CS898T Mobile and Wireless Network Handheld Device Security By Yuan Chen July 25 th, 2005.

Slides:



Advertisements
Similar presentations
!! Are we under attack !! Consumer devices continue to invade *Corporate enterprise – just wanting to plug in* Mobile Device Management.
Advertisements

Mobile Devices and Wireless Tracy Jackson Liz Nenni Matt Hinson Chris Eiben.
Guide to Network Defense and Countermeasures Second Edition
HIPAA: FEDERAL REGULATIONS REGARDING PATIENT SECURITY.
Separate Domains of IT Infrastructure
The Remote Workplace Designing, deploying, and supporting the remote workplace environment Presented by: John Milhoan Information Technology Cooperative,
Secure Computing Network
Network Security Philadelphia UniversityAhmad Al-Ghoul Module 11 Exploring Secure Topologies  MModified by :Ahmad Al Ghoul  PPhiladelphia.
Information Security Policies and Standards
Security+ Guide to Network Security Fundamentals
Secure Data Transmission James Matheke Information Security Architect Ohio Department of Job and Family Services.
67% of the people who use a smartphone for work and 70% of people who use a tablet for work are choosing the devices themselves 905M tablets in.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Cybersecurity Summit 2004 Andrea Norris Deputy Chief Information Officer/ Director of Division of Information Systems.
Security Overview. 2 Objectives Understand network security Understand security threat trends and their ramifications Understand the goals of network.
NETWORK SECURITY.
Network Infrastructure Security. LAN Security Local area networks facilitate the storage and retrieval of programs and data used by a group of people.
Public Key Infrastructure Ammar Hasayen ….
Security Risk Management Marcus Murray, CISSP, MVP (Security) Senior Security Advisor, Truesec
Copyright Security-Assessment.com 2004 New Technology Enforcement Strategies by Peter Benson.
McGraw-Hill/Irwin Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. Extended Learning Module E Network Basics.
Securing Information Systems
Summer-DISC 6341© Andrew Schwarz, 2002Slide 1 Lecture 7 Session 1 Integration in a Complex Environment.
SEC835 Database and Web application security Information Security Architecture.
Shared success Outline What is network security? Why do we need security? Who is vulnerable? Common security attacks and countermeasures. How to secure.
Lesson 8-Information Security Process. Overview Introducing information security process. Conducting an assessment. Developing a policy. Implementing.
Mobile Computing: Security Issue Group 4 Members: 黃昱翔 梁振堃 郭雅恬 劉俊宏 王雋為 王瓊儀 李晏榕 黃筱涵 許椀淇.
Storage Security and Management: Security Framework
K E M A, I N C. NERC Cyber Security Standards and August 14 th Blackout Implications OSI PI User Group April 20, 2004 Joe Weiss
1 Deployment of Computer Security in an Organization CE-408 Sir Syed University of Engineering & Technology 99-CE-282, 257 & 260.
Section Seven: Information Systems Security Note: All classified markings contained within this presentation are for training purposes only.
HIPAA COMPLIANCE WITH DELL
1. Windows Vista Enterprise And Mid-Market User Scenarios 2. Customer Profiling And Segmentation Tools 3. Windows Vista Business Value And Infrastructure.
How Safe Is Your Mobile Information? Issues and Safeguards for Mobile Devices Dan Morrissey, CHSP Catholic Health Initiatives Fourteenth National HIPAA.
Slide 1 Using Models Introduced in ISA-d Standard: Security of Industrial Automation and Control Systems (IACS) Rahul Bhojani ISA SP99 WG4 Meeting.
Wireless Network Security. What is a Wireless Network Wireless networks serve as the transport mechanism between devices and among devices and the traditional.
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
Environment for Information Security n Distributed computing n Decentralization of IS function n Outsourcing.
Chapter 6 of the Executive Guide manual Technology.
Sample Security Model. Security Model Secure: Identity management & Authentication Filtering and Stateful Inspection Encryption and VPN’s Monitor: Intrusion.
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
Wireless Network Security Presented by: Prabhakaran Theertharaman.
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
Emerging Security Trends & Technologies Presented by Santhosh Koratt Head Consulting & Compliance SecureSynergy Pvt.Ltd.
Providing Teleworker Services
Wireless Intrusion Prevention System
Chapter 2 Securing Network Server and User Workstations.
Module 11: Designing Security for Network Perimeters.
NETWORK INFRASTRUCTURE SECURITY Domain 5. Computer Security “in short, the average computer is about as secure as a wet paper bag, and it is one of the.
Energize Your Workflow! ©2006 Merge eMed. All Rights Reserved User Group Meeting “Energize Your Workflow” May 7-9, Security.
Texas Technology Forum The Future of Mobile Technology Trends and Issues July 16, 2009.
Understand Network Isolation Part 2 LESSON 3.3_B Security Fundamentals.
Information Security Measures Confidentiality IntegrityAccessibility Information cannot be available or disclosed to unauthorized persons, entities or.
About Softex Mission Statement: “To provide innovative security software products and solutions for computing devices” Softex was founded in 1992 by IBM.
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
IS3220 Information Technology Infrastructure Security
Equipping Your Mobile Workforce for a Seamless Customer Experience in an Unsecured Wireless World Dr. Simon Blake-Wilson Chief Security Advisor.
Information Security tools for records managers Frank Rankin.
Securing Interconnect Networks By: Bryan Roberts.
Information Technology Network and Security. Networking In the world of computers, networking is the practice of linking two or more computing devices.
Chapter 7. Identifying Assets and Activities to Be Protected
Chapter 1: Exploring the Network
Critical Security Controls
IS4550 Security Policies and Implementation
Understanding Security Layers
Providing Teleworker Services
Providing Teleworker Services
How to Mitigate the Consequences What are the Countermeasures?
Online Learning.
Unit # 1: Overview of the Course Dr. Bhavani Thuraisingham
Presentation transcript:

CS898T Mobile and Wireless Network Handheld Device Security By Yuan Chen July 25 th, 2005

What is handheld device? Why does handheld device introduce new security risks? How to mitigate the security issues of handheld devices?

1. What is handheld device? Handheld devices (also known as handhelds) are pocket-sized computing devices that are rapidly gaining popularity as the access to information in every walk of life becomes more and more mission critical.

Typical handhelds Information appliance Smart phone Personal digital assistant (PDA) Cell phone Handheld game console

2. Why does handheld device introduce new security risks? Small size Limited computing power, memory and peripherals Handheld device users often do not consider the security implication Multiple access points (e.g., expansion modules, wireless modems, Bluetooth, etc.) Few auditing capabilities or security tools available Etc.

Security Requirements Confidentiality – information is disclosed only to legitimate entities or processes. Integrity – unauthorized modification of information is prevented. Availability – authorized entities can access a service provided they have appropriate privileges.

3. How to mitigate the security issues of handheld devices? Management Countermeasures Operational Countermeasures Technical Countermeasures

Authentication Encryption Antivirus Software PKI (Public Key Infrastructure) VPN (Virtual Private Networks) and Firewalls Enterprise Solutions Miscellaneous

Telecommuters, Remote, Mobile, and Home users can have secure, controlled access to corporate LAN resources from any Internet connection. All applications can be made available the same as if they were locally connected. VPN - Remote/Mobile Users

Wireless Handheld Device Security Checklist Security RecommendationBest Practice Should consider Status 1.Develop an agency security policy that addresses the use of all handheld devices. * 2.Ensure that users on the network are fully trained in computer security awareness and the risks associated with handheld devices. * 3.Perform a risk assessment to understand the value of the assets in the agency that need protection. * 4.Conduct ongoing, random security audits to monitor and track devices. *

Security RecommendationBest Practice Should consider Status 5.Ensure that external physical boundary protection is in place around the perimeter of the building or buildings of the agency. * 6.Deploy physical access controls to the building and other secure areas (e.g., photo ID, card badge readers). * 7.Minimize the risk of loss or theft through the use of physical locks and cables. * 8.Label all handheld devices with the owner and agencys information. *

END