05-05-2005Sujeeth Narayan1 Smartphones Security CS 691 Sujeeth Narayan.

Slides:



Advertisements
Similar presentations
INTRODUCTION TO COMPUTER NETWORKS Zeeshan Abbas. Introduction to Computer Networks INTRODUCTION TO COMPUTER NETWORKS.
Advertisements

Slide 1 Electronic Communication 2.01: Recall components of electronic communication.
Extending ForeFront beyond the limit TMGUAG ISAIAG AG Security Suite.
The Natural way for Secure Mobile v.1.4
For further information computersecurity.wlu.ca
Meraki Mobile Device Management
Building and Deploying Safe and Secure Android Apps for Enterprise Presented by Technology Consulting Group at Endeavour Software Technologies.
Security Presented by : Qing Ma. Introduction Security overview security threats password security, encryption and network security as specific.
N ETWORK S ECURITY Presented by: Brent Vignola. M ATERIAL OVERVIEW … Basic security components that exist in all networks Authentication Firewall Intrusion.
Mobile Mobile OS and Application Team: Kwok Tak Chi Law Tsz Hin So Ting Wai.
Security in By: Abdulelah Algosaibi Supervised by: Prof. Michael Rothstein Summer II 2010: CS 6/79995 Operating System Security.
Cell Phone Trends By Valentin Kifumbi. Overview Old cell phone Make calls Big No features New cell phone More features Small Different purpose.
11 WIRELESS SECURITY by Prof. Russell Jones. WIRELESS COMMUNICATION ISSUES  Wireless connections are becoming popular.  Network data is transmitted.
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
SmartPhones Student 1 Student 2 Student 3. SmartPhone Definition “A SmartPhone is one device that can take care of all your handheld computing and communication.
INTRODUCTION TO COMPUTER NETWORKS INTRODUCTION Lecture # 1 (
MOBILE MALWARE TOPIC #5 – INFORMATION ASSURANCE AND SECURITY Michael Fine 1.
Bluetooth Jennifer Portillo Thomas Razo Samson Vuong By Sonny Leung.
1 Enabling Secure Internet Access with ISA Server.
Information Security Information Technology and Computing Services Information Technology and Computing Services
Computing Concepts – Part 2 Getting Started with Applied Computer Concepts Computing Concepts: Part 2 1.
Information Systems Today: Managing in the Digital World TB4-1 4 Technology Briefing Networking.
MOBILE DEVICE SECURITY. WHAT IS MOBILE DEVICE SECURITY? Mobile Devices  Smartphones  Laptops  Tablets  USB Memory  Portable Media Player  Handheld.
PROJECT PAPER ON BLUEFIRE MOBILE SECURITY. BY PONNURU VENKATA DINESH KUMAR STUDENT ID # A0815 PROFESSOR – VICKY HSU CS-426.
CSD 2006 / TEAM 12 Final presentation 29 th May 2006.
© NOKIApage: 1 Wireless IP Solutions Enabled by GPRS Chris Briglin Head of Marketing GPRS Business Program Nokia Telecommunications.
Business Data Communications, Stallings 1 Chapter 1: Introduction William Stallings Business Data Communications 6 th Edition.
TASK A PowerPoint presentation informing you upon: Wi-Fi, 3G, WAP, Bluetooth.
Bluetooth POP3 Relay Project Benjamin Kennedy April 30 th, 2002.
Deploying and Managing Mobile Devices in the Enterprise.
BY MOHAMMED ALQAHTANI (802.11) Security. What is ? IEEE is a set of standards carrying out WLAN computer communication in frequency bands.
Windows Vista, 2007 Office system, and Exchange 2007 Better Together.
 INADEQUATE SECURITY POLICIES ›Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA.
An Analysis of Bluetooth Security
Nokia E-Series. E-61i The Nokia E61i is an impressive 3G smartphone which has been designed for the business user on the move. The Nokia E61i is an impressive.
Making connections. Smile Taking a picture of the class and transferring it… What methods could I use?
Extending Forefront beyond the limit TMG UAG ISA IAG Security Suite
© 2009 Research In Motion Limited Advanced Java Application Development for the BlackBerry Smartphone Trainer name Date.
PRESENTATION ON WI-FI TECHNOLOGY
Computer and Information Science Ch1.3 Computer Networking Ch1.3 Computer Networking Chapter 1.
Review 2 Chapters 7, 8, 9. 2  Define a network and its purpose.  Explain how communications technologies are used in our every day lives.  Understand.
Wireless Network Security Presented by: Prabhakaran Theertharaman.
Week 10-11c Attacks and Malware III. Remote Control Facility distinguishes a bot from a worm distinguishes a bot from a worm worm propagates itself and.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Living in a Network Centric World Network Fundamentals – Chapter 1.
Enforcing Cyber security in Mobile Applications – Public Sector Use Case SAPHINA MCHOME, VIOLA RUKIZA TANZANIA REVENUE AUTHORITY INFORMATION AND COMMUNICATION.
Extending ISA/IAG beyond the limit. AGAT Security suite - introduction AGAT Security suite is a set of unique components that allow extending ISA / IAG.
발표자 : 현근수 Bluetooth. Overview wireless protocol short-range communications technology single digital wireless protocol connecting multiple devices mobile.
Standards and Protocols Slide show for WiFi Characteristics of a wireless local network. It was named after a group of people who invented. The.
For Wi-Fi The is internationally describing characteristics of a wireless local network. It was named after a group of people who invented.
3.01 Recall components of electronic communication.Slide 1 AGENDA – DIGITAL COMPUTER 1A OCT. 5, WEDNESDAY Competency #3 – Electronic Communication.
Focus On Bluetooth Security Presented by Kanij Fatema Sharme.
3.3 Mobile Digital Communication. Overview Demonstrate and apply the knowledge and understanding of the increasing use of mobile communication devices.
Securing Data Transmission and Authentication. Securing Traffic with IPSec IPSec allows us to protect our network from within IPSec secures the IP protocol.
1 REMOTE CONTROL SYSTEM V7 2 Introduction.
JPMA PROJECT PRESENTATION (ITU) 1 INTRODUCTION BLUETOOTH CHAT DESIGN JAVA ON MOBILE DEVICE Presenters Benjamin Boateng Abass Omer Venkateshwar Rao Namilakonda.
NETWORKING & SYSTEM UPDATES
The Personal Server Changing the Way We Think About Ubiquitous Computing Roy Want, et al. / Intel Research UBICOMP 2002 Nov Seungjae Lee
Chapter 2 Rheachel, Jessica, Megan, and Cassidy Communications, Networks, the Internet, and the World Wide Web.
Equipping Your Mobile Workforce for a Seamless Customer Experience in an Unsecured Wireless World Dr. Simon Blake-Wilson Chief Security Advisor.
Wireless Mesh Networking or Peer to Peer Technology Andre Lukito – Johnsonsu – Wednesday, 9.
Analysis And Research Of System Security Based On.
Securing Interconnect Networks By: Bryan Roberts.
Copyright © 2006 Heathkit Company, Inc. All Rights Reserved Introduction to Networking Technologies Security on Peer-to-Peer Networks.
CSCE 548 Student Presentation By Manasa Suthram
Technology, Issues, and Solutions by David Clark
Bluetooth.
3.3 Mobile Digital Communication
Presentation transcript:

Sujeeth Narayan1 Smartphones Security CS 691 Sujeeth Narayan

Sujeeth Narayan2 Agenda Part 1 - Introduction to Smartphones Part 2 - Security Issues Part 3 - Unified Framework Part 4 - New Authentication Method Part 5 - Conclusion

Sujeeth Narayan3 Motivation A developing Technology Industry Security is unstable in Mobile phones Easy to Test

Sujeeth Narayan4 Part 1: Introduction to Smartphones

Sujeeth Narayan5 What are Smartphones? Includes : Vocal Communications – GSM,GPRS Web Browsing Organizer Functions Multimedia Capabilities Media Player Audio, Video Recorder Camera

Sujeeth Narayan6 Smartphones Internals Capabilities : Personal Information Management Synchronize using protocols such as ActiveSync, IntelliSync Connect using Bluetooth, IrDA or GPRS Operating Systems : Windows Mobile TM - Audiovox SMT 5600 Symbian (Linux) – Motorola A760

Sujeeth Narayan7 OS Architecture

Sujeeth Narayan8 Based on Operating System – Bugs, Security Holes Data Security – PIN exists but not applied for data Risks related to Inherent Characteristics

Sujeeth Narayan9 Risks related to Users Mobile usage Surveyby Pointsec Mobile Technologies Ease to synchronize data with Personal Computer Not Enough Data Security

Sujeeth Narayan10 Risks related to Networks Bluetooth : Short range wireless connections Has Security specification but not used many users. Setting Bluetooth Service in Discoverable Mode Possible Attacks: BTBrowser scans for nearby Bluetooth devices and Browses Directories Buffer overflows attacks in some response messages Bluejacking : Putting a message in place of ones device name Sending with a pairing request With a prompting message, the victim presses a key Victim would be allow attacker to access files

Sujeeth Narayan11 Risks related to Networks GPRS (General Packet Radio Service) : Works on Radio waves Work with Internet connectivity Possible Attacks: Attacks from Internet – s, Messenger Messages Compromised backbone of GGSN – Gateway GPRS Support Node

Sujeeth Narayan12 Enterprises Security Policy Banning use of Personal Smartphones Unrealistic Impossible to physically control Should Define: Synchronization Use of devices in public places (Deactivate Bluetooth) Information Exchange between Device and Enterprise System

Sujeeth Narayan13 USF - Unified Security Framework Driven by: NIST – National Institute of Standard and Technology CSRC – Computer Security Resource Center Published on June

Sujeeth Narayan14 User Authentication – The first line of defense for an unattended, lost, or stolen device. Multiple modes of authentication increase the work factor for an attacker. Content Encryption – The second line of defense for protecting sensitive information. Policy Controls – Policy rules, enforced for all programs regardless of associated privileges, protect critical components from modification, and limit access to security-related information. USF- Addresses Issues

Sujeeth Narayan15 Part 4: New Authentication Method

Sujeeth Narayan16 Picture Password : A Visual Login Technique for Mobile Devices Wayne Jansen, Serban Gavrila, Vlad Korolev, Rick Ayers, Ryan Swanstrom

Sujeeth Narayan17 Method: Extracting the selection of Images Matrix Formation of Images Associated value for each image Generate equivalent Password Extracting the characteristics of Image ???

Sujeeth Narayan18 Part 5: Conclusion

Sujeeth Narayan19 Smartphones are complex in Architecture and Design Network protocols are complex to implement Technology is growing and possibly more weaknesses discovered Organizations should consider these devices in policy making Conclusion

Sujeeth Narayan20 References Mobile Firewall and Antivirus - Mobile Security Software

Sujeeth Narayan21 Questions ??