CS Unit-Iii
CS Unit-Iii
Cybercrime:
Mobile &
Wireless Devices
K. BALAKRISHNA
B.Tech., MBA., M.Tech., DID., (Ph.D)
Contents
1. Introduction
2. Proliferation of Mobile and Wireless
Devices
3. Trends in Mobility
4. Credit Card Frauds in Mobile and Wireless
Computing Era
5. Security Challenges Posed by Mobile
Devices
6. Registry Settings for Mobile Devices
7. Authentication Service Security
8. Attacks on Mobile/Cell Phones
9. Mobile Devices: Security Implications for
Organizations
10. Organizational Measures for Handling
Mobile
11. Organizational Security Policies and
Measures in Mobile Computing Era
12. Laptops
1. Introduction
Today, incredible advances are being made for mobile devices. The
trend is for smaller devices and more processing power. A few years
ago, the choice was between a wireless phone and a simple PDA.
Now the buyers have a choice between high-end PDAs with
integrated wireless modems and small phones with wireless Web-
browsing capabilities.
8. Fly Fusion Pentop computer: It is a computing device with the size and
shape of a pen. It functions as a writing utensil, MP3 player, language
translator, digital storage device and calculator.
Mobile computing is moving into a new era, third generation
3. Trends in Mobility ( 3G), which promises greater variety in applications and have
highly improved usability as well as speedier networking.
"iPhone" from Apple and Google-led "Android" phones are the
best examples of this trend and there are plenty of other
developments that point in this direction. This smart mobile
technology is rapidly gaining popularity and the attackers
(hackers and crackers) are among its biggest fans.
The traditional and the first type of credit card fraud is paper-based-
application fraud, wherein a criminal uses stolen or fake documents
such as utility bills and bank statements that can build up useful
personally Identifiable Information (PII) to open an account in someone
else's name.
The criminal offers the goods with heavy discounted rates through a
website designed and hosted
The customer registers on this website with his/her name, address,
shipping address and valid credit card details.
The criminal orders the goods from a legitimate website with the
help of stolen credit card details and supply shipping address that
have been provided by the customer while registering on the
criminal's website.
The goods are shipped to the customer and the transaction gets
completed.
The criminal keeps on purchasing other goods using fraudulent
credit card details of different customers till the criminal closes
existing website and starts a new one.