Mobile devices such as smartphones and tablets are now used for making purchases, emails, social networking, and many other risky activities. These devices run specialized operating systems have many security problems. This class will cover how mobile operating systems and apps work, how to find and exploit vulnerabilities in them, and how to defend them. Topics will include phone call, voicemail, and SMS intrusion, jailbreaking, rooting, NFC attacks, malware, browser exploitation, and application vulnerabilities. Hands-on projects will include as many of these activities as are practical and legal.
Upon successful completion of this course, the student will be able to:
- Assess the risks of using mobile devices for common activities such as making phone calls, emailing, and shopping
- Perform jailbreaks for iOS devices and analyze the Android security model and rooting
- Differentiate and describe types of mobile malware and anti-mal ware options
- Evaluate Web browser services and attacks on mobile platforms and recommend countermeasures
- Configure, deploy, and defeat locking, remote location and wiping services. Outcome 6: Prioritize common mobile app risks and determine how and when to appropriately install and use them.