228w1f0003 CS
228w1f0003 CS
Vishing:
• Vishing is the criminal practice of using social engineering over the telephone system, most
often using features facilitated by VoIP, to gain access to personal and financial information from the public
for the purpose of financial reward.
• The term is a combination of V – voice and Phishing.
• Vishing is usually used to steal credit card numbers or other related data used in ID theft
schemes from individuals.
The most profitable uses of the information gained through a Vishing attack include:
1. ID theft;
2. purchasing luxury goods and services;
3. transferring money/funds;
4. monitoring the victims’ bank accounts;
Smishing:
• Smishing is a criminal offense conducted by using social engineering techniques similar to
Phishing.
• The name is derived from “SMS PhISHING.”
• SMS can be abused by using different methods and techniques other than information
gathering under cybercrime.
Hacking Bluetooth :
• Bluetooth is an open wireless technology standard used for communication (i.e., exchanging
data) over short distances (i.e., using short length radio waves) between fixed and/or mobile device.
• Bluetooth is a short-range wireless communication service/technology that uses the 2.4- GHz
frequency range for its transmission/communication.
emerged as Bluetooth-specific security issues.
1. Bluejacking: It means Bluetooth + Jacking where Jacking is short name for hijack – act
of taking over something. Bluejacking is sending unsolicited messages over Bluetooth to Bluetooth-
enabled devices such as mobile phones, PDAs or computers
2. Bluesnarfing: It is the unauthorized access from a wireless device through a Bluetooth
connection between cell phones, PDAs and computers
3. Bluebugging: It allows attackers to remotely access a user’s phone and use its features
without user’s attention.
4. Car Whisperer: It is a piece of software that allows attackers to send audio to and receive
audio from a Bluetooth-enabled car stereo.
4)Present the operating guidelines for implementing mobile device security policies in an organization?
A:. Organizational Security Policies and Measures in Mobile Computing Era :
Importance of Security Policies relating to Mobile Computing Devices
• Growth of mobile devices used makes the cybersecurity issue harder than what we would
tend to think.
• People (especially, the youth) have grown so used to their mobiles that they are treating
them like wallets!
• For example, people are storing more types of confidential information on mobile
computing devices than their employers or they themselves know; they listen to music using their hand-held
devices
• One should think about not to keep credit card and bank account numbers, passwords,
confidential E-Mails and strategic information about organization.
• Imagine the business impact if mobile or laptop was lost or stolen, revealing sensitive
customer data such as credit reports, social security numbers (SSNs) and contact information. Operating
Guidelines for Implementing Mobile Device Security Policies
• Through the following steps we can reduce the risk when mobile device lost or stolen
1. Determine whether the employees in the organization need to use mobile
computing devices or not.
2. Implement additional security technologies like strong encryption, device
passwords and physical locks.