Enviar pesquisa
Carregar
Mobile security
•
Transferir como PPTX, PDF
•
9 gostaram
•
19,768 visualizações
Basant Kumar
Seguir
Threats in mobile and it's security .
Leia menos
Leia mais
Tecnologia
Negócios
Denunciar
Compartilhar
Denunciar
Compartilhar
1 de 18
Baixar agora
Recomendados
Literature Survey on Mobile Database Tools
Literature Survey on Mobile Database Tools
Sisuru Kekiriwaragodage
Mobile / Nomadic Databse
Mobile / Nomadic Databse
Rahul Sharma
Mobile Database and Service Oriented Architecture
Mobile Database and Service Oriented Architecture
Lucas Jellema
Lecture 4 mobile database system
Lecture 4 mobile database system
salbiahhamzah
Mobile Database ,alrazgi
Mobile Database ,alrazgi
alrazgi
Mobile databases
Mobile databases
Harsh Behl
Mobile databases
Mobile databases
Dabbal Singh Mahara
Mobile dbms
Mobile dbms
Tech_MX
Recomendados
Literature Survey on Mobile Database Tools
Literature Survey on Mobile Database Tools
Sisuru Kekiriwaragodage
Mobile / Nomadic Databse
Mobile / Nomadic Databse
Rahul Sharma
Mobile Database and Service Oriented Architecture
Mobile Database and Service Oriented Architecture
Lucas Jellema
Lecture 4 mobile database system
Lecture 4 mobile database system
salbiahhamzah
Mobile Database ,alrazgi
Mobile Database ,alrazgi
alrazgi
Mobile databases
Mobile databases
Harsh Behl
Mobile databases
Mobile databases
Dabbal Singh Mahara
Mobile dbms
Mobile dbms
Tech_MX
Unit 1 - mobile computing introduction
Unit 1 - mobile computing introduction
Vintesh Patel
Architecture of Mobile Computing
Architecture of Mobile Computing
JAINIK PATEL
Mobile Computing Architecture
Mobile Computing Architecture
Trinity Dwarka
Overview of mobile computing
Overview of mobile computing
VENNILAV6
The internet & the new information technology infrastructure
The internet & the new information technology infrastructure
Prof. Othman Alsalloum
2
2
Ankit Anand
Distributed Systems, Mobile Computing and Security
Distributed Systems, Mobile Computing and Security
Department of Computer Science, Aalto University
Knowledge on IT Infrastructure
Knowledge on IT Infrastructure
Lopamudra Das
Sdn whitepaper
Sdn whitepaper
Hari Sasank
5 - Infrastructure and Cloud Computing
5 - Infrastructure and Cloud Computing
Raymond Gao
Company profile TriCoSys Solutions Private Limited
Company profile TriCoSys Solutions Private Limited
Subodh Deshpande
Mobile Computing Complete Introduction
Mobile Computing Complete Introduction
Denis R
Network administration Book
Network administration Book
Muhammad Jawwad Hashmi
Client server based computing
Client server based computing
Mohammad Affan
Mobile agents in a distributed multimedia dabase system(synopsis)
Mobile agents in a distributed multimedia dabase system(synopsis)
Mumbai Academisc
IT Infrastructure Project
IT Infrastructure Project
Robert D. Williams
Information technology infrastructures by- neo arya
Information technology infrastructures by- neo arya
neoarya2012
Prachi gupta 8 a
Prachi gupta 8 a
EashaGupta
Ict infrastructure management
Ict infrastructure management
Paramaguru Kandasamy
Computer communication network
Computer communication network
himz676987
Intra mart accel platform 2021winter-en
Intra mart accel platform 2021winter-en
NTTDATA INTRAMART
IOT in 5G Training and Certification by TELCOMA Global
IOT in 5G Training and Certification by TELCOMA Global
Gaganpreet Singh Walia
Mais conteúdo relacionado
Mais procurados
Unit 1 - mobile computing introduction
Unit 1 - mobile computing introduction
Vintesh Patel
Architecture of Mobile Computing
Architecture of Mobile Computing
JAINIK PATEL
Mobile Computing Architecture
Mobile Computing Architecture
Trinity Dwarka
Overview of mobile computing
Overview of mobile computing
VENNILAV6
The internet & the new information technology infrastructure
The internet & the new information technology infrastructure
Prof. Othman Alsalloum
2
2
Ankit Anand
Distributed Systems, Mobile Computing and Security
Distributed Systems, Mobile Computing and Security
Department of Computer Science, Aalto University
Knowledge on IT Infrastructure
Knowledge on IT Infrastructure
Lopamudra Das
Sdn whitepaper
Sdn whitepaper
Hari Sasank
5 - Infrastructure and Cloud Computing
5 - Infrastructure and Cloud Computing
Raymond Gao
Company profile TriCoSys Solutions Private Limited
Company profile TriCoSys Solutions Private Limited
Subodh Deshpande
Mobile Computing Complete Introduction
Mobile Computing Complete Introduction
Denis R
Network administration Book
Network administration Book
Muhammad Jawwad Hashmi
Client server based computing
Client server based computing
Mohammad Affan
Mobile agents in a distributed multimedia dabase system(synopsis)
Mobile agents in a distributed multimedia dabase system(synopsis)
Mumbai Academisc
IT Infrastructure Project
IT Infrastructure Project
Robert D. Williams
Information technology infrastructures by- neo arya
Information technology infrastructures by- neo arya
neoarya2012
Prachi gupta 8 a
Prachi gupta 8 a
EashaGupta
Ict infrastructure management
Ict infrastructure management
Paramaguru Kandasamy
Computer communication network
Computer communication network
himz676987
Mais procurados
(20)
Unit 1 - mobile computing introduction
Unit 1 - mobile computing introduction
Architecture of Mobile Computing
Architecture of Mobile Computing
Mobile Computing Architecture
Mobile Computing Architecture
Overview of mobile computing
Overview of mobile computing
The internet & the new information technology infrastructure
The internet & the new information technology infrastructure
2
2
Distributed Systems, Mobile Computing and Security
Distributed Systems, Mobile Computing and Security
Knowledge on IT Infrastructure
Knowledge on IT Infrastructure
Sdn whitepaper
Sdn whitepaper
5 - Infrastructure and Cloud Computing
5 - Infrastructure and Cloud Computing
Company profile TriCoSys Solutions Private Limited
Company profile TriCoSys Solutions Private Limited
Mobile Computing Complete Introduction
Mobile Computing Complete Introduction
Network administration Book
Network administration Book
Client server based computing
Client server based computing
Mobile agents in a distributed multimedia dabase system(synopsis)
Mobile agents in a distributed multimedia dabase system(synopsis)
IT Infrastructure Project
IT Infrastructure Project
Information technology infrastructures by- neo arya
Information technology infrastructures by- neo arya
Prachi gupta 8 a
Prachi gupta 8 a
Ict infrastructure management
Ict infrastructure management
Computer communication network
Computer communication network
Semelhante a Mobile security
Intra mart accel platform 2021winter-en
Intra mart accel platform 2021winter-en
NTTDATA INTRAMART
IOT in 5G Training and Certification by TELCOMA Global
IOT in 5G Training and Certification by TELCOMA Global
Gaganpreet Singh Walia
IOT in 5G Training and Certification by TELCOMA Global
IOT in 5G Training and Certification by TELCOMA Global
Gaganpreet Singh Walia
Decision to offload the task to Cloud for increasing energy efficiency of Mob...
Decision to offload the task to Cloud for increasing energy efficiency of Mob...
IRJET Journal
Mobile security
Mobile security
SanjaySharma1059
Assessment to Delegate the Task to Cloud for Increasing Energy Efficiency of ...
Assessment to Delegate the Task to Cloud for Increasing Energy Efficiency of ...
IRJET Journal
Cisco Connect Vancouver 2017 - Optimizing your client's wi fi experience
Cisco Connect Vancouver 2017 - Optimizing your client's wi fi experience
Cisco Canada
802.11 Wireless LAN Vulnerability Assessment (ITSPSR-21A)
802.11 Wireless LAN Vulnerability Assessment (ITSPSR-21A)
Sunghun Kim
Sudhakar Resume
Sudhakar Resume
Sudhakar Singh
Securing Network-Attached HSMs: The SafeNet Luna SA Three-Layer Authenticatio...
Securing Network-Attached HSMs: The SafeNet Luna SA Three-Layer Authenticatio...
SafeNet
Sangfor SSL VPN Brochure
Sangfor SSL VPN Brochure
Sangfor Technologies USA
IEEE 2014 NS2 Projects
IEEE 2014 NS2 Projects
Vijay Karan
IEEE 2014 NS2 Projects
IEEE 2014 NS2 Projects
Vijay Karan
Week 7 lecture material
Week 7 lecture material
Ankit Gupta
Telco Private Clouds - The RISE and SHINE
Telco Private Clouds - The RISE and SHINE
Imad Ayad
What SD-WAN Means for Enterprise
What SD-WAN Means for Enterprise
Toshal Dudhwala
Advanced Integrated Communication System
Advanced Integrated Communication System
Mayank Srivastava
Net motion mobility_intro_overview
Net motion mobility_intro_overview
Stef Coetzee
Mobile Backend as a Service via Cloud Foundry
Mobile Backend as a Service via Cloud Foundry
天青 王
Running head NETWORK INFRASTRUCTURE AND SECURITY 1NETWOR.docx
Running head NETWORK INFRASTRUCTURE AND SECURITY 1NETWOR.docx
todd581
Semelhante a Mobile security
(20)
Intra mart accel platform 2021winter-en
Intra mart accel platform 2021winter-en
IOT in 5G Training and Certification by TELCOMA Global
IOT in 5G Training and Certification by TELCOMA Global
IOT in 5G Training and Certification by TELCOMA Global
IOT in 5G Training and Certification by TELCOMA Global
Decision to offload the task to Cloud for increasing energy efficiency of Mob...
Decision to offload the task to Cloud for increasing energy efficiency of Mob...
Mobile security
Mobile security
Assessment to Delegate the Task to Cloud for Increasing Energy Efficiency of ...
Assessment to Delegate the Task to Cloud for Increasing Energy Efficiency of ...
Cisco Connect Vancouver 2017 - Optimizing your client's wi fi experience
Cisco Connect Vancouver 2017 - Optimizing your client's wi fi experience
802.11 Wireless LAN Vulnerability Assessment (ITSPSR-21A)
802.11 Wireless LAN Vulnerability Assessment (ITSPSR-21A)
Sudhakar Resume
Sudhakar Resume
Securing Network-Attached HSMs: The SafeNet Luna SA Three-Layer Authenticatio...
Securing Network-Attached HSMs: The SafeNet Luna SA Three-Layer Authenticatio...
Sangfor SSL VPN Brochure
Sangfor SSL VPN Brochure
IEEE 2014 NS2 Projects
IEEE 2014 NS2 Projects
IEEE 2014 NS2 Projects
IEEE 2014 NS2 Projects
Week 7 lecture material
Week 7 lecture material
Telco Private Clouds - The RISE and SHINE
Telco Private Clouds - The RISE and SHINE
What SD-WAN Means for Enterprise
What SD-WAN Means for Enterprise
Advanced Integrated Communication System
Advanced Integrated Communication System
Net motion mobility_intro_overview
Net motion mobility_intro_overview
Mobile Backend as a Service via Cloud Foundry
Mobile Backend as a Service via Cloud Foundry
Running head NETWORK INFRASTRUCTURE AND SECURITY 1NETWOR.docx
Running head NETWORK INFRASTRUCTURE AND SECURITY 1NETWOR.docx
Último
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
ThousandEyes
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
LoriGlavin3
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
Wes McKinney
A Framework for Development in the AI Age
A Framework for Development in the AI Age
Cprime
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
IES VE
How to write a Business Continuity Plan
How to write a Business Continuity Plan
Databarracks
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
marketing932765
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
itnewsafrica
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
Inflectra
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
Kari Kakkonen
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
LoriGlavin3
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
Pixlogix Infotech
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
LoriGlavin3
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
Mydbops
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
LoriGlavin3
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
itnewsafrica
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
Ravi Sanghani
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
Farhan Tariq
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
Hiroshi SHIBATA
Último
(20)
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
A Framework for Development in the AI Age
A Framework for Development in the AI Age
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
How to write a Business Continuity Plan
How to write a Business Continuity Plan
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
Mobile security
1.
Prepared by,
BASANT KUMAR 0801216257 CSE 1 © NOKIA mobile-security.PPT/ 11/12/2011 / N.Asokan (NRC/COM)
2.
2
© NOKIA mobile-security.PPT/ 11/12/2011 / N.Asokan (NRC/COM)
3.
3
© NOKIA mobile-security.PPT/ 11/12/2011 / N.Asokan (NRC/COM)
4.
4
© NOKIA mobile-security.PPT/ 11/12/2011 / N.Asokan (NRC/COM)
5.
• Mobile users
must be able to work without a wireless connection due to poor or even non-existent connections. • Applications must be able to access local device/vehicle hardware, such as printers, bar code scanners, or GPS units (for mapping or Automatic Vehicle Location systems). • Bandwidth must be conserved (a common requirement on wireless networks that charge per megabyte or data transferred). 5 © NOKIA mobile-security.PPT/ 11/12/2011 / N.Asokan (NRC/COM)
6.
6
© NOKIA mobile-security.PPT/ 11/12/2011 / N.Asokan (NRC/COM)
7.
7
© NOKIA mobile-security.PPT/ 11/12/2011 / N.Asokan (NRC/COM)
8.
8
© NOKIA mobile-security.PPT/ 11/12/2011 / N.Asokan (NRC/COM)
9.
9
© NOKIA mobile-security.PPT/ 11/12/2011 / N.Asokan (NRC/COM)
10.
10
© NOKIA mobile-security.PPT/ 11/12/2011 / N.Asokan (NRC/COM)
11.
11
© NOKIA mobile-security.PPT/ 11/12/2011 / N.Asokan (NRC/COM)
12.
12
© NOKIA mobile-security.PPT/ 11/12/2011 / N.Asokan (NRC/COM)
13.
• Location Dependent
Data (LDD):- The class of data whose value is functionally dependent on location. Thus the value of location determines the correct value of data. Ex- City tax, City area. • Location Independent Data (LID):- The class of data whose value is functionally independent on location. Thus the value of location does not determines the correct value of data. Ex- Person name , account nuber. 13 © NOKIA mobile-security.PPT/ 11/12/2011 / N.Asokan (NRC/COM)
14.
14
© NOKIA mobile-security.PPT/ 11/12/2011 / N.Asokan (NRC/COM)
15.
• The mobile
database and the central database have to be synchronized at specific times. We have selected the secure http protocol (https) to perform the necessary synchronization operations between the mobile and the central database. More precisely we use https with server and client authentication. This choice assures: – Confidentiality of the data that is transferred. – Authentication of the server computer. – Authentication of the client computer. 15 © NOKIA mobile-security.PPT/ 11/12/2011 / N.Asokan (NRC/COM)
16.
The local database
on the mobile device is encrypted and each time the user opens the mobile database, he has to enter his password. In case the mobile device is stolen or violated by an intruder, the data that is stored on the local database is not readable. The encryption algorithm is part of SQL Server Mobile Edition and unfortunately we were not able to find documentation for the specific algorithm. 16 © NOKIA mobile-security.PPT/ 11/12/2011 / N.Asokan (NRC/COM)
17.
For authoring operations,
each user has access only to his own data. A set of database triggers implemented in the database server, check that the data manipulation operations of the user are valid. This check prevents all users from accidental or malicious modifications of data for which they have no authorization. More precisely, an author – can create new announcements that are signed with his name, – can delete or update announcements that are signed with his name, and – has no access to announcements created/signed by other users. 17 © NOKIA mobile-security.PPT/ 11/12/2011 / N.Asokan (NRC/COM)
18.
18
© NOKIA mobile-security.PPT/ 11/12/2011 / N.Asokan (NRC/COM)
Baixar agora