Mobile Computing: Security Issue Group 4 Members: 941603 黃昱翔 941604 梁振堃 941611 郭雅恬 941618 劉俊宏 941623 王雋為 941650 王瓊儀 941661 李晏榕 941662 黃筱涵 941702 許椀淇.

Slides:



Advertisements
Similar presentations
!! Are we under attack !! Consumer devices continue to invade *Corporate enterprise – just wanting to plug in* Mobile Device Management.
Advertisements

CS898T Mobile and Wireless Network Handheld Device Security By Yuan Chen July 25 th, 2005.
Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information.
Network Security Introduction Security technologies protect mission-critical networks from corruption and intrusion. Network security enables new business.
Building and Deploying Safe and Secure Android Apps for Enterprise Presented by Technology Consulting Group at Endeavour Software Technologies.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
The Remote Workplace Designing, deploying, and supporting the remote workplace environment Presented by: John Milhoan Information Technology Cooperative,
Network and Server Basics. 6/1/20152 Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server.
Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Wireless Encryption By: Kara Dolansky Network Management Spring 2009.
11 WIRELESS SECURITY by Prof. Russell Jones. WIRELESS COMMUNICATION ISSUES  Wireless connections are becoming popular.  Network data is transmitted.
1 Chapter 19 Networks. 2 What’s Inside and on the CD? In this chapter you’ll learn: –Basic network terminology –To identify network components –About.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
Security Management IACT 918 July 2004 Gene Awyzio SITACS University of Wollongong.
SESSION 9 THE INTERNET AND THE NEW INFORMATION NEW INFORMATIONTECHNOLOGYINFRASTRUCTURE.
Security Management IACT 418/918 Autumn 2005 Gene Awyzio SITACS University of Wollongong.
Contact Center Security Strategies Grant Sainsbury Practice Director, Dimension Data.
Topics 1.Security options and settings 2.Layer 2 vs. Layer 3 connection types 3.Advanced network and routing options 4.Local connections 5.Offline mode.
Chapter 3 Application Level Security in Wireless Network IWD2243 : Zuraidy Adnan : Sept 2012.
Alter – Information Systems 4th ed. © 2002 Prentice Hall 1 E-Business Security.
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
Securing a Wireless Network
Sybase Confidential Propriety.iAnywhere ConfidentialiAnywhere Confidential Proprietary.Sybase Confidential Propriety. Addressing the Challenges of Device.
New Data Regulation Law 201 CMR TJX Video.
WIRELESS SECURITY ASHIMA SOOD PEYTON GREENE. OVERVIEW History Introduction to Wireless Networking Wireless Network Security Methods Securing Wireless.
E-business Security Dana Vasiloaica Institute of Technology Sligo 22 April 2006.
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
Confidential Crisis Management Innovations, LLC. CMI CrisisPad TM Product Overview Copyright © 2011, Crisis Management Innovations, LLC. All Rights Reserved.
1 Deployment of Computer Security in an Organization CE-408 Sir Syed University of Engineering & Technology 99-CE-282, 257 & 260.
MOBILE DEVICE SECURITY. WHAT IS MOBILE DEVICE SECURITY? Mobile Devices  Smartphones  Laptops  Tablets  USB Memory  Portable Media Player  Handheld.
Section Seven: Information Systems Security Note: All classified markings contained within this presentation are for training purposes only.
FA 2 Handheld Project Fruit & Vegetables Program Commodity Inspection Division Washington State Dept. of Agriculture.
PROJECT PAPER ON BLUEFIRE MOBILE SECURITY. BY PONNURU VENKATA DINESH KUMAR STUDENT ID # A0815 PROFESSOR – VICKY HSU CS-426.
1. Windows Vista Enterprise And Mid-Market User Scenarios 2. Customer Profiling And Segmentation Tools 3. Windows Vista Business Value And Infrastructure.
Internet Security for Small & Medium Business Week 6
Wireless Networks Tamus, Zoltán Ádám
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
Security Squad Keeping your Equipment and Information Safe Security Squad Keeping your Equipment and Information Safe Security Squad Video Series, Part.
Electronic Commerce & Marketing. What is E-Commerce? Business communications and transactions over networks and through computers, specifically –The buying.
Lesson 20-Wireless Security. Overview Introduction to wireless networks. Understanding current wireless technology. Understanding wireless security issues.
Network Security Lecture 9 Presented by: Dr. Munam Ali Shah.
1 C-DAC/Kolkata C-DAC All Rights Reserved Computer Security.
TECHNOLOGY GUIDE THREE Protecting Your Information Assets.
PRIVACY, SECURITY & ID THEFT PREVENTION - TIPS FOR THE VIGILANT BUSINESS - SMALL BUSINESS & ECONOMIC DEVELOPMENT FORUM October 21, WITH THANKS TO.
BZUPAGES.COM. What is a VPN VPN is an acronym for Virtual Private Network. A VPN provides an encrypted and secure connection "tunnel" path from a user's.
Information Systems Security
Security Issues and Strategies Chapter 8 – Computers: Understanding Technology (Third edition)
Wireless Network Security Presented by: Prabhakaran Theertharaman.
Customer Interface for wuw.com 1.Context. Customer Interface for wuw.com 2. Content Our web-site can be classified as an service-dominant website. 3.
Company small business cloud solution Client UNIVERSITY OF BEDFORDSHIRE.
06/02/06 Workshop on knowledge sharing using the new WWW tools May 30 – June 2, 2006 GROUP Presentation Group 5 Group Members Ambrose Ruyooka Emmanuel.
VPN. CONFIDENTIAL Agenda Introduction Types of VPN What are VPN Tokens Types of VPN Tokens RSA How tokens Work How does a user login to VPN using VPN.
Simon Prasad. Introduction  Smartphone and other mobile devices have made it so easy to stay connected.  But this easy availability may lead to personal.
IS3220 Information Technology Infrastructure Security
Securing Interconnect Networks By: Bryan Roberts.
Short Customer Presentation September The Company  Storgrid delivers a secure software platform for creating secure file sync and sharing solutions.
LESSON 12 Business Internet. Electronic business, or e-business, is the application of information and communication technologies (ICT) in support of.
Network and Server Basics. Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server network.
Virtual Private Networks
Instructor Materials Chapter 6 Building a Home Network
TECHNOLOGY GUIDE THREE
Securing the Network Perimeter with ISA 2004
Providing Teleworker Services
How To Set Up A Wireless Network
Security of a Local Area Network
Contact Center Security Strategies
ICT Computing Lesson 4: Computing Network.
LM 5. Wireless Network Security
Providing Teleworker Services
Presentation transcript:

Mobile Computing: Security Issue Group 4 Members: 黃昱翔 梁振堃 郭雅恬 劉俊宏 王雋為 王瓊儀 李晏榕 黃筱涵 許椀淇

Introduction  Evolution Of Network  Mobile Computing  Vital Issues

A Timeline of Mobile Computing

Wireless Communication Systems

Security of Mobile Computing  The advantages of mobile devices are undeniable, but so are the ways that they can bring vulnerability to your system. Consider these key ways to protect your company’s system.

Device Security  Tips to secure mobile devices like laptops & handhelds  Be smart.  Label your property.  Use security products.  Use the hard drive password setting on your laptop.  Once device was lost

Network Security  Network Security  Data in transit V.S. Data at rest.  Deploy VPN (virtual private network).  Security Layers  Wireless Security Protocols.

Network Security  Security Layers  Based on the OSI  Motivation for the Mobile IP  Security Services:  Authentication  Access control  Non-repudiation  Data integrity  Data confidentiality  Assurance/Availability  Notarization/signature

Network Security  Wireless Security Protocols  Four wireless security protocol types are needed: 1. Access control to mobile devices 2. Local access control to networks and network services 3. Remote access control to networks and network services 4. Protection of data communication to/from mobile devices.

Network Security  Wireless Security Protocols 1.Access control to mobile devices  PIN and Password Authentication  Visual and Graphical Login  Biometrics  Authorization  File Masking  Access Control Lists  Role-based Access Control

Network Security  Wireless Security Protocols 2.Local access control to networks and network services  WLAN  Bluetooth  Cellular Network… 3.Remote Network Access  Remote access VPN 4.Protection of Data Communication

Tips to secure the data on mobile devices  Consider your real needs.  Make a trusty backup.  Ensure you're only carrying the data you think you are.  Use encryption or a Virtual Private Network (VPN).

Tips to ensure a secure Internet connection everywhere—including at home  Disable your wireless Internet connection when not in use.  Use secure wireless.  Make your home wireless network more secure.  Change the name of your “SSID” network and/or don’t broadcast it.  Ensure you’re using a static IP address.  Enable your firewall.  Change the default admin password; make it longer and more complex.  Only allow machines you know to connect to your network by enabling MAC address filtering.

Wireless Application Security  Wireless application security includes 1. Application access control 2. Client/server communications security 3. Anti-malware protection

Wireless Application Security  Application Access Control  Mobile applications handling confidential data should require user authentication before application access is granted.  A limited inactive time is specified for an application before re-authentication is required.

Wireless Application Security  Client/Server Communication Security  Typical wireless Internet connections are: 1. The wireless connection between a mobile device and an access device 2. The Internet connection between the mobile device and the Internet host/server via the access device.  For Web-based client/server applications, the SSL protocol provides encryption and signing of transmitted data.

Wireless Application Security  Anti-Malware Protection  Malware can access and steal application data, such as credit card information stored in memory by wireless applications.  Time and space for sensitive data in memory should be minimized.

Privacy and Security Policies  Any discussion of security and device management needs to acknowledge the importance of employees' efforts toward securing corporate data — especially customer data.  IT needs to formulate and distribute clear, concise security policies regarding access via mobile devices.

Privacy and Security Policies  Conduct tests on a periodic basis to ensure that the protections you've deployed worked, and that your employees remain up-to-date on their responsibilities when it comes to privacy and security.

Case-Sybase  The largest enterprise software and services company exclusively focused on managing and mobilizing information.  With the global solutions, enterprises can extend their information securely and make it useful for people anywhere using any device.

Case-Sybase  Government Solutions  Information Technology, Management and Mobile Solutions for Government Agencies  They offer complete government solutions in four key areas: 1. Federal 2. State and Local 3. Homeland Security 4. Sybase Government Partners

Case-Sybase  Sybase Homeland Security Solutions  With the threat of terrorist attacks, homeland security has become a major concern for all individuals and organizations. Sybase solutions help meet this agency’s security objectives, and more.

Case-Sybase  Empowering field personnel with anywhere, anytime access to critical information offers many benefits, including:  Increased productivity and improved response time  Better information sharing and collaboration between agencies  Error-free capture of data in a standardized format  Ability to maintain security and confidentiality of critical data

Case-Sybase  Specific examples of Homeland Security solutions we provide include:  Remote access to photos, documentation and other vital statistics for field investigators  Onsite data collection for inspection of commercial structures, bridges, roads, military equipment, power lines and the nation's food supply  Information access for custom checkpoints ensuring inspection of people, vehicles, packages and any other items that may pose a security threat  Smart card identification and tracking of visitors at secure locations

Future will forecast 1. Global information safe service market development present situation and tendency

2. Taiwan information security market 3. The new focus of enterprises funded protection for mobile devices 4. Establishes set of motions work the security policy a. Zero tolerance policy b. The document remembered wants redact c. Other protective measures Future will forecast

Conclusion  The advent of the World Wide Web  Electronically 、 Efficiently 、 Nonpaperness  the prevalent of notebook (laptop) and its high frequency