Presentation is loading. Please wait.

Presentation is loading. Please wait.

Mobile Computing: Security Issue Group 4 Members: 941603 黃昱翔 941604 梁振堃 941611 郭雅恬 941618 劉俊宏 941623 王雋為 941650 王瓊儀 941661 李晏榕 941662 黃筱涵 941702 許椀淇.

Similar presentations


Presentation on theme: "Mobile Computing: Security Issue Group 4 Members: 941603 黃昱翔 941604 梁振堃 941611 郭雅恬 941618 劉俊宏 941623 王雋為 941650 王瓊儀 941661 李晏榕 941662 黃筱涵 941702 許椀淇."— Presentation transcript:

1 Mobile Computing: Security Issue Group 4 Members: 941603 黃昱翔 941604 梁振堃 941611 郭雅恬 941618 劉俊宏 941623 王雋為 941650 王瓊儀 941661 李晏榕 941662 黃筱涵 941702 許椀淇

2 Introduction  Evolution Of Network  Mobile Computing  Vital Issues

3 A Timeline of Mobile Computing

4 Wireless Communication Systems

5 Security of Mobile Computing  The advantages of mobile devices are undeniable, but so are the ways that they can bring vulnerability to your system. Consider these key ways to protect your company’s system.

6 Device Security  Tips to secure mobile devices like laptops & handhelds  Be smart.  Label your property.  Use security products.  Use the hard drive password setting on your laptop.  Once device was lost

7 Network Security  Network Security  Data in transit V.S. Data at rest.  Deploy VPN (virtual private network).  Security Layers  Wireless Security Protocols.

8 Network Security  Security Layers  Based on the OSI  Motivation for the Mobile IP  Security Services:  Authentication  Access control  Non-repudiation  Data integrity  Data confidentiality  Assurance/Availability  Notarization/signature

9 Network Security  Wireless Security Protocols  Four wireless security protocol types are needed: 1. Access control to mobile devices 2. Local access control to networks and network services 3. Remote access control to networks and network services 4. Protection of data communication to/from mobile devices.

10 Network Security  Wireless Security Protocols 1.Access control to mobile devices  PIN and Password Authentication  Visual and Graphical Login  Biometrics  Authorization  File Masking  Access Control Lists  Role-based Access Control

11 Network Security  Wireless Security Protocols 2.Local access control to networks and network services  WLAN  Bluetooth  Cellular Network… 3.Remote Network Access  Remote access VPN 4.Protection of Data Communication

12 Tips to secure the data on mobile devices  Consider your real needs.  Make a trusty backup.  Ensure you're only carrying the data you think you are.  Use encryption or a Virtual Private Network (VPN).

13 Tips to ensure a secure Internet connection everywhere—including at home  Disable your wireless Internet connection when not in use.  Use secure wireless.  Make your home wireless network more secure.  Change the name of your “SSID” network and/or don’t broadcast it.  Ensure you’re using a static IP address.  Enable your firewall.  Change the default admin password; make it longer and more complex.  Only allow machines you know to connect to your network by enabling MAC address filtering.

14 Wireless Application Security  Wireless application security includes 1. Application access control 2. Client/server communications security 3. Anti-malware protection

15 Wireless Application Security  Application Access Control  Mobile applications handling confidential data should require user authentication before application access is granted.  A limited inactive time is specified for an application before re-authentication is required.

16 Wireless Application Security  Client/Server Communication Security  Typical wireless Internet connections are: 1. The wireless connection between a mobile device and an access device 2. The Internet connection between the mobile device and the Internet host/server via the access device.  For Web-based client/server applications, the SSL protocol provides encryption and signing of transmitted data.

17 Wireless Application Security  Anti-Malware Protection  Malware can access and steal application data, such as credit card information stored in memory by wireless applications.  Time and space for sensitive data in memory should be minimized.

18 Privacy and Security Policies  Any discussion of security and device management needs to acknowledge the importance of employees' efforts toward securing corporate data — especially customer data.  IT needs to formulate and distribute clear, concise security policies regarding access via mobile devices.

19 Privacy and Security Policies  Conduct tests on a periodic basis to ensure that the protections you've deployed worked, and that your employees remain up-to-date on their responsibilities when it comes to privacy and security.

20 Case-Sybase  The largest enterprise software and services company exclusively focused on managing and mobilizing information.  With the global solutions, enterprises can extend their information securely and make it useful for people anywhere using any device.

21 Case-Sybase  Government Solutions  Information Technology, Management and Mobile Solutions for Government Agencies  They offer complete government solutions in four key areas: 1. Federal 2. State and Local 3. Homeland Security 4. Sybase Government Partners

22 Case-Sybase  Sybase Homeland Security Solutions  With the threat of terrorist attacks, homeland security has become a major concern for all individuals and organizations. Sybase solutions help meet this agency’s security objectives, and more.

23 Case-Sybase  Empowering field personnel with anywhere, anytime access to critical information offers many benefits, including:  Increased productivity and improved response time  Better information sharing and collaboration between agencies  Error-free capture of data in a standardized format  Ability to maintain security and confidentiality of critical data

24 Case-Sybase  Specific examples of Homeland Security solutions we provide include:  Remote access to photos, documentation and other vital statistics for field investigators  Onsite data collection for inspection of commercial structures, bridges, roads, military equipment, power lines and the nation's food supply  Information access for custom checkpoints ensuring inspection of people, vehicles, packages and any other items that may pose a security threat  Smart card identification and tracking of visitors at secure locations

25 Future will forecast 1. Global information safe service market development present situation and tendency

26 2. Taiwan information security market 3. The new focus of enterprises funded protection for mobile devices 4. Establishes set of motions work the security policy a. Zero tolerance policy b. The document remembered wants redact c. Other protective measures Future will forecast

27 Conclusion  The advent of the World Wide Web  Electronically 、 Efficiently 、 Nonpaperness  the prevalent of notebook (laptop) and its high frequency


Download ppt "Mobile Computing: Security Issue Group 4 Members: 941603 黃昱翔 941604 梁振堃 941611 郭雅恬 941618 劉俊宏 941623 王雋為 941650 王瓊儀 941661 李晏榕 941662 黃筱涵 941702 許椀淇."

Similar presentations


Ads by Google