Company: Deutsche Telekom Academic advisor: Yuval Elovici Technical advisor: Assaf Shabtai Project Team:Limor Segev Eran Frieman Carmel Karni Limor Segev,

Slides:



Advertisements
Similar presentations
UBIQUITY V3 An extensible platform for creating dynamic, customized, and geocentric native mobile applications.
Advertisements

What we do Larotecs Web2M is an off-the shelf, end-to-end, web-based solution designed to manage multiple widely distributed devices.
Cloud Computing EDT Cloud Computing Overview Cloud Computing can be defined as a network of applications, services, and infrastructure that are.
ONE STOP THE TOTAL SERVICE SOLUTION FOR REMOTE DEVICE MANAGMENT.
Building Mobile Apps in the Cloud – Comparing Approaches.
1 Alcatel Onetouch Antivirus. 2 Thinking about security on your smartphone Alcatel OneTouch? We have the solution. Among the applications on your smartphone,
Sophos Mobile Control. Tablets on the rise 2 Trends 3 75% of 157 polled companies encourage employee owned smart phones and tablets to access corporate.
XProtect® Expert 2013 Product presentation
ADMS Automatic Data Master Server
Network and Server Basics. 6/1/20152 Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server.
 Guy Jacob  Roee Shapiro Project B Spring, 2009 Cloudio  Project Supervisor: Eddie Bortnikov  Lab Chief Engineer: Dr. Ilana David.
“Turn you Smart phone into Business phone “
The Ultimate Backup Solution.
Intrusion Prevention System DYNAMIC HONEYNET by Rosenfeld Asaf advisor Uritzky Max.
ITS Offsite Workshop 2002 PolyU IT Security Policy PolyU IT/Computer Systems Security Policy (SSP) By Ken Chung Senior Computing Officer Information Technology.
Street Stories Seema Moorjani Monday, August 19, 2002 Next Generation Internet.
KB-IDS. Academic Advisor: Dr. Yuval Elovici Technical Advisor: Asaf Shabtai Team Members: Eliya Rahamim Elad Ankry Uri Kanonov.
KB-IDS Application Design Document1 KB-IDS – Application Design Document Knowledge-based Temporal Abstraction Host- based Intrusion Detection System for.
PARALLEL COMPUTATION OF KNOWLEDGE-BASED TEMPORAL ABSTRACTION Academic advisor Dr. Yuval Elovici Technical advisor Asaf Shabtai Team Maor Guetta, Arkady.
ATS8500 Remote Service Solution
CLOUD COMPUTING.  It is a collection of integrated and networked hardware, software and Internet infrastructure (called a platform).  One can use.
SPRING 2011 CLOUD COMPUTING Cloud Computing San José State University Computer Architecture (CS 147) Professor Sin-Min Lee Presentation by Vladimir Serdyukov.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 1: Exploring the Network Introduction to Networks.
SMS Gateway OZEKI NG Document version: v Adding SMS functionality to SysAid.
Motivation. Part of Deutsche Telekom project:
Module 10: Designing an AD RMS Infrastructure in Windows Server 2008.
Cloud Computing Saneel Bidaye uni-slb2181. What is Cloud Computing? Cloud Computing refers to both the applications delivered as services over the Internet.
Information Assurance... Smart Card Interoperability Steve Haynes Phone
Term 2, 2011 Week 3. CONTENTS The physical design of a network Network diagrams People who develop and support networks Developing a network Supporting.
Abdullah Alshalan Garrett Drown Team 3 CSE591: Virtualization and Cloud Computing.
PPD Computing “Business Continuity” Windows and Mac Kevin Dunford May 17 th 2012.
©Kwan Sai Kit, All Rights Reserved Windows Small Business Server 2003 Features.
Cloud Computing Ashley Richardson. What is Cloud Computing? Having secure access to applications and data from any network device Computational resources.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 1: Exploring the Network Introduction to Networks.
Dr. Ali Abed Lazim MBChB – MSC Health Informatics Advisor
15 Copyright © 2005, Oracle. All rights reserved. Performing Database Backups.
Secure Search Engine Ivan Zhou Xinyi Dong. Introduction  The Secure Search Engine project is a search engine that utilizes special modules to test the.
Exploring the Network.
Fundamentals of Database Chapter 7 Database Technologies.
Hosted File Backup Ensure that your data is kept safe with our cloud based data back-up service.
CONFIDENTIAL 1. 2 Designing the Intelligent Energy Gateway 2009 CONFIDENTIAL.
Windows Small Business Server 2003 Setting up and Connecting David Overton Partner Technical Specialist.
National Center for Supercomputing Applications NCSA OPIE Presentation November 2000.
A Brief Documentation.  Provides basic information about connection, server, and client.
Exchange Deployment Planning Services Exchange 2010 Complementary Products.
Management System For Graduate Students Projects Day Presentation – June 2011.
1. ◦ Intro ◦ Client-side security ◦ Server-side security ◦ Complete security ? 2.
Roles & Responsibilities
Abdullah Alshalan Garrett Drown Group #4 CSE591 - Virtualization and Cloud Computing.
Company: Amdocs Academic advisor: Ehud Gudes Technical advisor :Gabby Shimony Team: Uzi Lewin Elina Shlangman.
© ExplorNet’s Centers for Quality Teaching and Learning 1 Install, configure, and deploy a SOHO wireless/wired router using appropriate settings. Objective.
© 2014 IBM Corporation Mobile Customization & Administration IBM Connections 5.0 Workshop Author: Paul Godby IBM Ecosystem Development Duration: 30 minutes.
Websms Offers Professional Messaging Solutions via Web, , Gateway or Directly Out of Excel (Online) on the Microsoft Office 365 Platform OFFICE 365.
Short Customer Presentation September The Company  Storgrid delivers a secure software platform for creating secure file sync and sharing solutions.
CDP Technology Comparison CONFIDENTIAL DO NOT REDISTRIBUTE.
Best-in-class enterprise backup for the mobile enterprise Prepared for [Insert customer name] [Date}
Network and Server Basics. Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server network.
EAST AFRICAN DATA HANDLERS DATA SECURITY/MOBILITY
Chapter 1: Exploring the Network
The Future? Or the Past and Present?
BEST CLOUD COMPUTING PLATFORM Skype : mukesh.k.bansal.
Software for remote reading MBus Communicator v1.9
Elevator Inspection System
The Future? Or the Past and Present?
Cloud Computing.
Juno Technical Support Number
The Ultimate Backup Solution.
IS 4506 Server Configuration (HTTP Server)
12 STEPS TO A GDPR AWARE NETWORK
Demystifying the Cloud
Presentation transcript:

Company: Deutsche Telekom Academic advisor: Yuval Elovici Technical advisor: Assaf Shabtai Project Team:Limor Segev Eran Frieman Carmel Karni Limor Segev, Eran Frieman, Carmel Karni July 2009,

An Android OS could be attacked by hackers: – Open platform – Users will access the Internet intensively – Everyone can develop applications for Android (and publish in “The Market”) Limor Segev, Eran Frieman, Carmel Karni July 2009,

Successful attack on Androids may: – Expose private information – Prevent T-Mobile customers from using T-Mobile services. – Flood T-Mobile’s customer service infrastructure and personnel. – No easy way exists to “fix” mobile devices and especially Android. Limor Segev, Eran Frieman, Carmel Karni July 2009,

Exposure to Data Loss: – A device may be stolen / lost – Device malfunction – Usage Error Limor Segev, Eran Frieman, Carmel Karni July 2009,

Backup is possible for: -Documents -Media Files -Not for Applications Limor Segev, Eran Frieman, Carmel Karni July 2009,

Develop an Application that enables to: - Backup Application files on remote server - Manage DB at server + Allow Security operations. - Recovery of phone last stable status - Added Bonus - Deutsche Telekom will be able to monitor offline users-application and learn about threats. Limor Segev, Eran Frieman, Carmel Karni July 2009,

The System is composed of four major parts: -Web Server -DataBase (MySql) -Android Client -Manager Web-Based Report System Limor Segev, Eran Frieman, Carmel Karni July 2009,

-Developed on top of Apache-Tomcat. -Supports multiple connections/requests. -Communicates with clients via Servlets mechanism. -Has an Interface to MySql DB. -Supplies API to an external Threats Detection Application. Limor Segev, Eran Frieman, Carmel Karni July 2009,

-Developed using Google’s Android SDK. -Listens to applications-installations events. -Enables Applications backup on a remote Web Server, automatically and on demand. -Enables restoring applications on the device on demand. -Gets updates from the server periodically. - Easy to use, configurable. Limor Segev, Eran Frieman, Carmel Karni July 2009,

-Web based User Interface -Enables monitoring the server’s data. -Enables various reports production, such as: oUsers Report. oApplications Report. oUsers-Applications Report. oMalwares Report. Limor Segev, Eran Frieman, Carmel Karni July 2009,

www Limor Segev, Eran Frieman, Carmel Karni July 2009,

Android Client MainConfiguration Limor Segev, Eran Frieman, Carmel Karni July 2009,

Android Client BackupRestore Limor Segev, Eran Frieman, Carmel Karni July 2009,

Manager Applications ReportUsers Report Limor Segev, Eran Frieman, Carmel Karni July 2009,

Academic Advisor: Dr. Yuval Elovici Technical Advisor: Mr. Asaf Shabtai Deutsche Telekom Android Developers Team TA: Boris Rozenberg Head of SE Program: Professor Ehud Gudes SE Program Secretary : Sara Leibovitz Limor Segev, Eran Frieman, Carmel Karni July 2009,