Enviar pesquisa
Carregar
Mobile security
•
Transferir como PPTX, PDF
•
9 gostaram
•
19,768 visualizações
Basant Kumar
Seguir
Threats in mobile and it's security .
Leia menos
Leia mais
Tecnologia
Negócios
Denunciar
Compartilhar
Denunciar
Compartilhar
1 de 18
Baixar agora
Recomendados
Literature Survey on Mobile Database Tools
Literature Survey on Mobile Database Tools
Sisuru Kekiriwaragodage
Mobile / Nomadic Databse
Mobile / Nomadic Databse
Rahul Sharma
Mobile Database and Service Oriented Architecture
Mobile Database and Service Oriented Architecture
Lucas Jellema
Lecture 4 mobile database system
Lecture 4 mobile database system
salbiahhamzah
Mobile Database ,alrazgi
Mobile Database ,alrazgi
alrazgi
Mobile databases
Mobile databases
Harsh Behl
Mobile databases
Mobile databases
Dabbal Singh Mahara
Mobile dbms
Mobile dbms
Tech_MX
Recomendados
Literature Survey on Mobile Database Tools
Literature Survey on Mobile Database Tools
Sisuru Kekiriwaragodage
Mobile / Nomadic Databse
Mobile / Nomadic Databse
Rahul Sharma
Mobile Database and Service Oriented Architecture
Mobile Database and Service Oriented Architecture
Lucas Jellema
Lecture 4 mobile database system
Lecture 4 mobile database system
salbiahhamzah
Mobile Database ,alrazgi
Mobile Database ,alrazgi
alrazgi
Mobile databases
Mobile databases
Harsh Behl
Mobile databases
Mobile databases
Dabbal Singh Mahara
Mobile dbms
Mobile dbms
Tech_MX
Unit 1 - mobile computing introduction
Unit 1 - mobile computing introduction
Vintesh Patel
Architecture of Mobile Computing
Architecture of Mobile Computing
JAINIK PATEL
Mobile Computing Architecture
Mobile Computing Architecture
Trinity Dwarka
Overview of mobile computing
Overview of mobile computing
VENNILAV6
The internet & the new information technology infrastructure
The internet & the new information technology infrastructure
Prof. Othman Alsalloum
2
2
Ankit Anand
Distributed Systems, Mobile Computing and Security
Distributed Systems, Mobile Computing and Security
Department of Computer Science, Aalto University
Knowledge on IT Infrastructure
Knowledge on IT Infrastructure
Lopamudra Das
Sdn whitepaper
Sdn whitepaper
Hari Sasank
5 - Infrastructure and Cloud Computing
5 - Infrastructure and Cloud Computing
Raymond Gao
Company profile TriCoSys Solutions Private Limited
Company profile TriCoSys Solutions Private Limited
Subodh Deshpande
Mobile Computing Complete Introduction
Mobile Computing Complete Introduction
Denis R
Network administration Book
Network administration Book
Muhammad Jawwad Hashmi
Client server based computing
Client server based computing
Mohammad Affan
Mobile agents in a distributed multimedia dabase system(synopsis)
Mobile agents in a distributed multimedia dabase system(synopsis)
Mumbai Academisc
IT Infrastructure Project
IT Infrastructure Project
Robert D. Williams
Information technology infrastructures by- neo arya
Information technology infrastructures by- neo arya
neoarya2012
Prachi gupta 8 a
Prachi gupta 8 a
EashaGupta
Ict infrastructure management
Ict infrastructure management
Paramaguru Kandasamy
Computer communication network
Computer communication network
himz676987
Intra mart accel platform 2021winter-en
Intra mart accel platform 2021winter-en
NTTDATA INTRAMART
IOT in 5G Training and Certification by TELCOMA Global
IOT in 5G Training and Certification by TELCOMA Global
Gaganpreet Singh Walia
Mais conteúdo relacionado
Mais procurados
Unit 1 - mobile computing introduction
Unit 1 - mobile computing introduction
Vintesh Patel
Architecture of Mobile Computing
Architecture of Mobile Computing
JAINIK PATEL
Mobile Computing Architecture
Mobile Computing Architecture
Trinity Dwarka
Overview of mobile computing
Overview of mobile computing
VENNILAV6
The internet & the new information technology infrastructure
The internet & the new information technology infrastructure
Prof. Othman Alsalloum
2
2
Ankit Anand
Distributed Systems, Mobile Computing and Security
Distributed Systems, Mobile Computing and Security
Department of Computer Science, Aalto University
Knowledge on IT Infrastructure
Knowledge on IT Infrastructure
Lopamudra Das
Sdn whitepaper
Sdn whitepaper
Hari Sasank
5 - Infrastructure and Cloud Computing
5 - Infrastructure and Cloud Computing
Raymond Gao
Company profile TriCoSys Solutions Private Limited
Company profile TriCoSys Solutions Private Limited
Subodh Deshpande
Mobile Computing Complete Introduction
Mobile Computing Complete Introduction
Denis R
Network administration Book
Network administration Book
Muhammad Jawwad Hashmi
Client server based computing
Client server based computing
Mohammad Affan
Mobile agents in a distributed multimedia dabase system(synopsis)
Mobile agents in a distributed multimedia dabase system(synopsis)
Mumbai Academisc
IT Infrastructure Project
IT Infrastructure Project
Robert D. Williams
Information technology infrastructures by- neo arya
Information technology infrastructures by- neo arya
neoarya2012
Prachi gupta 8 a
Prachi gupta 8 a
EashaGupta
Ict infrastructure management
Ict infrastructure management
Paramaguru Kandasamy
Computer communication network
Computer communication network
himz676987
Mais procurados
(20)
Unit 1 - mobile computing introduction
Unit 1 - mobile computing introduction
Architecture of Mobile Computing
Architecture of Mobile Computing
Mobile Computing Architecture
Mobile Computing Architecture
Overview of mobile computing
Overview of mobile computing
The internet & the new information technology infrastructure
The internet & the new information technology infrastructure
2
2
Distributed Systems, Mobile Computing and Security
Distributed Systems, Mobile Computing and Security
Knowledge on IT Infrastructure
Knowledge on IT Infrastructure
Sdn whitepaper
Sdn whitepaper
5 - Infrastructure and Cloud Computing
5 - Infrastructure and Cloud Computing
Company profile TriCoSys Solutions Private Limited
Company profile TriCoSys Solutions Private Limited
Mobile Computing Complete Introduction
Mobile Computing Complete Introduction
Network administration Book
Network administration Book
Client server based computing
Client server based computing
Mobile agents in a distributed multimedia dabase system(synopsis)
Mobile agents in a distributed multimedia dabase system(synopsis)
IT Infrastructure Project
IT Infrastructure Project
Information technology infrastructures by- neo arya
Information technology infrastructures by- neo arya
Prachi gupta 8 a
Prachi gupta 8 a
Ict infrastructure management
Ict infrastructure management
Computer communication network
Computer communication network
Semelhante a Mobile security
Intra mart accel platform 2021winter-en
Intra mart accel platform 2021winter-en
NTTDATA INTRAMART
IOT in 5G Training and Certification by TELCOMA Global
IOT in 5G Training and Certification by TELCOMA Global
Gaganpreet Singh Walia
IOT in 5G Training and Certification by TELCOMA Global
IOT in 5G Training and Certification by TELCOMA Global
Gaganpreet Singh Walia
Decision to offload the task to Cloud for increasing energy efficiency of Mob...
Decision to offload the task to Cloud for increasing energy efficiency of Mob...
IRJET Journal
Mobile security
Mobile security
SanjaySharma1059
Assessment to Delegate the Task to Cloud for Increasing Energy Efficiency of ...
Assessment to Delegate the Task to Cloud for Increasing Energy Efficiency of ...
IRJET Journal
Cisco Connect Vancouver 2017 - Optimizing your client's wi fi experience
Cisco Connect Vancouver 2017 - Optimizing your client's wi fi experience
Cisco Canada
802.11 Wireless LAN Vulnerability Assessment (ITSPSR-21A)
802.11 Wireless LAN Vulnerability Assessment (ITSPSR-21A)
Sunghun Kim
Sudhakar Resume
Sudhakar Resume
Sudhakar Singh
Securing Network-Attached HSMs: The SafeNet Luna SA Three-Layer Authenticatio...
Securing Network-Attached HSMs: The SafeNet Luna SA Three-Layer Authenticatio...
SafeNet
Sangfor SSL VPN Brochure
Sangfor SSL VPN Brochure
Sangfor Technologies USA
IEEE 2014 NS2 Projects
IEEE 2014 NS2 Projects
Vijay Karan
IEEE 2014 NS2 Projects
IEEE 2014 NS2 Projects
Vijay Karan
Week 7 lecture material
Week 7 lecture material
Ankit Gupta
Telco Private Clouds - The RISE and SHINE
Telco Private Clouds - The RISE and SHINE
Imad Ayad
What SD-WAN Means for Enterprise
What SD-WAN Means for Enterprise
Toshal Dudhwala
Advanced Integrated Communication System
Advanced Integrated Communication System
Mayank Srivastava
Net motion mobility_intro_overview
Net motion mobility_intro_overview
Stef Coetzee
Mobile Backend as a Service via Cloud Foundry
Mobile Backend as a Service via Cloud Foundry
天青 王
Running head NETWORK INFRASTRUCTURE AND SECURITY 1NETWOR.docx
Running head NETWORK INFRASTRUCTURE AND SECURITY 1NETWOR.docx
todd581
Semelhante a Mobile security
(20)
Intra mart accel platform 2021winter-en
Intra mart accel platform 2021winter-en
IOT in 5G Training and Certification by TELCOMA Global
IOT in 5G Training and Certification by TELCOMA Global
IOT in 5G Training and Certification by TELCOMA Global
IOT in 5G Training and Certification by TELCOMA Global
Decision to offload the task to Cloud for increasing energy efficiency of Mob...
Decision to offload the task to Cloud for increasing energy efficiency of Mob...
Mobile security
Mobile security
Assessment to Delegate the Task to Cloud for Increasing Energy Efficiency of ...
Assessment to Delegate the Task to Cloud for Increasing Energy Efficiency of ...
Cisco Connect Vancouver 2017 - Optimizing your client's wi fi experience
Cisco Connect Vancouver 2017 - Optimizing your client's wi fi experience
802.11 Wireless LAN Vulnerability Assessment (ITSPSR-21A)
802.11 Wireless LAN Vulnerability Assessment (ITSPSR-21A)
Sudhakar Resume
Sudhakar Resume
Securing Network-Attached HSMs: The SafeNet Luna SA Three-Layer Authenticatio...
Securing Network-Attached HSMs: The SafeNet Luna SA Three-Layer Authenticatio...
Sangfor SSL VPN Brochure
Sangfor SSL VPN Brochure
IEEE 2014 NS2 Projects
IEEE 2014 NS2 Projects
IEEE 2014 NS2 Projects
IEEE 2014 NS2 Projects
Week 7 lecture material
Week 7 lecture material
Telco Private Clouds - The RISE and SHINE
Telco Private Clouds - The RISE and SHINE
What SD-WAN Means for Enterprise
What SD-WAN Means for Enterprise
Advanced Integrated Communication System
Advanced Integrated Communication System
Net motion mobility_intro_overview
Net motion mobility_intro_overview
Mobile Backend as a Service via Cloud Foundry
Mobile Backend as a Service via Cloud Foundry
Running head NETWORK INFRASTRUCTURE AND SECURITY 1NETWOR.docx
Running head NETWORK INFRASTRUCTURE AND SECURITY 1NETWOR.docx
Último
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
DianaGray10
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
BookNet Canada
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
Commit University
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
LoriGlavin3
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
Addepto
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
BkGupta21
Training state-of-the-art general text embedding
Training state-of-the-art general text embedding
Zilliz
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
Pixlogix Infotech
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
Alex Barbosa Coqueiro
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
Nathaniel Shimoni
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
Rick Flair
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
Raghuram Pandurangan
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????
blackmambaettijean
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
Fwdays
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
BookNet Canada
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
LoriGlavin3
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
Fwdays
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
LoriGlavin3
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Mark Simos
Último
(20)
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
Training state-of-the-art general text embedding
Training state-of-the-art general text embedding
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Mobile security
1.
Prepared by,
BASANT KUMAR 0801216257 CSE 1 © NOKIA mobile-security.PPT/ 11/12/2011 / N.Asokan (NRC/COM)
2.
2
© NOKIA mobile-security.PPT/ 11/12/2011 / N.Asokan (NRC/COM)
3.
3
© NOKIA mobile-security.PPT/ 11/12/2011 / N.Asokan (NRC/COM)
4.
4
© NOKIA mobile-security.PPT/ 11/12/2011 / N.Asokan (NRC/COM)
5.
• Mobile users
must be able to work without a wireless connection due to poor or even non-existent connections. • Applications must be able to access local device/vehicle hardware, such as printers, bar code scanners, or GPS units (for mapping or Automatic Vehicle Location systems). • Bandwidth must be conserved (a common requirement on wireless networks that charge per megabyte or data transferred). 5 © NOKIA mobile-security.PPT/ 11/12/2011 / N.Asokan (NRC/COM)
6.
6
© NOKIA mobile-security.PPT/ 11/12/2011 / N.Asokan (NRC/COM)
7.
7
© NOKIA mobile-security.PPT/ 11/12/2011 / N.Asokan (NRC/COM)
8.
8
© NOKIA mobile-security.PPT/ 11/12/2011 / N.Asokan (NRC/COM)
9.
9
© NOKIA mobile-security.PPT/ 11/12/2011 / N.Asokan (NRC/COM)
10.
10
© NOKIA mobile-security.PPT/ 11/12/2011 / N.Asokan (NRC/COM)
11.
11
© NOKIA mobile-security.PPT/ 11/12/2011 / N.Asokan (NRC/COM)
12.
12
© NOKIA mobile-security.PPT/ 11/12/2011 / N.Asokan (NRC/COM)
13.
• Location Dependent
Data (LDD):- The class of data whose value is functionally dependent on location. Thus the value of location determines the correct value of data. Ex- City tax, City area. • Location Independent Data (LID):- The class of data whose value is functionally independent on location. Thus the value of location does not determines the correct value of data. Ex- Person name , account nuber. 13 © NOKIA mobile-security.PPT/ 11/12/2011 / N.Asokan (NRC/COM)
14.
14
© NOKIA mobile-security.PPT/ 11/12/2011 / N.Asokan (NRC/COM)
15.
• The mobile
database and the central database have to be synchronized at specific times. We have selected the secure http protocol (https) to perform the necessary synchronization operations between the mobile and the central database. More precisely we use https with server and client authentication. This choice assures: – Confidentiality of the data that is transferred. – Authentication of the server computer. – Authentication of the client computer. 15 © NOKIA mobile-security.PPT/ 11/12/2011 / N.Asokan (NRC/COM)
16.
The local database
on the mobile device is encrypted and each time the user opens the mobile database, he has to enter his password. In case the mobile device is stolen or violated by an intruder, the data that is stored on the local database is not readable. The encryption algorithm is part of SQL Server Mobile Edition and unfortunately we were not able to find documentation for the specific algorithm. 16 © NOKIA mobile-security.PPT/ 11/12/2011 / N.Asokan (NRC/COM)
17.
For authoring operations,
each user has access only to his own data. A set of database triggers implemented in the database server, check that the data manipulation operations of the user are valid. This check prevents all users from accidental or malicious modifications of data for which they have no authorization. More precisely, an author – can create new announcements that are signed with his name, – can delete or update announcements that are signed with his name, and – has no access to announcements created/signed by other users. 17 © NOKIA mobile-security.PPT/ 11/12/2011 / N.Asokan (NRC/COM)
18.
18
© NOKIA mobile-security.PPT/ 11/12/2011 / N.Asokan (NRC/COM)
Baixar agora