Lee Hang Lam Wong Kwun Yam Chan Sin Ping Wong Cecilia Kei Ka Mobile Phone OS.

Slides:



Advertisements
Similar presentations
Powerful and convenient management for Windows Mobile ® 6.1 devices in an enterprise environment. These features include: Centralized, over-the-air device.
Advertisements

McAfee One Time Password
310KM M-Commerce Application Selection of Mobile Platform Group 4 Choy Chun Lung, Lawrence Hui Yiu Ting, Eddy Chan Ki Yin, CKY Liu Tsz Ping, Scott.
Avoid data leakage, espionage, sabotage and other reputation and business risks without losing employee performance and mobility.
 Physical Logical Access  Physical and Logical Access  Total SSO and Password Automation  Disk/Data Encryption  Centralized management system  Biometric.
1 GP Confidential © GlobalPlatform’s Value Proposition for Mobile Point of Sale (mPOS)
Building Mobile Apps in the Cloud – Comparing Approaches.
Mobile Security 310KM Lab 4 Group Presentation NG KING TUNG MA HO YIN CHE CHUN KIT WOO SHUN CHAK.
Extending ForeFront beyond the limit TMGUAG ISAIAG AG Security Suite.
Building and Deploying Safe and Secure Android Apps for Enterprise Presented by Technology Consulting Group at Endeavour Software Technologies.
Don’t Let Anybody Slip into Your Network! Using the Login People Multi-Factor Authentication Server Means No Tokens, No OTP, No SMS, No Certificates MICROSOFT.
Lab4 Part2 Lau Ting Nga Virginia Tsang Pui Yu Wong Sin Man.
eToken PKI Client Overview
Avoid data leakage, espionage, sabotage and other reputation and business risks without losing employee performance and mobility. Simplify authentication.
310KM Lab 4 Part 3 Tutorial Group:2 Student Name:Chan Nga Lok Fan Ka Yan Lo Yuen Ki Tsui Sui Wa.
Remote Access Network Management Kelly Given Allison Traina.
Chung Man Ho Willims Chow Man Kei Gary Kwok Pak Wai Lion.
310KM Mobile Commerce Applications Lab/Tutorial 4 Part 3 Team members: Li Chun Yin Pun Hoi Lam Shek Hin Shing.
Ho Ting Chung, Zeturl ( ) 1.  Authentication  Encryption 2.
Student Name: Group.  Developed by Microsoft  Alliance with Nokia in 2011  4 main functions:  Outlook Mobile  Windows Media Player for Windows Mobile.
Mobile Mobile OS and Application Team: Kwok Tak Chi Law Tsz Hin So Ting Wai.
Research of difference OS for authentication and encryption Group member:Li Man Yiu Tsun Yu Hin Wong Nok Wai.
310KM – Team Assignment: OS Platform of Mobile workforce for Logistics Company Window Mobile OS: Chan Wai Kai Android Operation Systems: Chan Kwok.
Suggested platform for development and support of a mobile workforce Lab/Tutorial 4 CHAN Chi Yin Lam Tak Faat LAU Hiu Tung SO Ho Ka, Rambo.
IPhone Security: Understanding the KeyChain Nicholis Bufmack and Ryan Thomas CS 691 Summer 2009.
IOS 8 for MDM/EMM Greg Elliott Shiv Chandra Kumar.
MOBILE MALWARE TOPIC #5 – INFORMATION ASSURANCE AND SECURITY Michael Fine 1.
Kaspersky Open Space Security: Release 2 World-class security solution for your business.
© 2010 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice Ville Norpo Hewlett-Packard Oy
Exchange Exchange Connecter with Configuration Manager Configuration Manager with Intune Protect and Manage Devices and Infrastructure.
CRYPTOGRAPHY PROGRAMMING ON ANDROID Jinsheng Xu Associate Professor North Carolina A&T State University.
OV Copyright © 2011 Element K Content LLC. All rights reserved. System Security  Computer Security Basics  System Security Tools  Authentication.
RSA Security Validating Users and Devices to Protect Network Assets Endpoint Solutions for Cisco Environments.
More than You Want to Know About Pocket PC’s. What is a Pocket PC?
Lesson 8 Operating Systems
IC3 Chapter 8 Computer Fundamentals
MOBILE DEVICE SECURITY. WHAT IS MOBILE DEVICE SECURITY? Mobile Devices  Smartphones  Laptops  Tablets  USB Memory  Portable Media Player  Handheld.
PROJECT PAPER ON BLUEFIRE MOBILE SECURITY. BY PONNURU VENKATA DINESH KUMAR STUDENT ID # A0815 PROFESSOR – VICKY HSU CS-426.
Deploying and Managing Mobile Devices in the Enterprise.
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
1 Thomas Lippert Senior Product Manager - Mobile What’s new in SMC 5.0.
DAS/BEST ITSecurity Division. RSA SecurID Software Tokens: Make strong authentication a convenient part of doing business. Deploy RSA software tokens.
One Platform, One Solution: eToken TMS 5.1 Customer Presentation November 2009.
Lieberman Software Random Password Manager & Two-Factor Authentication.
Enforcing Cyber security in Mobile Applications – Public Sector Use Case SAPHINA MCHOME, VIOLA RUKIZA TANZANIA REVENUE AUTHORITY INFORMATION AND COMMUNICATION.
Bizfss File Sync and Sharing Solution, Built on Microsoft Azure, Allows Businesses to Sync, Share, Back Up Using Their Own Cloud Storage MICROSOFT AZURE.
Securely Synchronize and Share Enterprise Files across Desktops, Web, and Mobile with EasiShare on the Powerful Microsoft Azure Cloud Platform MICROSOFT.
SMARTPHONE FORENSICS 101 General Overview of Smartphone Investigations.
Understand Encryption LESSON 2.5_A Security Fundamentals.
Introduction TO Network Administration
Easy-to-Use RedFlag System Delivers Notifications via Phone, , Text, Social Media, and More to Improve Effectiveness of Your Communications COMPANY.
Flight is a SaaS Solution that Accelerates the Secure Transfer of Large Files and Data Sets Into and Out of Microsoft Azure Blob Storage MICROSOFT AZURE.
Ms. Tracy  Identify the purpose of an operating system.  Identify different operating systems.  Describe computer user interaction with multiple.
Policies and Security for Internet Access
© 2008 Microsoft Corporation. All rights reserved. This presentation is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED,
Why EMS? What benefit does EMS provide O365 customers Manage Mobile Productivity Increase IT ProductivitySimplify app delivery and deployment LOB Apps.
Technical Sales Specialist Software - OS and Applications John R. Moegling Sr. Systems Engineer.
Analysis And Research Of System Security Based On.
©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. Securing Your Data in Endpoint and Mobile Environments Frank Suijten Security.
Citrix ShareFile. Instant file access from any device Sharing and collaboration—with anyone Easy & Familiar (love Dropbox) USERS DEMAND Security Control.
Mobile Device Security Management Leyna Belinsky.
Short Customer Presentation September The Company  Storgrid delivers a secure software platform for creating secure file sync and sharing solutions.
Google. Android What is Android ? -Android is Linux Based OS -Designed for use on cell phones, e-readers, tablet PCs. -Android provides easy access to.
IT Security Awareness Day October 19, 2016
Google 2 Step Verification Backup Codes Google 2 Steps Verification Backup Codes is very important to get access Gmail account. Backup codes is usually.
OPERATING SYSTEMS.
Chapter 4.
Data Security for Microsoft Azure
Lesson 8 Operating Systems
Public Key Infrastructure from the Most Trusted Name in e-Security
Presentation transcript:

Lee Hang Lam Wong Kwun Yam Chan Sin Ping Wong Cecilia Kei Ka Mobile Phone OS

What is Android?  Android™ delivers a complete set of software for mobile devices: an operating system, middleware and key mobile applications.  Linux kernel Linux kernel  Created by Google  Android 3.0

Android advantage  Google Android is open source software.  All applications are created equal  Breaking down application boundaries  Fast & easy application development

Android disadvantage  Significantly increase the risk of hacking these devices

Android Authentication  A "Google Authenticator" app available for Android, iPhone, and Blackberry phonesavailable for Android  A SMS (text) message  A automated phone call This will require a special code that can be obtained in one of three ways:

Android encryption  Google's Android now supports numerous features in Microsoft's Exchange ActiveSync, including SSL encrypted transmission and remote wipe.  "Android 2.2 provides a number of enhanced Exchange features, like the addition of the numeric pin password options, remote wipe capabilities, things like that which make it more palatable for enterprises to adopt,“  Although software-level encryption in Android 2.2 is an improvement, Android still does not support hardware-based encryption, according to Kaspersky Lab virus researcher Tim Armstrong.  With software-level encryption, it's easier for a hacker to take data off a Micro SD card, whereas with hardware-level encryption the data on the removable storage card is "really locked to a chip on the electronics within the phone," according to Armstrong.

Windows Mobile  Authentication  password locking of the device  two-factor authentication (e.g., SecureID, card readers).  biometrics installed (e.g., finger print reader)

Windows Mobile  Encryption  can be managed by MSCMDM(Microsoft System Center Mobile Device manager)  enabled with VPN  ActiveSync  need to be enhanced to meet broader company and user requirements.

Blackberry OS StrengthsNeed to enhance AuthenticationApplication Verification Data VaultingTamper Resistance ReliabilitySecurity vs Usability Manageability/Policy EnforcementAllowing Security Extensions Meeting Security Validations

Blackberry OS  Authentication  BlackBerry Enterprise Server (BES) tools  strong password  two factor authentication and secure peripheral authentication  unique policies

Blackberry OS  Encryption  extensive number  BES administration function  fully integrated within the OS  requires no knowledge or intervention on the part of the user  customized policies

Palm OS  The standard for handheld computing  Manages personal information  Accesses and enters corporate data  Mines the richness of the web

 Individual passwords  Each database has a "password set" that controls data entry  HotSync Manager or HotSync Server on the desktop during the HotSync process  Authentication  RSA SecurID®  Encryption  RSA BSAFE®

 Strengths  Cost-effectiveness  A steep learning curve  Privacy  100% secure  Weaknesses  A usual password is not safe.

iPhone OS  Strengths  Simplest Smartphone to use and to navigate.  Keyboard gives visual feedback when entering logins and passwords  Automatic switching between data network and wifi  Weaknesses  Limited customization  No java support  No flash support

Encryption  provide a layered approach to keeping your information secure  to protect all the data by using encoding  always enabled and cannot disable by the users

Authentication  encrypted the keychain for the storing digital identities  partitioned so that credentials stored by third-party applications cannot be accessed by applications  provides the mechanism  across a range of applications and services

Symbian

Advantages of Symbian  Handy keyboards  Well designed applications allow working with huge amounts of data  High quality games  Have PDF reader  Download big files through phone easily with 3G

Authentication and Encryption  subject to a variety of viruses  from phone to phone by Bluetooth  By passing Platform Security side  can be hacked to remove the platform security  allowing users to execute unsigned code

THE END