected if users are aware of the legitimate network’s name and other
details.
Packet Sniffing: Packet sniffing involves intercepting and analyzing the data packets that are
transmitted over a wireless network. This attack can be used to capture sensitive information such
as email messages, instant messages, and web traffic. One advantage of this attack is that it can be
carried out without the user’s knowledge. However, the attacker needs to be in close proximity to
the victim and must have the technical skills and tools to intercept and analyze the data.
SMS Spoofing: SMS spoofing involves sending text messages that appear to come from a trusted
source, such as a bank or a government agency. This attack can be used to trick users into
revealing sensitive information or downloading malware. One advantage of this attack is that it
can be carried out without the user’s knowledge. However, it requires the attacker to have the
victim’s phone number, and it can be easily detected if users are aware of the legitimate source
of the message.
Malware: Malware is software designed to infect a device and steal or damage data. Malware can
be distributed through email attachments, software downloads, or malicious websites. One
advantage of this attack is that it can be carried out remotely, without the attacker needing to be
physically close to the victim. However, it requires the attacker to have a way to deliver the
malware to the victim’s device, such as through a phishing email or a fake website.
There are a variety of attacks that may be launched against mobile networks, and they are two
types i.e.
1. Out of the mobile network: public net, private networks, other networks and,
2. Inside mobile network: Smartphones, laptops, and pcs linked to the 3G network.
Cabir worm –
It is the initially known worm in phones; It attacks mobiles which then scans remaining
devices for its replica to start mobile which detects using Bluetooth.
Mosquito Trojan –
Mosquito Trojan is a corrupted variant of the Mosquitoes mobile game targeting series 60
phones.
Brador Trojan –
Infects the Windows Mobile operating system by making the svchost.exe file in the startup
file of windows, which gives you full access to phones. Standard worm transmission vectors,
including email attachments, are compatible with this executable.
Lasco Worm –
It was initially published in 2005 and was designed to attack Symbian-based PDAs and cell
phones. Lasco is built on Cabir’s code and uses Bluetooth technology to duplicate.
3. Overbilling attack:
An attacker hijacks a user’s IP address and then uses it to begin non-free transfers or just for own
reasons. In any scenario, the transaction is charged to the real user. Whenever a lawful user’s IP
address is restored to an IP pool, a hacker can intercept this and take ownership. After that, the
hacker takes advantage of a user’s Cellular/mobile network services.
5. Signaling-level attacks:
VoIP services in IMS networks are provided using signaling by Session Initiation Protocol (SIP) .
SIP-based VoIP systems have a number of security flaws.
Secure Code Practices: The code base of the app must be developed in adherence to
secure coding practices so that the developers can reduce the number of vulnerabilities in
the code of the app. Such things are data input verification to prevent injection attacks, no
hardcoded credentials, and regular auditing with functional testing for security flaws.
Secure Storage: Holding private data including passwords, tokens, and private keys in
safety subject to the device is necessary. Technologies such as utilizing the device’s safe
storage APIs and encryption for delicate data give security the needed improvement.
App Permissions: The mobile platforms grant an app access to specific data and device
features through permission-based systems for the whole user control. Apps should only
request permissions when it is necessary and at the same time, the apps should present
clear explanations to users on why some permission is requisite.
The digital payment system is spreading rapidly in India. One can witness that most people
avoid cash. This avoidance is usually due to the risks involved with the hard money.
Someone may steal it. It may also face damage.
The digital payment system requires that both parties have electronic mediums. The payee
can only make the online payment if the receiver has a digital mode.
The digital payment system also involves payments on the physical premises. For
example, one may pay with a card in the grocery store. This will still be a digital
payment.
The other common one is online shopping. People order goods and can pay for the same
digitally. The digital payment system thus allows both these transactions.
Digital payment system usually requires bank linking. The person must have their
account and link the same with the medium.
Also, one must follow prudence in the digital payment system. They should follow the
privacy rules and not share any details.
o The digital payment system is an essential component of economic growth. More people
connect to the internet. The government can also get accurate income details. The economy
also reduces the dependency on hard money
1. Banking Cards
3. Mobile Wallets
https://testbook.com/ugc-net-commerce/digital-payment-system
Digital payment security is a crucial aspect of the financial ecosystem, especially with the
increasing adoption of various digital payment methods. Here is a detailed discussion on the
security aspects of different digital payment methods:
Banking cards are a common digital payment system type. These can be debit or credit banks.
The different banks issue these cards to their account holders. Customers can complete payments
with this method. They might have to use a pin for the same. Most businesses now offer these
payments. One can carry these cards anywhere. Also, it is easy to cancel these cards if lost or
stolen. They provide better security with passwords. Also, customers can pay later with credit
cards. They have to pay the bills instead of shelling out cash at the time.
Security Features:
EMV Chip Technology: Modern cards come with an EMV chip that generates a
unique transaction code for each purchase, making it difficult for fraudsters to
duplicate.
Tokenization: Sensitive card details are replaced with a unique token during
transactions, protecting actual card data.
Two-Factor Authentication (2FA): Many transactions require a second form of
verification, such as a one-time password (OTP) sent to the cardholder's phone.
Challenges:
Skimming: Fraudsters use devices to capture card information during transactions.
Phishing: Attempts to obtain card details through fraudulent communication.
References:
EMVCo - EMV Specifications
Challenges:
Phishing and Vishing: Fraudsters may trick users into sharing their UPI credentials.
App Security: The security of the mobile device and the UPI application is critical.
References:
NPCI – UPI
3. Digital Wallets
These mobile wallets provide another digital payment system. They are digital wallets with
balance. One can use these wallets to make payments. These wallets are often linked to the
individual's bank account. One may transfer some money for the same. Several banks and private
companies offer their wallets. They provide offers like cashback and discounts to promote their
use.
Security Features:
Tokenization: Similar to banking cards, wallet transactions use tokenization to
protect user data.
Biometric Authentication: Many wallets support fingerprint or facial recognition for
added security.
Secure Storage: Wallets store payment information in secure, encrypted
environments.
Challenges:
Mobile Device Security: If a user's mobile device is compromised, so is their wallet.
Phishing: Users can be lured into providing their wallet credentials.
References:
Apple Pay Security and Privacy Overview
Google Pay Security
The USSD digital payment system is present for the sections that don't have regular internet
access. There are some remote areas where people don't have this facility. They can use a simple
essential features phone. The person has to dial *99#. It helps access banking services without the
internet. The individual may enquire about their bank balance. They can also use it for interbank
transfers in bank accounts. All telecom providers have this service. It helps provide a digital
payment system for everyone.
Security Features:
Session-Based Communication: USSD operates on a session-based model, reducing the
risk of data being stored or intercepted.
PIN Authentication: Transactions often require a secure PIN for authorization.
Challenges:
Lack of Encryption: USSD data is not always encrypted, making it susceptible to
interception.
Phishing: Users might be tricked into disclosing their USSD PIN.
References:
GSMA - Mobile Financial Services
Security Features:
Biometric Authentication: AEPS transactions use the Aadhaar number and
biometric data (fingerprint or iris scan) for authentication.
Secure Network: Transactions are processed through secure channels managed by the
National Payments Corporation of India (NPCI).
Challenges:
Biometric Spoofing: Although difficult, biometric data can be spoofed.
Data Privacy: The centralization of biometric data raises privacy concerns.
References:
UIDAI – AEPS
Conclusion
The security of digital payment systems is paramount to protecting users and maintaining trust in
digital transactions. Each payment method has its unique security features and challenges, but
with robust practices and user awareness, risks can be significantly mitigated. For more detailed
and specific information, users should refer to official resources and guidelines provided by
financial institutions and regulatory bodies.
Preventive Measures
Implementing these preventive measures can significantly reduce the risk of digital
payment fraud and ensure a secure transaction environment for both users and service
providers.
Dept. of CSE (CY), RNSIT Page 20