1 / 27

Mobile Computing: Security Issue

Mobile Computing: Security Issue. Group 4 Members: 941603 黃昱翔 941604 梁振堃 941611 郭雅恬 941618 劉俊宏 941623 王雋為 941650 王瓊儀 941661 李晏榕 941662 黃筱涵 941702 許椀淇. Introduction. Evolution Of Network Mobile Computing Vital Issues. A Timeline of Mobile Computing.

annetteh
Download Presentation

Mobile Computing: Security Issue

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Mobile Computing: Security Issue Group 4 Members: 941603黃昱翔 941604梁振堃 941611郭雅恬 941618劉俊宏 941623王雋為 941650王瓊儀 941661李晏榕 941662黃筱涵 941702許椀淇

  2. Introduction • Evolution Of Network • Mobile Computing • Vital Issues

  3. A Timeline of Mobile Computing

  4. Wireless Communication Systems

  5. Security of Mobile Computing • The advantages of mobile devices are undeniable, but so are the ways that they can bring vulnerability to your system. Consider these key ways to protect your company’s system.

  6. Device Security • Tips to secure mobile devices like laptops & handhelds • Be smart. • Label your property. • Use security products. • Use the hard drive password setting on your laptop. • Once device was lost

  7. Network Security • Network Security • Data in transit V.S. Data at rest. • Deploy VPN (virtual private network). • Security Layers • Wireless Security Protocols.

  8. Network Security • Security Layers • Based on the OSI • Motivation for the Mobile IP • Security Services: • Authentication • Access control • Non-repudiation • Data integrity • Data confidentiality • Assurance/Availability • Notarization/signature

  9. Network Security • Wireless Security Protocols • Four wireless security protocol types are needed:1. Access control to mobile devices2. Local access control to networks and network services3. Remote access control to networks and network services4. Protection of data communication to/from mobile devices.

  10. Network Security • Wireless Security Protocols 1.Access control to mobile devices • PIN and Password Authentication • Visual and Graphical Login • Biometrics • Authorization • File Masking • Access Control Lists • Role-based Access Control

  11. Network Security • Wireless Security Protocols 2.Local access control to networks and network services • WLAN • Bluetooth • Cellular Network… 3.Remote Network Access • Remote access VPN 4.Protection of Data Communication

  12. Tips to secure the data on mobile devices • Consider your real needs. • Make a trusty backup. • Ensure you're only carrying the data you think you are. • Use encryption or a Virtual Private Network (VPN).

  13. Tips to ensure a secure Internet connection everywhere—including at home • Disable your wireless Internet connection when not in use. • Use secure wireless. • Make your home wireless network more secure. • Change the name of your “SSID” network and/or don’t broadcast it. • Ensure you’re using a static IP address. • Enable your firewall. • Change the default admin password; make it longer and more complex. • Only allow machines you know to connect to your network by enabling MAC address filtering.

  14. Wireless Application Security • Wireless application security includes 1. Application access control 2. Client/server communications security 3. Anti-malware protection

  15. Wireless Application Security • Application Access Control • Mobile applications handling confidential data should require user authentication before application access is granted. • A limited inactive time is specified for an application before re-authentication is required.

  16. Wireless Application Security • Client/Server Communication Security • Typical wireless Internet connections are:1. The wireless connection between a mobile device and an access device 2. The Internet connection between the mobile device and the Internet host/server via the access device. • For Web-based client/server applications, the SSL protocol provides encryption and signing of transmitted data.

  17. Wireless Application Security • Anti-Malware Protection • Malware can access and steal application data, such as credit card information stored in memory by wireless applications. • Time and space for sensitive data in memory should be minimized.

  18. Privacy and Security Policies • Any discussion of security and device management needs to acknowledge the importance of employees' efforts toward securing corporate data — especially customer data. • IT needs to formulate and distribute clear, concise security policies regarding access via mobile devices.

  19. Privacy and Security Policies • Conduct tests on a periodic basis to ensure that the protections you've deployed worked, and that your employees remain up-to-date on their responsibilities when it comes to privacy and security.

  20. Case-Sybase • The largest enterprise software and services company exclusively focused on managing and mobilizing information. • With the global solutions, enterprises can extend their information securely and make it useful for people anywhere using any device.

  21. Case-Sybase • GovernmentSolutions • Information Technology, Management and Mobile Solutions for Government Agencies • They offer complete government solutions in four key areas: 1. Federal 2. State and Local 3. Homeland Security 4. Sybase Government Partners

  22. Case-Sybase • Sybase Homeland Security Solutions • With the threat of terrorist attacks, homeland security has become a major concern for all individuals and organizations. Sybase solutions help meet this agency’s security objectives, and more.

  23. Case-Sybase • Empowering field personnel with anywhere, anytime access to critical information offers many benefits, including: • Increased productivity and improved response time • Better information sharing and collaboration between agencies • Error-free capture of data in a standardized format • Ability to maintain security and confidentiality of critical data

  24. Case-Sybase • Specific examples of Homeland Security solutions we provide include: • Remote access to photos, documentation and other vital statistics for field investigators • Onsite data collection for inspection of commercial structures, bridges, roads, military equipment, power lines and the nation's food supply • Information access for custom checkpoints ensuring inspection of people, vehicles, packages and any other items that may pose a security threat • Smart card identification and tracking of visitors at secure locations

  25. Future will forecast 1. Global information safe service market development present situation and tendency

  26. Future will forecast 2. Taiwan information security market 3. The new focus of enterprises funded protection for mobile devices 4. Establishes set of motions work the security policy a. Zero tolerance policy b. The document remembered wants redact c. Other protective measures

  27. Conclusion • The advent of the World Wide Web • Electronically、Efficiently、Nonpaperness • the prevalent of notebook (laptop) and its high frequency

More Related