Security of Handheld Devices

Slides:



Advertisements
Similar presentations
Network Security Attack Analysis. cs490ns - cotter2 Outline Types of Attacks Vulnerabilities Exploited Network Attack Phases Attack Detection Tools.
Advertisements

Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
For further information computersecurity.wlu.ca
Guanjong High School Group 2. Physical Network Access Security Getting into a network closet could easily allow someone to disable computers and connect.
Wireless Security Threats and Solutions By: Shirene Turpin & Rob Waight.
Beyond WiFi: Securing Your Mobile Devices Thomas Kuhn Information Technology Assistance Center (iTAC) Kansas State University.
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
Small Business Security By Donatas Sumyla. Content Introduction Tools Symantec Corp. Company Overview Symantec.com Microsoft Company Overview Small Business.
By Paul Capers.  A cell phone is a portable telephone that does not use a wired connection. It connects to a wireless carrier network using radio waves.
Security Advice Georgie Pepper Campsmount Acadamy.
1Lecturer: Dalia Mirghani Saadabi. 2 A set of computers connected together so that they can communicate is called a computer network. This involves installing.
Google Chromebook A New Way of Low Cost, Low Maintenance Computing.
MOBILE DEVICE SECURITY. WHAT IS MOBILE DEVICE SECURITY? Mobile Devices  Smartphones  Laptops  Tablets  USB Memory  Portable Media Player  Handheld.
PROJECT PAPER ON BLUEFIRE MOBILE SECURITY. BY PONNURU VENKATA DINESH KUMAR STUDENT ID # A0815 PROFESSOR – VICKY HSU CS-426.
© NeoAccel, Inc. TWO FACTOR AUTHENTICATION Corporate Presentation.
By Ramneek Hundal.. 5 types of Virus.. I LOVE YOUI LOVE YOU. WormsWorms.TROJEN HORES.MELISSA.HAPPY 99 What is a virus. A computer virus is a computer.
Viruses & Destructive Programs
Computer Threats Cybercrimes are criminal acts conducted through the use of computers by cybercriminals. © 2009 Prentice-Hall, Inc. 1.
Hacking and International Investigations Presented By: Nenette Day Harvard University Extension School.
Mobile Device Security Drew Hayes Christ Liechty November 27, 2007.
Near Field Communication Systems Patras, July 2006.
Security Issues and Strategies Chapter 8 – Computers: Understanding Technology (Third edition)
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
Enforcing Cyber security in Mobile Applications – Public Sector Use Case SAPHINA MCHOME, VIOLA RUKIZA TANZANIA REVENUE AUTHORITY INFORMATION AND COMMUNICATION.
Networks Mr Hewitt. Objectives By the end of this lesson you will be able to: Compare stand alone, networked and laptop computers Define a Network Explain.
Topic 5: Basic Security.
Desktop Security: Making Sure Your Office Environment is Secure.
Networking Basics 8th Grade
Data Security. Unauthorized Access Natural disaster Accidentals Destruction ( Hard ware failure )
Security Discussion IST Retreat June IT Security Statement definition In the context of computer science, security is the prevention of, or protection.
IDENTITY THEFT By Deshano Dottery. FASTEST GROWING PROBLEM IN AMERICA Approximatley 15 million victims per year Approximatley 15 million victims per year.
Unit 2 Assignment 1. Spyware Spyware is a software that gathers information about a person or site and uses it without you knowing. It can send your information.
© 2013 Toshiba Corporation B2B PC Training Mailer - Toshiba Device Access Control.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Securing a Wireless Home Network BY: ARGA PRIBADI.
BY JENNA SAUDER SLIDE OVERVIEW This presentation will discuss the following This presentation will discuss the following : What a Virus is… How a Virus.
Threats To Data 30 Threats To Data 30. Threats To Data 30 We’re now going to look at a range of different threats to people’s data: Opportunity Threats.
Isolating and Protecting Devices on the Network A database-driven methodology Tom Zeller June 2008.
Trend Micro Consumer 2010 Easy. Fast. Smart.
Chapter 1: Exploring the Network
Ilija Jovičić Sophos Consultant.
3.6 Fundamentals of cyber security
Unit 4 IT Security.
NETW 05A: APPLIED WIRELESS SECURITY Unauthorized Access
Level 2 Diploma Unit 11 IT Security
Hardware Components By Charlie Leivers.
Computer Virus Nick DeFabis.
Why Computer Security Need???
OCR Nationals – ICT Safe Working Practices
Lecture 14: Business Information Systems - ICT Security
GCSE ICT Revision Topic 2: Connectivity.
Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Security in Networking
Norton.com/Setup | +1(844) | Norton Internet Security
Virus And Malware Causes And Troubleshoot By I FIX PC
Norton technical support Norton.com/Setup | Norton Setup and Install with Product Key Norton Antvirus Activation For protection against.
Prepared By : Binay Tiwari
Part 3.
By Arisara Sangsopapun
Computer Security.
CS101 Security.
Presenter : Mr Yong Jong Shyan
Unit 4 IT Security Kerris Davies.
Net301 LECTURE 11 11/23/2015 Lect13 NET301.
How to keep the bad guys out and your data safe
Computer Security (Summary)
IP Addresses & Ports IP Addresses – identify a device on a network
Cybersecurity at WAJ What is it? Are we at risk?.
CS101 Security.
Mcafee.com/activate
Presentation transcript:

Security of Handheld Devices Jesse Cowan

Handheld Security Categories Password Theft Viruses and Data Corruption Data Theft Through Line Sniffing Theft of the Device Itself Mobile Code Vulnerabilities Wireless Vulnerabilities

Fast-Growing Technology PC > Laptop > Handheld Lines between devices becoming blurred More computing power attracts software developers of good and bad nature ---------------- -------------------

Handhelds in the Workplace Synchronization of data used to happen on a PC More powerful, more problems No standard software Headaches for network admins

Viruses More computing power attracts software developers Mainly affect handhelds that surf the web Capable of spreading viruses to your pc and possibly to networks Capable of launching/receiving DoS attacks Wireless vulnerabilities only affect devices that use wireless applications and have a wireless port open

Security Measures Lots of different software Manage link to PC / Anti-Virus software If you’re on a network with important data, access web services through a VPN, network speeds through a VPN will be slower, though

Physical Liability Small, easily stolen Getting data from them is as simple as powering them on The National Institute of Standards and Technology (NIST) Developing methods to stop unauthorized access Proximity Beacons / Unauthorized Access in unauthorized locations Smart cards / Size restraints (possible card to fit in Micro SD slot)