Download presentation
Presentation is loading. Please wait.
Published byArthur Simpson Modified over 9 years ago
1
Enforcing Cyber security in Mobile Applications – Public Sector Use Case SAPHINA MCHOME, VIOLA RUKIZA TANZANIA REVENUE AUTHORITY INFORMATION AND COMMUNICATION TECHNOLOGIES DEPARTMENT Emailsmchome@tra.go.tz: vrukiza@tra.go.tz;smchome@tra.go.tzvrukiza@tra.go.tz
2
Introduction Security risks and threats Security Enforcement Conclusion OUTLINE
3
INTRODUCTION – PURPOSE Mobile devices & Applications Risks & Threats Secure Mobile platforms Essential Security Mechanisms
4
Fastest growing sector Calls + SMS Fully fledged mobile computing platform 1G Analogue cellular network 2G Digital Cellular network 3G Broadband data services- 4G native IP networks INTRODUCTION – MOBILE TECHNOLOGY
5
Smartphones, tablets, PDAs High Processing power High Storage Capacity Easy Usability - touch screens, voice, QWERTY keyboards INTRODUCTION – MOBILE TECHNOLOGY Cont.
6
High capabilities has led to fast & high penetration and adoption Mobile payments & banking Income & Property Tax, Utility bills (LUKU, DSTV & Water)– MPESA, NMB mobile Business operations - Complete Office Software INTRODUCTION – MOBILE APPLICATION IN PUBLIC SECTOR
7
Information security Mainly focused in protecting Information and Information systems from threats and risks that may result in unauthorized disclosure, interruption, modification and destruction. SECURITY RISKS AND THREATS
8
Security principle for ensuring non-disclosure of Information to unauthorized users Small size – Easily misplaced, left unattended, stolen Vulnerabilities in mobile applications - Malicious Code embedded in mobile apps Wireless Technology – Bluetooth & Wi-Fi SECURITY RISKS AND THREATS - CONFIDENTIALITY
9
Data integrity refers to the accuracy and consistency of stored or data in transit, which is mainly indicated by the absence of data alteration in an unauthorized way or by unauthorized person Weak protection mechanisms Turning off security features Intentional hacking of the traffic through sniffing and spoofing SECURITY RISKS AND THREATS - INTEGRITY
10
Availability is a security attribute of ensuring that a system is operational and functional at a given moment of time Compromised devices causing downtime to the connected infrastructure DOS attacks targeting mobile devices battery SECURITY RISKS AND THREATS - AVAILABILITY
11
Secure Information while optimize Key requirements of security solution ENFORCE SECURITY Protection ManagementSupport Detection
12
Discover devices’ protection mechanisms availability of antivirus remote sanitization & encryption capabilities authentication strength Block unprotected /compromised devices based on Security policy set ENFORCE SECURITY - DETECTION MECHANISMS
13
Effective Authentication methods – avoid plain, weak passwords Access Control - Limit what attacker can do Encryption Protect stored information – even when device is lost Protect transmitted data Block unused, vulnerable communication ports Disable wireless communication (Bluetooth, Wi-Fi) while not in use ENFORCE SECURITY – PROTECTION MECHANISMS
14
Centrally managing all devices Security Administration Control Audit Report Security Policies - Digital Policy Certificate ENFORCE SECURITY - MANAGEMENT
15
Support when devices are lost Remote Sanitization GPS Locator Education and Security awareness Simple Steps to reduce risks Trusted sites for downloading applications Proper security settings Use of strong password Regular updating devices ENFORCE SECURITY - SUPPORT
16
Ratings by Security Mechanisms Category Enterprise Readiness of Consumer mobile platforms by Cesare Garlati of Trend Micro Security Mechanisms in Mobile Platforms
17
Usage of mobile applications is inevitable Organizations’ commitment Investment in security solutions - Means for enforcing, monitoring and auditing protection mechanisms Users Security Awareness CONCLUSION
18
Q & A THANK YOU
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.