Download presentation
Presentation is loading. Please wait.
Published byEstella McCormick Modified over 9 years ago
1
Mobile Computing: Security Issue Group 4 Members: 941603 黃昱翔 941604 梁振堃 941611 郭雅恬 941618 劉俊宏 941623 王雋為 941650 王瓊儀 941661 李晏榕 941662 黃筱涵 941702 許椀淇
2
Introduction Evolution Of Network Mobile Computing Vital Issues
3
A Timeline of Mobile Computing
4
Wireless Communication Systems
5
Security of Mobile Computing The advantages of mobile devices are undeniable, but so are the ways that they can bring vulnerability to your system. Consider these key ways to protect your company’s system.
6
Device Security Tips to secure mobile devices like laptops & handhelds Be smart. Label your property. Use security products. Use the hard drive password setting on your laptop. Once device was lost
7
Network Security Network Security Data in transit V.S. Data at rest. Deploy VPN (virtual private network). Security Layers Wireless Security Protocols.
8
Network Security Security Layers Based on the OSI Motivation for the Mobile IP Security Services: Authentication Access control Non-repudiation Data integrity Data confidentiality Assurance/Availability Notarization/signature
9
Network Security Wireless Security Protocols Four wireless security protocol types are needed: 1. Access control to mobile devices 2. Local access control to networks and network services 3. Remote access control to networks and network services 4. Protection of data communication to/from mobile devices.
10
Network Security Wireless Security Protocols 1.Access control to mobile devices PIN and Password Authentication Visual and Graphical Login Biometrics Authorization File Masking Access Control Lists Role-based Access Control
11
Network Security Wireless Security Protocols 2.Local access control to networks and network services WLAN Bluetooth Cellular Network… 3.Remote Network Access Remote access VPN 4.Protection of Data Communication
12
Tips to secure the data on mobile devices Consider your real needs. Make a trusty backup. Ensure you're only carrying the data you think you are. Use encryption or a Virtual Private Network (VPN).
13
Tips to ensure a secure Internet connection everywhere—including at home Disable your wireless Internet connection when not in use. Use secure wireless. Make your home wireless network more secure. Change the name of your “SSID” network and/or don’t broadcast it. Ensure you’re using a static IP address. Enable your firewall. Change the default admin password; make it longer and more complex. Only allow machines you know to connect to your network by enabling MAC address filtering.
14
Wireless Application Security Wireless application security includes 1. Application access control 2. Client/server communications security 3. Anti-malware protection
15
Wireless Application Security Application Access Control Mobile applications handling confidential data should require user authentication before application access is granted. A limited inactive time is specified for an application before re-authentication is required.
16
Wireless Application Security Client/Server Communication Security Typical wireless Internet connections are: 1. The wireless connection between a mobile device and an access device 2. The Internet connection between the mobile device and the Internet host/server via the access device. For Web-based client/server applications, the SSL protocol provides encryption and signing of transmitted data.
17
Wireless Application Security Anti-Malware Protection Malware can access and steal application data, such as credit card information stored in memory by wireless applications. Time and space for sensitive data in memory should be minimized.
18
Privacy and Security Policies Any discussion of security and device management needs to acknowledge the importance of employees' efforts toward securing corporate data — especially customer data. IT needs to formulate and distribute clear, concise security policies regarding access via mobile devices.
19
Privacy and Security Policies Conduct tests on a periodic basis to ensure that the protections you've deployed worked, and that your employees remain up-to-date on their responsibilities when it comes to privacy and security.
20
Case-Sybase The largest enterprise software and services company exclusively focused on managing and mobilizing information. With the global solutions, enterprises can extend their information securely and make it useful for people anywhere using any device.
21
Case-Sybase Government Solutions Information Technology, Management and Mobile Solutions for Government Agencies They offer complete government solutions in four key areas: 1. Federal 2. State and Local 3. Homeland Security 4. Sybase Government Partners
22
Case-Sybase Sybase Homeland Security Solutions With the threat of terrorist attacks, homeland security has become a major concern for all individuals and organizations. Sybase solutions help meet this agency’s security objectives, and more.
23
Case-Sybase Empowering field personnel with anywhere, anytime access to critical information offers many benefits, including: Increased productivity and improved response time Better information sharing and collaboration between agencies Error-free capture of data in a standardized format Ability to maintain security and confidentiality of critical data
24
Case-Sybase Specific examples of Homeland Security solutions we provide include: Remote access to photos, documentation and other vital statistics for field investigators Onsite data collection for inspection of commercial structures, bridges, roads, military equipment, power lines and the nation's food supply Information access for custom checkpoints ensuring inspection of people, vehicles, packages and any other items that may pose a security threat Smart card identification and tracking of visitors at secure locations
25
Future will forecast 1. Global information safe service market development present situation and tendency
26
2. Taiwan information security market 3. The new focus of enterprises funded protection for mobile devices 4. Establishes set of motions work the security policy a. Zero tolerance policy b. The document remembered wants redact c. Other protective measures Future will forecast
27
Conclusion The advent of the World Wide Web Electronically 、 Efficiently 、 Nonpaperness the prevalent of notebook (laptop) and its high frequency
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.