1 / 14

CS898T Mobile and Wireless Network Handheld Device Security

CS898T Mobile and Wireless Network Handheld Device Security. By Yuan Chen July 25 th , 2005. What is handheld device? Why does handheld device introduce new security risks? How to mitigate the security issues of handheld devices?. 1. What is handheld device?.

dante-kelly
Download Presentation

CS898T Mobile and Wireless Network Handheld Device Security

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. CS898T Mobile and Wireless NetworkHandheld Device Security By Yuan Chen July 25th, 2005

  2. What is handheld device? • Why does handheld device introduce new security risks? • How to mitigate the security issues of handheld devices?

  3. 1. What is handheld device? • Handheld devices (also known as handhelds) are pocket-sized computing devices that are rapidly gaining popularity as the access to information in every walk of life becomes more and more mission critical.

  4. Typical handhelds • Information appliance • Smart phone • Personal digital assistant (PDA) • Cell phone • Handheld game console

  5. 2. Why does handheld device introduce new security risks? • Small size • Limited computing power, memory and peripherals • Handheld device users often do not consider the security implication • Multiple access points (e.g., expansion modules, wireless modems, Bluetooth, etc.) • Few auditing capabilities or security tools available • Etc.

  6. Security Requirements • Confidentiality – information is disclosed only to legitimate entities or processes. • Integrity – unauthorized modification of information is prevented. • Availability – authorized entities can access a service provided they have appropriate privileges.

  7. 3. How to mitigate the security issues of handheld devices? • Management Countermeasures • Operational Countermeasures • Technical Countermeasures

  8. Technical Countermeasures • Authentication • Encryption • Antivirus Software • PKI (Public Key Infrastructure) • VPN (Virtual Private Networks) and Firewalls • Enterprise Solutions • Miscellaneous

  9. Telecommuters, Remote, Mobile, and Home users can have secure, controlled access to corporate LAN resources from any Internet connection.  All applications can be made available the same as if they were locally connected. VPN - Remote/Mobile Users

  10. Wireless Handheld Device Security Checklist

  11. END

More Related