310KM Lab 4 Part 3 Tutorial Group:2 Student Name:Chan Nga Lok Fan Ka Yan Lo Yuen Ki Tsui Sui Wa.

Slides:



Advertisements
Similar presentations
Powerful and convenient management for Windows Mobile ® 6.1 devices in an enterprise environment. These features include: Centralized, over-the-air device.
Advertisements

McAfee One Time Password
310KM M-Commerce Application Selection of Mobile Platform Group 4 Choy Chun Lung, Lawrence Hui Yiu Ting, Eddy Chan Ki Yin, CKY Liu Tsz Ping, Scott.
Mobile Access: BYOD Trends SCOTT DUMORE - DIRECTOR, TECHNOLOGY, CHANNELS & ALLIANCES AUTONOMY, HP SOFTWARE.
Chapter 17: WEB COMPONENTS
What’s new in this release? September 6, Milestone Systems Confidential Milestone’s September release 2012 XProtect ® Web Client 1 Connect instantly.
Lee Hang Lam Wong Kwun Yam Chan Sin Ping Wong Cecilia Kei Ka Mobile Phone OS.
310km Lab4 Presentation. Comparison between mobile OS Palm OS Blackberry Os Windows Mobile Symbian i OS Android.
Desktop Central Managing Desktops, Servers & Devices Romanus Prabhu R Technical Account Manager LinkedIn : romanus.prabhu.
Sophos Mobile Control. Tablets on the rise 2 Trends 3 75% of 157 polled companies encourage employee owned smart phones and tablets to access corporate.
Extending ForeFront beyond the limit TMGUAG ISAIAG AG Security Suite.
Meraki Mobile Device Management
SSL & SharePoint IT:Network:Applications. Agenda Secure Socket Layer Encryption 101 SharePoint Customization SharePoint Integration.
Building and Deploying Safe and Secure Android Apps for Enterprise Presented by Technology Consulting Group at Endeavour Software Technologies.
Lab4 Part2 Lau Ting Nga Virginia Tsang Pui Yu Wong Sin Man.
eToken PKI Client Overview
Mobile Data Management (MDM) July 24, 2013 Lance M. Calisch.
Cryptography and Authentication Lab ECE4112 Group4 Joel Davis Scott Allen Quinn.
Chapter 9: Using and Managing Keys Security+ Guide to Network Security Fundamentals Second Edition.
OAAIS Enterprise Information Security Security Awareness, Training & Education (SATE) Program or UCSF Campus VPN.
310KM Mobile Commerce Applications Lab/Tutorial 4 Part 3 Team members: Li Chun Yin Pun Hoi Lam Shek Hin Shing.
Ho Ting Chung, Zeturl ( ) 1.  Authentication  Encryption 2.
Student Name: Group.  Developed by Microsoft  Alliance with Nokia in 2011  4 main functions:  Outlook Mobile  Windows Media Player for Windows Mobile.
Mobile Mobile OS and Application Team: Kwok Tak Chi Law Tsz Hin So Ting Wai.
Identity and Access IDGo Secure (ISE) for Android Didier Bonnet April 2015.
Research of difference OS for authentication and encryption Group member:Li Man Yiu Tsun Yu Hin Wong Nok Wai.
310KM – Team Assignment: OS Platform of Mobile workforce for Logistics Company Window Mobile OS: Chan Wai Kai Android Operation Systems: Chan Kwok.
Wireless Encryption By: Kara Dolansky Network Management Spring 2009.
V1.00 © 2009 Research In Motion Limited Introduction to Mobile Device Web Development Trainer name Date.
Copyright Microsoft Corp Ramnish Singh IT Advisor Microsoft Corporation Secure Remote Access Challenges, Choices, Best Practices.
Mobility Methods for document access while away from the office.
©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone Endpoint Security Current portfolio and looking forward October 2010.
A+ Certification Guide Chapter 10 Mobile Devices.
Managing Client Access
Module 4 Managing Client Access. Module Overview Configuring the Client Access Server Role Configuring Client Access Services for Outlook Clients Configuring.
CRYPTOGRAPHY PROGRAMMING ON ANDROID Jinsheng Xu Associate Professor North Carolina A&T State University.
OV Copyright © 2011 Element K Content LLC. All rights reserved. System Security  Computer Security Basics  System Security Tools  Authentication.
Your storage on the ground; Your files in the cloud.
RSA Security Validating Users and Devices to Protect Network Assets Endpoint Solutions for Cisco Environments.
Basic Technology for Electronic Commerce Fan Fan address: GUANGXI UNIVERSITY BUSINESS SCHOOL 2005.
1 Computer & Web Security  Security Problems in Computer Use  Privacy-Protecting Techniques  Privacy-Protecting Technologies: cryptography, digital.
By Mihir Joshi Nikhil Dixit Limaye Pallavi Bhide Payal Godse.
Mobile and Wireless Communication Security By Jason Gratto.
Securing Data at the Application Layer Planning Authenticity and Integrity of Transmitted Data Planning Encryption of Transmitted Data.
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter Four Configuring Outlook and Outlook Web Access.
©Kwan Sai Kit, All Rights Reserved Windows Small Business Server 2003 Features.
THE EASY WAY TO STAGE ZEBRA’S ANDROID MOBILE COMPUTERS
1 Thomas Lippert Senior Product Manager - Mobile What’s new in SMC 5.0.
20 21 Remote Wipe.
Module 4 Planning and Deploying Client Access Services in Microsoft® Exchange Server 2010 Presentation: 120 minutes Lab: 90 minutes After completing.
1 Introduction to Microsoft Windows 2000 Windows 2000 Overview Windows 2000 Architecture Overview Windows 2000 Directory Services Overview Logging On to.
One Platform, One Solution: eToken TMS 5.1 Customer Presentation November 2009.
Module 8: Designing Security for Authentication. Overview Creating a Security Plan for Authentication Creating a Design for Security of Authentication.
Hands-On Microsoft Windows Server Implementing Microsoft Internet Information Services Microsoft Internet Information Services (IIS) –Software included.
StageNow The easy way to stage Android mobile computers from Zebra Technologies.
Wireless and Mobile Security
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
NETWORKING & SYSTEM UPDATES
Don’t Log in!. Recap on the previous units I’ve tried to make it as concise as possible but there is a bit of writing, to ensure that you have some notes.
KAIS T Comparative studies on authentication and key exchange methods for wireless LAN Jun Lei, Xiaoming Fu, Dieter Hogrefe, Jianrong Tan Computers.
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
LO2 Understand the key components used in networking.
20 21 Remote Wipe.
Why EMS? What benefit does EMS provide O365 customers Manage Mobile Productivity Increase IT ProductivitySimplify app delivery and deployment LOB Apps.
Short Customer Presentation September The Company  Storgrid delivers a secure software platform for creating secure file sync and sharing solutions.
Mobile Security for QlikView
Web Applications Security Cryptography 1
Mobile Security for QlikView
RR RR Problems Along With Solutions For iPhone And iPad Toll Free ( )
OPERATING SYSTEMS.
Presentation transcript:

310KM Lab 4 Part 3 Tutorial Group:2 Student Name:Chan Nga Lok Fan Ka Yan Lo Yuen Ki Tsui Sui Wa

 iPhone OS

Authentication of iPhone OS Authentication methods  Password (MSCHAPv2)  RSA SecureID  CRYPTOCard  x.509 Digital Certificates  Shared secret

Authentication of iPhone OS 802.1x authentication protocols  EAP-TLS  EAP-TTLS  EAP-FAST  EAP-SIM  PEAP v0, v1  LEAP

Authentication of iPhone OS For Wireless Network  WPA2 Enterprise

Encryption of iPhone OS Hardware encryption  AES 256 bit encoding Internet encryption  SSL v3  TLS v1 Data encryption  128-bit AES encryption

Strengths of iPhone OS  Objective-C, simple language to learn and use  Huge amount of apps  Accessible by everyone (e.g. VoiceOver)  Multi-Touch interface

Weaknesses of iPhone OS  NOT support Flash  Safari NOT support Java  Only one carrier  Deleted data vulnerable to hacker

 BlackBerry OS

Authentication of BlackBerry OS  BlackBerry devices are content servers directly  Most of the data are in the BlackBerry server but not device  BlackBerry MDS Connection Service authenticates to content servers on behalf of BlackBerry devices  Data will not leakage easily

Encryption of BlackBerry OS  Data and message will encrypt by using Enterprise Server Express before sent  AES / Triple Des data encryption method are used in the transmission process  Decryption will be done after arrive terminal device

Strengths of BlackBerry OS  Safety and convenience mail communication  classification of the five programs navigation bar are useful and better then old interface  WebKit browser engine improve the browsing efficiency  with more social networking tools, allowing you to combine , Facebook and Twitter updates all in one place  Delete SurePress function to simply the usage

Weaknesses of BlackBerry OS  Number of Apps are still far behind user needs(BlackBerry: over 8000; Android: 70000; iPhone: )  New OS have no outstanding function compare to other OS  Still do not support Flash

 Android OS

Authentication & Encryption in Android OS  Most Android applications use self-signed certificates still does not support hardware-based encryption Open-source  Weakness Easier for hacker to take data off a Micro SD card Hacker can understand the underlying architecture and source code Cybercriminals will be rushing to take advantage

Authentication & Encryption in Android OS  Strengths Developing enterprise encryption solutions for data Enforcing standard security policies User administration for predefined Active Directory and/or LDAP groups Remote application installation  remote lock  remote wipe  advanced password rules More secure faster than a close OS

Strengths of Android  Lies in the future

Strengths of Android OS  Roadmap of Android OS cost of innovation is borne largely by Google  Versatility  Gathered up a group of some like minded partners

Weaknesses of Android OS  Apps don’t look as sexy as the iPhone ones  Inability to download apps to your micro SD card  Competing against one another for shelf-space instead of the iPhone

 Window Mobile OS

Authentication of Window Mobile  Windows Mobile 5.0 uses ActiveSync desktop to connect to the corporate CA to receive the required user certificate and associated key  Windows Mobile 6 implementing Transport Layer Security (TLS) certificate-based authentication

Encryption of Window Mobile  Windows Mobile 6.1 supports AES 128 Encryption for On Device Encryption. There is no way to export the Encryption Key The Encryption Key Changes on Hard Reset Device encryption can only be enabled via a security policy there is no way a user can enable this feature in Windows Mobile.

Encryption of Window Mobile  Windows Mobile 6.0 onward supports AES 128 Encryption for files written to the SD card. There is no way to export the Encryption Key The Encryption Key Changes on Hard Resett

Strengths of Window Mobile  Available apps: bringing apps into one central location  User interface: turn into a user customizable dream interface  Computer desktop integration: integrate with both Exchange Servers and with Outlook environments

Weaknesses of Window Mobile  There's no copy and paste functionality.  The OS doesn't support multitasking.  There's no Flash support.

The chosen platform

Reasons  Safety and convenience mail communication  management of logistic need fast and secure  WebKit browser engine improve the browsing efficiency  convenience to check the stock  With more social networking tools  well communication

Recommendations  Invite more programmers to create more applications  Concentrate to develop in an unique function  Develop new technology to support more medias, such as Flash

References  _wars_iphone_vs_android_vs_blackberry  everyone/  ew_details_of_android.htm  google-io-walkup/  android_22_froyo_with_flash_player_101.html  finally-gets-android-mobile-device-from-lg/

References  android-winmo-is-better-than-you-think/  impressions-strengths-weaknesses-article html   blackberry-torch-9800-review/  urity/showArticle.jhtml?articleID=  Evaluating the iPhone as a Mobile Platform for People- Centric Sensing Application( by Emiliano Miluzzo en al)