Presented by Team Alpha MOBILE DEVICE SECURITY 1.

Slides:



Advertisements
Similar presentations
310KM M-Commerce Application Selection of Mobile Platform Group 4 Choy Chun Lung, Lawrence Hui Yiu Ting, Eddy Chan Ki Yin, CKY Liu Tsz Ping, Scott.
Advertisements

Mobile Access: BYOD Trends SCOTT DUMORE - DIRECTOR, TECHNOLOGY, CHANNELS & ALLIANCES AUTONOMY, HP SOFTWARE.
Mobile Protection Overview
Mobile Application Development Keshav Bahadoor. Part 1 Cross Platform Web Applications.
 یعنی چی؟  تاریخچه  مقایسه  مزایا  معایب.  1979–1992 Mobile phones use embedded systems to control operation.  Martin Cooper.
Lee Hang Lam Wong Kwun Yam Chan Sin Ping Wong Cecilia Kei Ka Mobile Phone OS.
Week 9, Network Communication Software, Dept of Informatics, Faculty of Business.
Unit 1- Recognizing Computers.  Understand the importance of computers  Identify significant times in computer history  Describe how all computers.
InformationWeek 2014 Mobile Security Survey Research Findings © 2014 Property of UBM Tech; All Rights Reserved.
Meraki Mobile Device Management
KoolSpan Comparison to CellCrypt
Mobile Data Management (MDM) July 24, 2013 Lance M. Calisch.
| Copyright© 2010 Microsoft Corporation the future of productivity Kurt DelBene President, Microsoft Office Division.
CMPTR1 CHAPTER 3 COMPUTER SOFTWARE Application Software – The programs/software/apps that we run to do things like word processing, web browsing, and games.
OPERATING SYSTEMS AND SYSTEMS SOFTWARE. SYSTEMS SOFTWARE Systems software consists of the programs that control the operations of the computer and its.
Managing BYOD Legal IT’s Next Great Challenge. Agenda  The BYOD Trend – benefits and risks  Best practices for managing mobile device usage  Overview.
Security issues for mobile devices Cvetko Andreeski.
KASPERSKY ENDPOINT SECURITY FOR BUSINESS
SELECTING TABLETS FOR ENTERPRISE USE TABLET COMPUTER SELECTION.
The University of Akron Summit College Business Technology Department Computer Information Systems 2440: 145 Operating Systems Introduction to UNIX/Linux.
Office 365: Efficient Cloud Solutions Wednesday March 12, 9AM Chaz Vossburg / Gabe Laushbaugh.
Mobility Without Vulnerability: Secure and Enable Your Mobile Users, Apps, and Devices David Clapp – Intuitive.
Apps & the Enterprise Will Ro, Global Director, HTCpro.
November 2009 Network Disaster Recovery October 2014.
PowerPoint Presentation to Accompany Chapter 5 System Software Visualizing TechnologyCopyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall.
Mobile Operating System Security A PRESENTATION BY DANIEL ADAMS CSC 345 DR. BOX.
SOFTWARE.
Supporting BYOD Dennis Cromwell Supporting BYOD  CISCO Study – 15B devices capable of connecting to a network by 2015  The Consumerization.
Survey of PC and Network Operating Systems
A Digital Gateway Michele Reed Vice President and Director of Communications Missouri PTA.
Windows Reimagine d Windows 8 Data explosion Browser-based apps Natural interaction Ubiquitous connectivity Personal devices in the.
TEMPLATE DESIGN © Android Data Confidentiality Alex Mayer University of Houston Abstract Employees are increasingly relying.
A brief history, Smart Phones, Tablets, and Wearable Technology.
Software Essentials ICT 1 & 2. What is software?  software is the set of instructions stored inside a computer  These instructions tell the computer.
Mobility in Government Martin Grey, Solutions Architect Unit 18 April, 2013.
Mobility In the Enterprise Friend or Foe? Bob West, CEO, Echelon One 2012 Workshop on Cyber Security and Global Affairs 20 Junio, 2012 Barcelona, España.
PowerPoint Presentation to Accompany Chapter 5 System Software Visualizing TechnologyCopyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall.
Operating Systems for Wireless Mobile Devices Dr. Tal Lavian UC Berkeley Engineering, CET Why does.
Mobilize employees, field workers, and business partners with layered security infrastructure for mobile apps, Fiori apps, content, and devices Andreas.
Mobile Applications applications operating on mobile devices, tablets, smartphones Mobile Applications.
Air Stat. Air Stat Overview Mobility is clearly one of the hottest Topic An ecosystem of sopisticated related technologies is already established: – Cloud,
MOBILE DEVICE MANAGEMENT Intracol Technologies AD.
Software Essentials ICT 1 & 2. What is software?  software is the set of instructions stored inside a computer  These instructions tell the computer.
EMBEDDED OPERATING SYSTEMS. DEFINITION An embedded operating system is a system for embedded computer systems These operating systems are designed to.
Operating Systems By-Anoushka Puri. What is an Operating System An operating system is an interface between the user and the computer hardware. It is.
The Claromentis Digital Workplace An Introduction
Ms. Tracy  Identify the purpose of an operating system.  Identify different operating systems.  Describe computer user interaction with multiple.
Cyber Security in the Mobile Era KEEPING ENTERPRISE DATA SAFE IN THE BYOD ERA.
Technical Sales Specialist Software - OS and Applications John R. Moegling Sr. Systems Engineer.
Office 365 Mobile Sara Grachek Craig Overboe Mary Shrode.
System Software Chapter Handles technical details Works with end users, application software, and computer hardware Four types of programs –Operating.
Shlomo Golsherazian Jeff Heiser Etana Kenter Michael Rosenberg A.J. Shah Chelsea Schneider Danielle Zimmerman.
The Evolution of Technology In the Workplace There’s An App For That:
Moving to BYOD Gary Audin 1.
System Software Chapter Handles technical details Works with end users, application software, and computer hardware Four types of programs –Operating.
The Official Guide to Game Development. Chapter 6 Mobile Game Development: play as you go.
Tech and Construction Mobile Technology in the Field Allen Small, Distribution Director Austin Energy SWEDE 2015 Workshop.
Android App Development Presented By, Handy Apps
Mobile Computing Lecture#01 Mobile Horizon. Leading Mobile Phone Technologies  iOS  Android  Blackberry  Symbian  Windows Phone  J2ME.
THE CONSUMERIZATION OF IT By Patricia Coonelly, Anthony Dipoalo, Tom Stagliano.
Lecture 1: Network Operating Systems (NOS)
Total Enterprise Mobility Comprehensive Management and Security
Huawei Enterprise AnyOffice BYOD Solution
Office 365 Upsell Paths.
The time to address enterprise mobility is now
Mobile device Management & BYOD in a mobile world
Upsell Small Business Customers to an Office 365 plan
Introduction to Mobile Devices
Software engineering in the mobile phone platform war.
Chapter 4.
Presentation transcript:

Presented by Team Alpha MOBILE DEVICE SECURITY 1

INTRODUCTION (ROSS) Beginning of mobility (why, who, where, when It began) DynaTAC handheld phone First mobile call made by Martin Cooper in 1973 Cooper called Bell labs rival in New York Smartphone and Tablet devices (why, where, when, and who) Simon from IBM First introduced in 1990’s What else about Simon??? What about the first Tablet device???? What, who, where, and when??? 2

MOBILE SECURITY (ROSS) 3 What is mobile security? First know virus written for smartphones in 2004 Virus called “Caribe” written for Symbian operating system Classified by Kaspersky Lab as Worm.SymbOS.Cabir Started the security concern for modern phones.

TYPE OF DEVICE OPERATING SYSTEM (ROSS) Windows Built-in Windows Office documents and Adobe Flash support Multi-tasking capability (Live tiles on Windows 8 Phones Available for multiple phone device brands iOS Has good embedded mobile security Includes full-block, file level hardware encryption Phone device must be Apple 4

TYPE OF DEVICE OPERATING SYSTEM CONTINUED 5 Android Google product Community and user driven No restrictions on applications Unsecure Blackberry Very successful in government and corporate markets Ranked top in security level Excellent integration with corporate systems

STATISTICAL DATA (ROSS) According to the State of Mobility Survey 2012 by Symantec, 59 percent of the 6,275 respondents reported that their organizations are making line-of-business applications accessible from mobile devices, and 71 percent said their organization is looking at implementing a corporate "store" for mobile applications. It's not hard to see why. Organizations believe embracing mobile computing increases the efficiency and effectiveness of their workforces. Symantec's survey found that 73 percent of respondents expected to increase efficiency through mobile computing, and all of them did realize that increased efficiency See link for reference You may choose to use or not; up to you. 6

THE NEED TO SECURE (JOHN) BYOD Policy Mobile Commerce Gateway to Corporate Networks Personal Content Unsecured Wireless Communications Because the US President uses one 7

PROS AND CONS (JOHN) Personal work space Apps and Games Inconvenient (personal and work phone) Secure communications Access to corporate data Access to business applications Remote IT support (for IT personnel) 8

RECOMMENDATION (KEVIN) Mobile device management (MDM) tools BYOD security policy Hire dedicated staff for MDM Educate users through InfoSec classes Encourage InfoSec staff to acquire certification 9

CONCLUSION (EVERYONE) 10

REFERENCE (EVERYONE) 11