Transcript Document
Mobile Computing: Security Issue
Group 4 Members:
941603黃昱翔 941604梁振堃
941611郭雅恬 941618劉俊宏
941623王雋為 941650王瓊儀
941661李晏榕 941662黃筱涵
941702許椀淇
Introduction
Evolution Of Network
Mobile Computing
Vital Issues
A Timeline of Mobile Computing
Wireless Communication Systems
Security of Mobile Computing
The advantages of mobile devices are
undeniable, but so are the ways that they can
bring vulnerability to your system. Consider
these key ways to protect your company’s
system.
Device Security
Tips to secure mobile devices like laptops &
handhelds
Be smart.
Label your property.
Use security products.
Use the hard drive password setting on your
laptop.
Once device was lost
Network Security
Network Security
Data in transit V.S. Data at rest.
Deploy VPN (virtual private network).
Security Layers
Wireless Security Protocols.
Network Security
Security Layers
Based on the OSI
Motivation for the Mobile IP
Security Services:
Authentication
Access control
Non-repudiation
Data integrity
Data confidentiality
Assurance/Availability
Notarization/signature
Network Security
Wireless Security Protocols
Four wireless security protocol types are needed:
1. Access control to mobile devices
2. Local access control to networks and
network services
3. Remote access control to networks and
network services
4. Protection of data communication to/from
mobile devices.
Network Security
Wireless Security Protocols
1.Access control to mobile devices
PIN and Password Authentication
Visual and Graphical Login
Biometrics
Authorization
File Masking
Access Control Lists
Role-based Access Control
Network Security
Wireless Security Protocols
2.Local access control to networks and network
services
WLAN
Bluetooth
Cellular Network…
3.Remote Network Access
Remote access VPN
4.Protection of Data Communication
Tips to secure the data on
mobile devices
Consider your real needs.
Make a trusty backup.
Ensure you're only carrying the data you
think you are.
Use encryption or a Virtual Private Network
(VPN).
Tips to ensure a secure Internet connection
everywhere—including at home
Disable your wireless Internet connection when not in
use.
Use secure wireless.
Make your home wireless network more secure.
Change the name of your “SSID” network and/or don’t
broadcast it.
Ensure you’re using a static IP address.
Enable your firewall.
Change the default admin password; make it longer and
more complex.
Only allow machines you know to connect to your
network by enabling MAC address filtering.
Wireless Application Security
Wireless application security includes
1. Application access control
2. Client/server communications security
3. Anti-malware protection
Wireless Application Security
Application Access Control
Mobile applications handling confidential
data should require user authentication
before application access is granted.
A limited inactive time is specified for an
application before re-authentication is
required.
Wireless Application Security
Client/Server Communication Security
Typical wireless Internet connections are:
1. The wireless connection between a mobile
device and an access device
2. The Internet connection between the mobile
device and the Internet host/server via the
access device.
For Web-based client/server applications, the SSL
protocol provides encryption and signing of
transmitted data.
Wireless Application Security
Anti-Malware Protection
Malware can access and steal application
data, such as credit card information stored
in memory by wireless applications.
Time and space for sensitive data in memory
should be minimized.
Privacy and Security Policies
Any discussion of security and device
management needs to acknowledge the
importance of employees' efforts toward
securing corporate data — especially
customer data.
IT needs to formulate and distribute clear,
concise security policies regarding access via
mobile devices.
Privacy and Security Policies
Conduct tests on a periodic basis to ensure
that the protections you've deployed worked,
and that your employees remain up-to-date on
their responsibilities when it comes to privacy
and security.
Case-Sybase
The largest enterprise software and services
company exclusively focused on managing
and mobilizing information.
With the global solutions, enterprises can
extend their information securely and make it
useful for people anywhere using any device.
Case-Sybase
Government Solutions
Information Technology, Management and
Mobile Solutions for Government Agencies
They offer complete government solutions in
four key areas:
1. Federal
2. State and Local
3. Homeland Security
4. Sybase Government Partners
Case-Sybase
Sybase Homeland Security Solutions
With the threat of terrorist attacks, homeland
security has become a major concern for all
individuals and organizations. Sybase
solutions help meet this agency’s security
objectives, and more.
Case-Sybase
Empowering field personnel with anywhere,
anytime access to critical information offers
many benefits, including:
Increased productivity and improved response time
Better information sharing and collaboration
between agencies
Error-free capture of data in a standardized format
Ability to maintain security and confidentiality of
critical data
Case-Sybase
Specific examples of Homeland Security
solutions we provide include:
Remote access to photos, documentation and other
vital statistics for field investigators
Onsite data collection for inspection of commercial
structures, bridges, roads, military equipment,
power lines and the nation's food supply
Information access for custom checkpoints ensuring
inspection of people, vehicles, packages and any
other items that may pose a security threat
Smart card identification and tracking of visitors at
secure locations
Future will forecast
1. Global information safe service market development
present situation and tendency
Future will forecast
2. Taiwan information security market
3. The new focus of enterprises funded protection for
mobile devices
4. Establishes set of motions work the security policy
a. Zero tolerance policy
b. The document remembered wants redact
c. Other protective measures
Conclusion
The advent of the World Wide Web
Electronically、Efficiently、Nonpaperness
the prevalent of notebook (laptop) and its high
frequency