Mobile Device Security Drew Hayes Christ Liechty November 27, 2007.

Slides:



Advertisements
Similar presentations
ATK Space 9617 Distribution Avenue San Diego, California Tel: (858) Fax: (858) Website:
Advertisements

The Whole/Hole of Security Public (DoD) v. Corporate Carl Bourland US Army Judge Advocate Generals Corps.
Presented By Krypto Security Software, LLC. What is BackStopp is a simple but effective tool to help an organization protect its mobile data in the event.
Security for Mobile Devices
INADEQUATE SECURITY POLICIES Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA standards.
Identify risks with mobile devices: Portable data storage Wireless connections 3 rd party applications Data integrity Data availability 2.
Supporting The Mobile Client: Expanding Our Borders John Guidone Manager, Desktop Technologies and Dawn E. Colonese Manager, Help Desk & Client Access.
Ethics, Privacy and Information Security
Free HIPAA Training BCI Computers Free HIPAA Training (c) 2014 BCI Computers all rights reserved.
Invasion of Smart Phones in Clinical Areas Chrissy Kyak Privacy Officer University of Maryland Upper Chesapeake Health.
Online Holiday Shopping Brings Great Deals – and Fraud This lesson is part of the iKeepCurrent TM Program, provided by iKeepSafe TM.
Imation Mobile Security Research Presentation August 2013 What is happening with our data?
Sophos Mobile Control. Tablets on the rise 2 Trends 3 75% of 157 polled companies encourage employee owned smart phones and tablets to access corporate.
For further information computersecurity.wlu.ca
Packet Analyzers, a Threat to Network Security. Agenda Introduction The background of packet analyzers LAN technologies & network protocols Communication.
Purdue University proudly presents Doug Couch & Nathan Heck, IT Security Analysts.
DHS SECURITY INCIDENT REPORTING AND RESPONSE SECURITY INCIDENT REPORTING AND RESPONSE DHS managers, employees, and other authorized information users.
All rights reserved © 2005, Alcatel Risk Awareness in Enterprise IT Processes and Networks  Dr. Stephan Rupp.
IT Retreat 2009 IT Security Controls and Initiatives.
Beyond WiFi: Securing Your Mobile Devices Thomas Kuhn Information Technology Assistance Center (iTAC) Kansas State University.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
11 WIRELESS SECURITY by Prof. Russell Jones. WIRELESS COMMUNICATION ISSUES  Wireless connections are becoming popular.  Network data is transmitted.
Lack of Security in Hotspots/Wi Fi Areas Yin Wai ISM 158 4/27/10.
Factors to be taken into account when designing ICT Security Policies
Mobile Computing in Society Jared Sutherland CIS 497
New Data Regulation Law 201 CMR TJX Video.
Chapter 2 Information Security Overview The Executive Guide to Information Security manual.
RSA Security Validating Users and Devices to Protect Network Assets Endpoint Solutions for Cisco Environments.
Systems Management: The key to lower TCO. High Cost of PDA’s -Average Handheld TCO is $3,000 per year. Source: Gartner Group -Average Wireless Handheld.
Securing Information Systems
Information Security Technological Security Implementation and Privacy Protection.
Protecting Yourself Online (Information Assurance)
CHAPTER 4 Information Security. CHAPTER OUTLINE 4.1 Introduction to Information Security 4.2 Unintentional Threats to Information Security 4.3 Deliberate.
MOBILE DEVICE SECURITY. WHAT IS MOBILE DEVICE SECURITY? Mobile Devices  Smartphones  Laptops  Tablets  USB Memory  Portable Media Player  Handheld.
Eduroam Louis Twomey HEAnet Library Services Day 20 th November 2014.
Wireless Security: Protect yourself when you’re mobile.
Security Squad Keeping your Equipment and Information Safe Security Squad Keeping your Equipment and Information Safe Security Squad Video Series, Part.
Information Systems Services How to Protect Yourself On-Line – Keeping Safe At Home Neil Jowsey, IT Security Team 25 th September 2013.
TEMPLATE DESIGN © Android Data Confidentiality Alex Mayer University of Houston Abstract Employees are increasingly relying.
8.1 © 2007 by Prentice Hall Minggu ke 6 Chapter 8 Securing Information Systems Chapter 8 Securing Information Systems.
 INADEQUATE SECURITY POLICIES ›Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA.
{ Active Directory Security Why bother?.   Law #1: Nobody believes anything bad can happen to them, until it does   Law #2: Security only works if.
George L. Heron Technology Officer, SafeNet, Inc..
Dominick Bennese, Jyl Mangooni, Steve Lorson GROUP 5.
Kacper Rams, Matt Starr, Megan Stephens. Overview BYOD Introduction Risks Controls.
Cloud Computing New Technology Presentation Riley Woldt EDT 661.
The State of Computer & Data Security in Corporations Independent Survey.
Data Security Overview. Data Security Periphery –Firewalls –Web Filtering –Intrusion Detection & Prevention Internal –Virus Protection –Anti Spy-ware.
WIRELESS NETWORKING TOT AK Agenda Introduction to Wireless Technologies Wireless Networking Overview Non-Technical considerations Other Comparable.
SECURITY Professor Mona Mursi. ENVIRONMENT IT infrastructures are made up of many components, abstractly: IT infrastructures are made up of many components,
Desktop Security: Making Sure Your Office Environment is Secure.
Network Security & Accounting
Security Policies. Threats to security and integrity  Threats to information systems include  Human error –keying errors, program errors, operator errors,
1 Wi-Fi, Wireless Broadband, Sensor & Personal Area Networks –Standards –Applications Broadband Wireless Access –WiMAX –Adapting 3G for WBA: UMTS.
Texas Technology Forum The Future of Mobile Technology Trends and Issues July 16, 2009.
Computer Security By Duncan Hall.
OIT and IT providers across campus are launching an awareness campaign to provide tips and resources to help you stay safe online and protect AU resources.
Cyber Security in the Mobile Era KEEPING ENTERPRISE DATA SAFE IN THE BYOD ERA.
Information Security Everyday Best Practices Lock your workstation when you walk away – Hit Ctrl + Alt + Delete Store your passwords securely and don’t.
1 #UPAugusta Today’s Topics What are Deadly IT Sins? Know them. Fear them. Fix them. #UPAugusta201 6.
LEARNING AREA 1 : INFORMATION AND COMMUNICATION TECHNOLOGY PRIVACY AUTHENTICATION VERIFICATION.
BYOD: An IT Security Perspective. What is BYOD? Bring your own device - refers to the policy of permitting employees to bring personally owned mobile.
Mobile Device Security Management Leyna Belinsky.
USDA 2016 Financial Management Training Transforming Shared Services Cyber Security Presented by Jack Blount.
Copyright © 2006 Heathkit Company, Inc. All Rights Reserved Introduction to Networking Technologies Security on Peer-to-Peer Networks.
Securing Information Systems
Mobile Computing Overview
Security of Handheld Devices
IT & Security Training Skills.
Cybersecurity at WAJ What is it? Are we at risk?.
Presentation transcript:

Mobile Device Security Drew Hayes Christ Liechty November 27, 2007

Overview Mobile device security background PDA security Laptop security

Background Major problem: ease of use vs. complete security Software security Physical security

PDA Security 40% of users say they don’t have any security in place Viruses for mobile devices Vulnerabilities Securing your mobile device Possible future of security: transient authentication

Laptop Security Why is it important to educate and enforce security procedures on laptops? –Ease of profitability from theft –Company’s Reputations

Laptop Security How can a company become more secure with its mobile devices? –Start with policy –Know where the data lives –Encrypt data on mobile devices –Use standard security controls on mobile devices –Keep administrator’s passwords out of the user’s hands

Laptop Security How can a company make sure employee’s follow security policies? –Responsibility is key in this situation, setting examples of employee’s that don’t follow the rules is a must. A “slap on the wrist” won’t do in today’s business world.

References “2006: The Year of the laptop … stolen that is” “An Overview of Mobile Device Security” “Does Your Wi-Fi Hotspot Have an Evil Twin?” “Get a Grip on Handheld Security” “Mobile Device Security in Six Simple Steps” “Mobile Device Security Using Transient Authentication” IEEE Transactions on Mobile Security “Next Wave in Security: Protecting Smart Phones, PDAs” “Sprint sees mobile device security neglect”