Protection of personal mobile computer devices Information Security Isaac Fernandes, mci12009 Sofia Nunes, mci12014.

Slides:



Advertisements
Similar presentations
Laptop Security in the current IT world W3 group.
Advertisements

CS898T Mobile and Wireless Network Handheld Device Security By Yuan Chen July 25 th, 2005.
Avoid data leakage, espionage, sabotage and other reputation and business risks without losing employee performance and mobility.
Computer Security Computer Security is defined as:
BP5- METHODS BY WHICH PERSONAL DATA CAN BE PROTECTED Data Protection.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Module #1: Introduction to Cyber Security
IT Retreat 2009 IT Security Controls and Initiatives.
CSA 223 network and web security Chapter one
Chapter 17 Controls and Security Measures
 Controls that provide security against internal and external threats  2 Types of access controls: › Physical controls › Logical controls.
Stephen S. Yau CSE465 & CSE591, Fall Information Assurance (IA) & Security Overview Concepts Security principles & strategies Techniques Guidelines,
Factors to be taken into account when designing ICT Security Policies
DATABASE SECURITY By Oscar Suciadi CS 157B Prof. Sin-Min Lee.
Chapter 19 Security Transparencies. 2 Chapter 19 - Objectives Scope of database security. Why database security is a serious concern for an organization.
New Data Regulation Law 201 CMR TJX Video.
Information Security Information Technology and Computing Services Information Technology and Computing Services
Security Measures Using IS to secure data. Security Equipment, Hardware Biometrics –Authentication based on what you are (Biometrics) –Biometrics, human.
The Impact of Physical Security on Network Security
Information Security Technological Security Implementation and Privacy Protection.
Security of Data. Key Ideas from syllabus Security of data Understand the importance of and the mechanisms for maintaining data security Understand the.
ISOM MIS3150 Data and Info Mgmt Database Security Arijit Sengupta.
Understanding Security Layers
1.1 System Performance Security Module 1 Version 5.
Patient Data Security and Privacy Lecture # 7 PHCL 498 Amar Hijazi, Majed Alameel, Mona AlMehaid.
Networked Information Systems Network Security. Network Physical Security File server failure can severely affect network users. Server security: Locked.
Chapter 01: Introduction to Network Security. Network  A Network is the inter-connection of communications media, connectivity equipment, and electronic.
Information Systems Security
John Carpenter & lecture & Information Security 2008 Lecture 1: Subject Introduction and Security Fundamentals.
Security Issues and Strategies Chapter 8 – Computers: Understanding Technology (Third edition)
Data Security Assessment and Prevention AD660 – Databases, Security, and Web Technologies Marcus Goncalves Spring 2013.
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
What security is about in general? Security is about protection of assets –D. Gollmann, Computer Security, Wiley Prevention –take measures that prevent.
Database Security Tampere University of Technology, Introduction to Databases. Oleg Esin.
Data Security.
ICC Module 3 Lesson 5 – IT Security 1 / 4 © 2015 Ph. Janson Information, Computing & Communication Security – Clip 0 – Introduction School of Computer.
INFORMATION TECHNOLOGY IN A GLOBAL SOCIETY: SECURITY Taylor Moncrief.
LO: To be able to describe and compare physical and logical methods of security. All of you will be able to: Describe how physical security measures can.
Understand Encryption LESSON 2.5_A Security Fundamentals.
1 UNIT 19 Data Security 2. Introduction 2 AGENDA Hardware and Software protect ion Network protect ion Some authentication technologies :smart card Storage.
Physical security By Ola Abd el-latif Abbass Hassan.
Topic 8 – Security Methods 1)TechMed scenario covers Security methods and devices, including biometrics In the scenario: Implied.
ITWIN SARATH CHANDRA.V 08Q6A05A3. ABOUT THE PRODUCT SECURE AND PRIVATE FILE COLLABORATION PLATFORM INDEPENDENT SIMPLE AND SAFE REMOTE ACCESS YOUR OWN.
Keimyung University 1 Network Control Hong Taek Ju College of Information and Communication Keimyung University Tel:
Firewalls and Tunneling Firewalls –Acts as a barrier against unwanted network traffic –Blocks many communication channels –Can change the design space.
Protecting Data at Rest Through Encryption CIO Summit November 30, 2007.
Manajemen Jaringan, Sukiswo ST, MT 1 Network Control Sukiswo
Security Protecting information data confidentiality
Security Issues in Information Technology
East Carolina University
NETWORK SECURITY Cryptography By: Abdulmalik Kohaji.
Lecture 5. Security Threats
By Oscar Suciadi CS 157B Prof. Sin-Min Lee
Chapter 17 Risks, Security and Disaster Recovery
UNIT 19 Data Security 2.
Understanding Security Layers
Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
By Oscar Suciadi CS 157B Prof. Sin-Min Lee
Mitigation Principles PROPOSAL OICA/CLEPA
Data integrity and security
12 STEPS TO A GDPR AWARE NETWORK
Database Security &Threats
By Oscar Suciadi CS 157B Prof. Sin-Min Lee
Security network management
Module 2 OBJECTIVE 14: Compare various security mechanisms.
Mohammad Alauthman Computer Security Mohammad Alauthman
Network Security Mark Creighton GBA 576 6/4/2019.
Session 1 – Introduction to Information Security
Presentation transcript:

Protection of personal mobile computer devices Information Security Isaac Fernandes, mci12009 Sofia Nunes, mci12014

Introduction  In this work, we intend to present which are the available means of protection and security of personal mobile computer devices, especially against theft and unauthorized use.  Aspects covered: General security concepts General measures of protection for personal devices Applications for data protection Mechanisms of anti-theft protection

Personal mobile computer devices

General Security Concepts  The Information Security ensures the preservation of certain properties of the information contained in the different ways in which this can be revealed.  There are basic principles that need to be secured for protection, such as: Availability Confidentiality Integrity Authenticity  The loss of any of these characteristics is a threat to information security.

General measures of protection for personal devices  There are simple steps that are within reach for all users of personal devices in order to increasing safety: Access control mechanisms such as passwords and firewalls; Creating backup copies; Software updates;

Applications for data protection Data Encryption The encryption of a message is thus to modify its character, by mathematical operations in order to place the characters in transit clear-cut, and the receiver apply for other mathematical operations can understand. Symmetric Algorithms Asymmetric Algorithms

Applications for data protection Data encryption applications  TrueCrypt  Camouflage  Conceal  AxCrypt  Encryptonclick

Mechanisms of anti-theft protection  The theft of a laptop computer is currently seeing a huge problem when we consider the amount of personal information located in one device  Security problems, are constantly present in the everyday of a user of information technologies.  One solution, to be taken into account, is to guard the safety of sensitive data and encrypt them, requiring a password or a "keyfile" to access such information

Mechanisms of anti-theft protection Physical Mechanisms -Security cable for laptops with anti-theft lock with safety key - Anti-theft cable with combination and alarm

Mechanisms of anti-theft protection Physical Mechanisms Safety device for usb flash drive Biometric Readers - authentication through fingerprint

Mechanisms of anti-theft protection Remote locking / Location systems  Nonstop Laptop Guardian  Safe4cam SNAKING

Conclusions…