Lab4 Part2 Lau Ting Nga Virginia Tsang Pui Yu Wong Sin Man.

Slides:



Advertisements
Similar presentations
Voice and Data Encryption over mobile networks July 2012 IN-NOVA TECNOLOGIC IN-ARG SA MESH VOIP.
Advertisements

310KM M-Commerce Application Selection of Mobile Platform Group 4 Choy Chun Lung, Lawrence Hui Yiu Ting, Eddy Chan Ki Yin, CKY Liu Tsz Ping, Scott.
Lee Hang Lam Wong Kwun Yam Chan Sin Ping Wong Cecilia Kei Ka Mobile Phone OS.
310km Lab4 Presentation. Comparison between mobile OS Palm OS Blackberry Os Windows Mobile Symbian i OS Android.
Week 9, Network Communication Software, Dept of Informatics, Faculty of Business.
U N C L A S S I F I E D LA-UR LANL Exchange / Blackberry Deployment June 2, 2009 Anil Karmel Solutions Architect Network and Infrastructure Engineering.
ELKAT Security Engineering Ltd. Poland Activity Plan Avi Arbili Regional Sales Director – Europe Cell:+972-(0) 52 – Tel: +972-(0) Fax:
Iron Mountain’s Continuity Service ©2006 Iron Mountain Incorporated. All rights reserved. Iron Mountain and the design of the mountain are registered.
Hosted Exchange 2010 Enterprise Grade and Collaboration Solutions for Small and Medium Businesses Web Site:
310KM Lab 4 Part 3 Tutorial Group:2 Student Name:Chan Nga Lok Fan Ka Yan Lo Yuen Ki Tsui Sui Wa.
Chung Man Ho Willims Chow Man Kei Gary Kwok Pak Wai Lion.
Ho Ting Chung, Zeturl ( ) 1.  Authentication  Encryption 2.
310KM M-Commerce Application Lab 7 Presentation Lau Ting Nga Virginia Tsang Pui Yu Wong Sin Man.
Robin Estabrooks Computer Science 1631, Winter 2011.
Student Name: Group.  Developed by Microsoft  Alliance with Nokia in 2011  4 main functions:  Outlook Mobile  Windows Media Player for Windows Mobile.
Mobile Mobile OS and Application Team: Kwok Tak Chi Law Tsz Hin So Ting Wai.
Identity and Access IDGo Secure (ISE) for Android Didier Bonnet April 2015.
Research of difference OS for authentication and encryption Group member:Li Man Yiu Tsun Yu Hin Wong Nok Wai.
Sync Sugar to the native iPad and iPhone address book and calendar Server-side sync | No plug-ins required Aldo Zanoni CEO and Managing Director Omni Technology.
310KM – Team Assignment: OS Platform of Mobile workforce for Logistics Company Window Mobile OS: Chan Wai Kai Android Operation Systems: Chan Kwok.
Data Encryption Overview South Seas Corporation Jared Owensby.
Security in By: Abdulelah Algosaibi Supervised by: Prof. Michael Rothstein Summer II 2010: CS 6/79995 Operating System Security.
About PKI Key Stores Dartmouth College PKI Lab. Key Store Defined Protected “vault” to hold user’s private key with their copy of their x.509 certificate.
Exchange server Mail system Four components Mail user agent (MUA) to read and compose mail Mail transport agent (MTA) route messages Delivery agent.
SmartPhones Student 1 Student 2 Student 3. SmartPhone Definition “A SmartPhone is one device that can take care of all your handheld computing and communication.
RSA SecurID November 10, 2005.
» Explain the way that electronic mail ( ) works » Configure an client » Identify message components » Create and send messages.
Office 365: Efficient Cloud Solutions Wednesday March 12, 9AM Chaz Vossburg / Gabe Laushbaugh.
SMUCSE 5349/49 Security. SMUCSE 5349/7349 Threats Threats to the security of itself –Loss of confidentiality s are sent in clear over.
Identity and Access IDGo Secure (ISE) for Android Didier Bonnet November 2014.
CertifiedMail Secure Messaging “Enterprise Encrypted Messaging… Hosted or In House Flexibility” Confidential – for authorized and internal distribution.
Information Systems Today: Managing in the Digital World TB4-1 4 Technology Briefing Networking.
Mobile Operating System Security A PRESENTATION BY DANIEL ADAMS CSC 345 DR. BOX.
PROJECT PAPER ON BLUEFIRE MOBILE SECURITY. BY PONNURU VENKATA DINESH KUMAR STUDENT ID # A0815 PROFESSOR – VICKY HSU CS-426.
Making the Internet a Better Place for Business NIST PKI Steering Committee March 14, 2002.
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter Four Configuring Outlook and Outlook Web Access.
Hosted Exchange 2013 The world’s leading messaging service based on Microsoft’s popular.
Chapter 8 Safeguarding the Internet. Firewalls Firewalls: hardware & software that are built using routers, servers and other software A point between.
May l Washington, DC l Omni Shoreham iPhone 2.0, BlackBerry and Windows Mobile Smart-Phone Hosting without Exchange and BES John Davies President.
E-commerce What are the relationships among: – Client (i.e. you) – Server – Bank – Certification authority Other things to consider: – How to set up your.
Digital Envelopes, Secure Socket Layer and Digital Certificates By: Anthony and James.
Riva Integration Server for Salesforce.com Server-side sync | No plug-ins required Wolfgang Berger Business Development EMEA Region Omni Technology Solutions.
Hosted Exchange 2013 The world’s leading messaging service based on Microsoft’s popular Exchange Server 2013, delivered as a cloud-based solution.
Lieberman Software Random Password Manager & Two-Factor Authentication.
Virtual Private Network Benefits Classification Tunneling technique, PPTP, L2TP, IPSec Encryption Technology Key Management Technology Authentication Settings.
Riva – Sync Sugar directly to Microsoft Exchange Server-side sync | No plug-ins required Trevor Poapst VP Marketing and Sales Riva CRM Integration
CIS 325: Data Communications1 Chapter Seventeen Network Security.
FriendFinder Location-aware social networking on mobile phones.
FriendFinder Location-aware social networking on mobile phones.
The Benefits of Indigo SMS Aumne, Inc. Tel: Fax: Commerce Ct Suite 200, Lisle, IL USA.
Easy-to-Use RedFlag System Delivers Notifications via Phone, , Text, Social Media, and More to Improve Effectiveness of Your Communications COMPANY.
2/19/2016clicktechsolution.com Security. 2/19/2016clicktechsolution.com Threats Threats to the security of itself –Loss of confidentiality.
Ms. Tracy  Identify the purpose of an operating system.  Identify different operating systems.  Describe computer user interaction with multiple.
VPN. CONFIDENTIAL Agenda Introduction Types of VPN What are VPN Tokens Types of VPN Tokens RSA How tokens Work How does a user login to VPN using VPN.
Office 365 is cloud- based productivity, hosted by Microsoft. Business-class Gain large, 50GB mailboxes that can send messages up to 25MB in size,
Methods of Tracking Position i Pod Touch – Wi-Fi used to find location by detecting known hotspots. iPhone – Cellular triangulation uses the mobile communication.
Websms Offers Professional Messaging Solutions via Web, , Gateway or Directly Out of Excel (Online) on the Microsoft Office 365 Platform OFFICE 365.
Joe Knight’s Company VPN Policy. What is VPN? Virtual Private Network (VPN) will allow you all as users to remote into the network from home or anywhere.
Your data, protected and under control wherever they go SealPath Enterprise – IRM
Antony Edwin Keane Inc Ltd
With Office 365, Collaborative Solution by Qorus Streamlines Document Assembly and Enhances Productivity for Any Business-Critical Documents OFFICE 365.
ESign365 Add-In Gives Enterprises and Their Users the Power to Seamlessly Edit and Send Documents for e-Signature Within Office 365 OFFICE 365 APP BUILDER.
Office 365 is cloud-based productivity, hosted by Microsoft.
About CodeTwo We are a trusted software vendor and Microsoft partner delivering Office 365 and Exchange solutions to over businesses all over the.
About CodeTwo We are a trusted software vendor and Microsoft partner delivering Office 365 and Exchange solutions to over businesses all over the.
Google 2 Step Verification Backup Codes Google 2 Steps Verification Backup Codes is very important to get access Gmail account. Backup codes is usually.
ADVANCED KEY CONTROL TECHNOLOGY FOR NEW CAR DEALERSHIPS
iOS Alert Ivo Georgiev George Emilov Stephane Petrov
Presentation transcript:

Lab4 Part2 Lau Ting Nga Virginia Tsang Pui Yu Wong Sin Man

BlackBerry OS End-to-end Encryption – Two transport encryption options Advanced Encryption Standard (AES) Triple Data Encryption Standard (Triple DES) Data transmitted between BlackBerry® Enterprise Server and BlackBerry smartphones – Private encryption keys Secure, two-way authenticated environment Stored only in the user's secure enterprise account and BlackBerry smartphone regenerated wirelessly by the user

BlackBerry OS End-to-end Encryption Data sent to the BlackBerry smartphone is encrypted by BlackBerry Enterprise Server using the private key retrieved from the user's mailbox. The encrypted information travels securely across the network to the smartphone where it is decrypted with the key stored there.

BlackBerry OS  RSA SecurID Two-Factor Authentication  RSA ACE/Agent® Authorization API 5.0 interface  Additional authorization when users access application data or corporate intranets  Username and Token Passcode

Window Mobile  protect corporate data and communications  designed to put organizations in control of their own security and data

Window Mobile  Authentication services include:  Security services for user authentication  Credential management.  Message protection through a programming interface called Security Support Provider Interface.

Window Mobile  Encryption, to help provide privacy and authentication between two communicating parties who have exchanged a shared secret.  Digital Signature, to help authenticate another party, or information sent by that party, without prior exchange of a shared secret.

Symbian  An open source operating system (OS) and software platform designed for smartphones and maintained by Nokia

Symbian  Malware  Symbian OS was subject to a variety of viruses, the best known of which is Cabir. Usually these send themselves from phone to phone by Bluetooth.  However, Symbian OS 9.x adopted a UNIX-style capability model.  Bypassing Platform Security  Symbian OS 9.x devices can be hacked to remove the platform security introduced in OS 9.1 onwards, allowing users to execute unsigned code.

Business Solutions - BlackBerry  on the Go  Don’t miss a great opportunity just because you’re not in the office! Send and receive directly from your mobile device  Satellite Navigation  Never get lost again! Imagine all the convenience of a tom- tom ™ but in the palm of your hand instead!

Business Solutions - BlackBerry  Hosted Microsoft Exchange  Share Outlook Calendars, Access your , Business Contacts - and access them via your mobile phone – with the BusinessMobiles.com Hosted Exchange Solution.  Handset Tracking  Know the exact geographic location of any of your sales staff at any given point in time. Big brother - Awesome!

Business Solutions - BlackBerry  Boost Reception To Your Mobile Phone  Frustrated with your poor mobile reception when you’re inside? We can help with a antenna that boosts reception on your Business.  Free Consultancy  Are you maximising your company’s productivity? Get a free “in field” consultation.

Business Solutions - BlackBerry  Business Applications  Just some of the multiple software solutions we have to help increase your mobile business productivity.  Business Networking Events  Want to dramatically increase your sales and meet up to 50 NEW Business Clients in just 1 hour?

References  us/library/cc aspx us/library/cc aspx  p p  