SlideShare uma empresa Scribd logo
1 de 18
Prepared by,
                                                                     BASANT KUMAR
                                                                     0801216257
                                                                     CSE

1   © NOKIA   mobile-security.PPT/ 11/12/2011 / N.Asokan (NRC/COM)
2   © NOKIA   mobile-security.PPT/ 11/12/2011 / N.Asokan (NRC/COM)
3   © NOKIA   mobile-security.PPT/ 11/12/2011 / N.Asokan (NRC/COM)
4   © NOKIA   mobile-security.PPT/ 11/12/2011 / N.Asokan (NRC/COM)
• Mobile users must be able to work
      without a wireless connection due to poor
      or even non-existent connections.
    • Applications must be able to access local
      device/vehicle hardware, such as printers,
      bar code scanners, or GPS units (for
      mapping or Automatic Vehicle Location
      systems).
    • Bandwidth must be conserved (a common
      requirement on wireless networks that
      charge per megabyte or data transferred).

5   © NOKIA   mobile-security.PPT/ 11/12/2011 / N.Asokan (NRC/COM)
6   © NOKIA   mobile-security.PPT/ 11/12/2011 / N.Asokan (NRC/COM)
7   © NOKIA   mobile-security.PPT/ 11/12/2011 / N.Asokan (NRC/COM)
8   © NOKIA   mobile-security.PPT/ 11/12/2011 / N.Asokan (NRC/COM)
9   © NOKIA   mobile-security.PPT/ 11/12/2011 / N.Asokan (NRC/COM)
10   © NOKIA   mobile-security.PPT/ 11/12/2011 / N.Asokan (NRC/COM)
11   © NOKIA   mobile-security.PPT/ 11/12/2011 / N.Asokan (NRC/COM)
12   © NOKIA   mobile-security.PPT/ 11/12/2011 / N.Asokan (NRC/COM)
• Location Dependent Data (LDD):- The class of data
       whose value is functionally dependent on location.
       Thus the value of location determines the correct
       value of data. Ex- City tax, City area.
     • Location Independent Data (LID):- The class of data
       whose value is functionally independent on location.
       Thus the value of location does not determines the
       correct value of data. Ex- Person name , account
       nuber.




13   © NOKIA   mobile-security.PPT/ 11/12/2011 / N.Asokan (NRC/COM)
14   © NOKIA   mobile-security.PPT/ 11/12/2011 / N.Asokan (NRC/COM)
• The mobile database and the central database have to be
       synchronized at specific times. We have selected the secure
       http protocol (https) to perform the necessary synchronization
       operations between the mobile and the central database. More
       precisely we use https with server and client authentication.
       This choice assures:
               – Confidentiality of the data that is transferred.
               – Authentication of the server computer.
               – Authentication of the client computer.




15   © NOKIA   mobile-security.PPT/ 11/12/2011 / N.Asokan (NRC/COM)
The local database on the mobile device is encrypted and each
     time the user opens the mobile database, he has to enter his
     password. In case the mobile device is stolen or violated by an
     intruder, the data that is stored on the local database is not
     readable. The encryption algorithm is part of SQL Server Mobile
     Edition and unfortunately we were not able to find documentation
     for the specific algorithm.




16   © NOKIA   mobile-security.PPT/ 11/12/2011 / N.Asokan (NRC/COM)
For authoring operations, each user has access only to his own data. A set of

     database triggers implemented in the database server, check that the data

     manipulation operations of the user are valid. This check prevents all users from

     accidental or malicious modifications of data for which they have no authorization.

     More precisely, an author

               – can create new announcements that are signed with his name,

               – can delete or update announcements that are signed with his name, and

               – has no access to announcements created/signed by other users.



17   © NOKIA   mobile-security.PPT/ 11/12/2011 / N.Asokan (NRC/COM)
18   © NOKIA   mobile-security.PPT/ 11/12/2011 / N.Asokan (NRC/COM)

Mais conteúdo relacionado

Mais procurados

Unit 1 - mobile computing introduction
Unit 1 - mobile computing introductionUnit 1 - mobile computing introduction
Unit 1 - mobile computing introductionVintesh Patel
 
Architecture of Mobile Computing
Architecture of Mobile ComputingArchitecture of Mobile Computing
Architecture of Mobile ComputingJAINIK PATEL
 
Mobile Computing Architecture
Mobile Computing ArchitectureMobile Computing Architecture
Mobile Computing ArchitectureTrinity Dwarka
 
Overview of mobile computing
Overview of mobile computingOverview of mobile computing
Overview of mobile computingVENNILAV6
 
The internet & the new information technology infrastructure
The internet & the new information technology infrastructureThe internet & the new information technology infrastructure
The internet & the new information technology infrastructureProf. Othman Alsalloum
 
Knowledge on IT Infrastructure
Knowledge on IT InfrastructureKnowledge on IT Infrastructure
Knowledge on IT InfrastructureLopamudra Das
 
5 - Infrastructure and Cloud Computing
5 - Infrastructure and Cloud Computing5 - Infrastructure and Cloud Computing
5 - Infrastructure and Cloud ComputingRaymond Gao
 
Company profile TriCoSys Solutions Private Limited
Company profile TriCoSys Solutions Private LimitedCompany profile TriCoSys Solutions Private Limited
Company profile TriCoSys Solutions Private LimitedSubodh Deshpande
 
Mobile Computing Complete Introduction
Mobile Computing Complete IntroductionMobile Computing Complete Introduction
Mobile Computing Complete IntroductionDenis R
 
Client server based computing
Client server based computingClient server based computing
Client server based computingMohammad Affan
 
Mobile agents in a distributed multimedia dabase system(synopsis)
Mobile agents in a distributed multimedia dabase system(synopsis)Mobile agents in a distributed multimedia dabase system(synopsis)
Mobile agents in a distributed multimedia dabase system(synopsis)Mumbai Academisc
 
Information technology infrastructures by- neo arya
Information technology infrastructures by- neo aryaInformation technology infrastructures by- neo arya
Information technology infrastructures by- neo aryaneoarya2012
 
Prachi gupta 8 a
Prachi gupta 8 aPrachi gupta 8 a
Prachi gupta 8 aEashaGupta
 
Computer communication network
Computer communication networkComputer communication network
Computer communication networkhimz676987
 

Mais procurados (20)

Unit 1 - mobile computing introduction
Unit 1 - mobile computing introductionUnit 1 - mobile computing introduction
Unit 1 - mobile computing introduction
 
Architecture of Mobile Computing
Architecture of Mobile ComputingArchitecture of Mobile Computing
Architecture of Mobile Computing
 
Mobile Computing Architecture
Mobile Computing ArchitectureMobile Computing Architecture
Mobile Computing Architecture
 
Overview of mobile computing
Overview of mobile computingOverview of mobile computing
Overview of mobile computing
 
The internet & the new information technology infrastructure
The internet & the new information technology infrastructureThe internet & the new information technology infrastructure
The internet & the new information technology infrastructure
 
2
22
2
 
Distributed Systems, Mobile Computing and Security
Distributed Systems, Mobile Computing and SecurityDistributed Systems, Mobile Computing and Security
Distributed Systems, Mobile Computing and Security
 
Knowledge on IT Infrastructure
Knowledge on IT InfrastructureKnowledge on IT Infrastructure
Knowledge on IT Infrastructure
 
Sdn whitepaper
Sdn whitepaperSdn whitepaper
Sdn whitepaper
 
5 - Infrastructure and Cloud Computing
5 - Infrastructure and Cloud Computing5 - Infrastructure and Cloud Computing
5 - Infrastructure and Cloud Computing
 
Company profile TriCoSys Solutions Private Limited
Company profile TriCoSys Solutions Private LimitedCompany profile TriCoSys Solutions Private Limited
Company profile TriCoSys Solutions Private Limited
 
Mobile Computing Complete Introduction
Mobile Computing Complete IntroductionMobile Computing Complete Introduction
Mobile Computing Complete Introduction
 
Network administration Book
Network administration BookNetwork administration Book
Network administration Book
 
Client server based computing
Client server based computingClient server based computing
Client server based computing
 
Mobile agents in a distributed multimedia dabase system(synopsis)
Mobile agents in a distributed multimedia dabase system(synopsis)Mobile agents in a distributed multimedia dabase system(synopsis)
Mobile agents in a distributed multimedia dabase system(synopsis)
 
IT Infrastructure Project
IT Infrastructure ProjectIT Infrastructure Project
IT Infrastructure Project
 
Information technology infrastructures by- neo arya
Information technology infrastructures by- neo aryaInformation technology infrastructures by- neo arya
Information technology infrastructures by- neo arya
 
Prachi gupta 8 a
Prachi gupta 8 aPrachi gupta 8 a
Prachi gupta 8 a
 
Ict infrastructure management
Ict infrastructure managementIct infrastructure management
Ict infrastructure management
 
Computer communication network
Computer communication networkComputer communication network
Computer communication network
 

Semelhante a Mobile security

Intra mart accel platform 2021winter-en
Intra mart accel platform 2021winter-enIntra mart accel platform 2021winter-en
Intra mart accel platform 2021winter-enNTTDATA INTRAMART
 
IOT in 5G Training and Certification by TELCOMA Global
IOT in 5G Training and Certification by TELCOMA GlobalIOT in 5G Training and Certification by TELCOMA Global
IOT in 5G Training and Certification by TELCOMA GlobalGaganpreet Singh Walia
 
IOT in 5G Training and Certification by TELCOMA Global
IOT in 5G Training and Certification by TELCOMA GlobalIOT in 5G Training and Certification by TELCOMA Global
IOT in 5G Training and Certification by TELCOMA GlobalGaganpreet Singh Walia
 
Decision to offload the task to Cloud for increasing energy efficiency of Mob...
Decision to offload the task to Cloud for increasing energy efficiency of Mob...Decision to offload the task to Cloud for increasing energy efficiency of Mob...
Decision to offload the task to Cloud for increasing energy efficiency of Mob...IRJET Journal
 
Assessment to Delegate the Task to Cloud for Increasing Energy Efficiency of ...
Assessment to Delegate the Task to Cloud for Increasing Energy Efficiency of ...Assessment to Delegate the Task to Cloud for Increasing Energy Efficiency of ...
Assessment to Delegate the Task to Cloud for Increasing Energy Efficiency of ...IRJET Journal
 
Cisco Connect Vancouver 2017 - Optimizing your client's wi fi experience
Cisco Connect Vancouver 2017 - Optimizing your client's wi fi experienceCisco Connect Vancouver 2017 - Optimizing your client's wi fi experience
Cisco Connect Vancouver 2017 - Optimizing your client's wi fi experienceCisco Canada
 
802.11 Wireless LAN Vulnerability Assessment (ITSPSR-21A)
802.11 Wireless LAN Vulnerability Assessment (ITSPSR-21A)802.11 Wireless LAN Vulnerability Assessment (ITSPSR-21A)
802.11 Wireless LAN Vulnerability Assessment (ITSPSR-21A)Sunghun Kim
 
Securing Network-Attached HSMs: The SafeNet Luna SA Three-Layer Authenticatio...
Securing Network-Attached HSMs: The SafeNet Luna SA Three-Layer Authenticatio...Securing Network-Attached HSMs: The SafeNet Luna SA Three-Layer Authenticatio...
Securing Network-Attached HSMs: The SafeNet Luna SA Three-Layer Authenticatio...SafeNet
 
IEEE 2014 NS2 Projects
IEEE 2014 NS2 ProjectsIEEE 2014 NS2 Projects
IEEE 2014 NS2 ProjectsVijay Karan
 
IEEE 2014 NS2 Projects
IEEE 2014 NS2 ProjectsIEEE 2014 NS2 Projects
IEEE 2014 NS2 ProjectsVijay Karan
 
Week 7 lecture material
Week 7 lecture materialWeek 7 lecture material
Week 7 lecture materialAnkit Gupta
 
Telco Private Clouds - The RISE and SHINE
Telco Private Clouds - The RISE and SHINETelco Private Clouds - The RISE and SHINE
Telco Private Clouds - The RISE and SHINEImad Ayad
 
What SD-WAN Means for Enterprise
What SD-WAN Means for EnterpriseWhat SD-WAN Means for Enterprise
What SD-WAN Means for EnterpriseToshal Dudhwala
 
Advanced Integrated Communication System
Advanced Integrated Communication SystemAdvanced Integrated Communication System
Advanced Integrated Communication SystemMayank Srivastava
 
Net motion mobility_intro_overview
Net motion mobility_intro_overviewNet motion mobility_intro_overview
Net motion mobility_intro_overviewStef Coetzee
 
Mobile Backend as a Service via Cloud Foundry
Mobile Backend as a Service via Cloud FoundryMobile Backend as a Service via Cloud Foundry
Mobile Backend as a Service via Cloud Foundry天青 王
 
Running head NETWORK INFRASTRUCTURE AND SECURITY 1NETWOR.docx
Running head NETWORK INFRASTRUCTURE AND SECURITY  1NETWOR.docxRunning head NETWORK INFRASTRUCTURE AND SECURITY  1NETWOR.docx
Running head NETWORK INFRASTRUCTURE AND SECURITY 1NETWOR.docxtodd581
 

Semelhante a Mobile security (20)

Intra mart accel platform 2021winter-en
Intra mart accel platform 2021winter-enIntra mart accel platform 2021winter-en
Intra mart accel platform 2021winter-en
 
IOT in 5G Training and Certification by TELCOMA Global
IOT in 5G Training and Certification by TELCOMA GlobalIOT in 5G Training and Certification by TELCOMA Global
IOT in 5G Training and Certification by TELCOMA Global
 
IOT in 5G Training and Certification by TELCOMA Global
IOT in 5G Training and Certification by TELCOMA GlobalIOT in 5G Training and Certification by TELCOMA Global
IOT in 5G Training and Certification by TELCOMA Global
 
Decision to offload the task to Cloud for increasing energy efficiency of Mob...
Decision to offload the task to Cloud for increasing energy efficiency of Mob...Decision to offload the task to Cloud for increasing energy efficiency of Mob...
Decision to offload the task to Cloud for increasing energy efficiency of Mob...
 
Mobile security
Mobile securityMobile security
Mobile security
 
Assessment to Delegate the Task to Cloud for Increasing Energy Efficiency of ...
Assessment to Delegate the Task to Cloud for Increasing Energy Efficiency of ...Assessment to Delegate the Task to Cloud for Increasing Energy Efficiency of ...
Assessment to Delegate the Task to Cloud for Increasing Energy Efficiency of ...
 
Cisco Connect Vancouver 2017 - Optimizing your client's wi fi experience
Cisco Connect Vancouver 2017 - Optimizing your client's wi fi experienceCisco Connect Vancouver 2017 - Optimizing your client's wi fi experience
Cisco Connect Vancouver 2017 - Optimizing your client's wi fi experience
 
802.11 Wireless LAN Vulnerability Assessment (ITSPSR-21A)
802.11 Wireless LAN Vulnerability Assessment (ITSPSR-21A)802.11 Wireless LAN Vulnerability Assessment (ITSPSR-21A)
802.11 Wireless LAN Vulnerability Assessment (ITSPSR-21A)
 
Sudhakar Resume
Sudhakar ResumeSudhakar Resume
Sudhakar Resume
 
Securing Network-Attached HSMs: The SafeNet Luna SA Three-Layer Authenticatio...
Securing Network-Attached HSMs: The SafeNet Luna SA Three-Layer Authenticatio...Securing Network-Attached HSMs: The SafeNet Luna SA Three-Layer Authenticatio...
Securing Network-Attached HSMs: The SafeNet Luna SA Three-Layer Authenticatio...
 
Sangfor SSL VPN Brochure
Sangfor SSL VPN BrochureSangfor SSL VPN Brochure
Sangfor SSL VPN Brochure
 
IEEE 2014 NS2 Projects
IEEE 2014 NS2 ProjectsIEEE 2014 NS2 Projects
IEEE 2014 NS2 Projects
 
IEEE 2014 NS2 Projects
IEEE 2014 NS2 ProjectsIEEE 2014 NS2 Projects
IEEE 2014 NS2 Projects
 
Week 7 lecture material
Week 7 lecture materialWeek 7 lecture material
Week 7 lecture material
 
Telco Private Clouds - The RISE and SHINE
Telco Private Clouds - The RISE and SHINETelco Private Clouds - The RISE and SHINE
Telco Private Clouds - The RISE and SHINE
 
What SD-WAN Means for Enterprise
What SD-WAN Means for EnterpriseWhat SD-WAN Means for Enterprise
What SD-WAN Means for Enterprise
 
Advanced Integrated Communication System
Advanced Integrated Communication SystemAdvanced Integrated Communication System
Advanced Integrated Communication System
 
Net motion mobility_intro_overview
Net motion mobility_intro_overviewNet motion mobility_intro_overview
Net motion mobility_intro_overview
 
Mobile Backend as a Service via Cloud Foundry
Mobile Backend as a Service via Cloud FoundryMobile Backend as a Service via Cloud Foundry
Mobile Backend as a Service via Cloud Foundry
 
Running head NETWORK INFRASTRUCTURE AND SECURITY 1NETWOR.docx
Running head NETWORK INFRASTRUCTURE AND SECURITY  1NETWOR.docxRunning head NETWORK INFRASTRUCTURE AND SECURITY  1NETWOR.docx
Running head NETWORK INFRASTRUCTURE AND SECURITY 1NETWOR.docx
 

Último

Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????blackmambaettijean
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 

Último (20)

Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 

Mobile security

  • 1. Prepared by, BASANT KUMAR 0801216257 CSE 1 © NOKIA mobile-security.PPT/ 11/12/2011 / N.Asokan (NRC/COM)
  • 2. 2 © NOKIA mobile-security.PPT/ 11/12/2011 / N.Asokan (NRC/COM)
  • 3. 3 © NOKIA mobile-security.PPT/ 11/12/2011 / N.Asokan (NRC/COM)
  • 4. 4 © NOKIA mobile-security.PPT/ 11/12/2011 / N.Asokan (NRC/COM)
  • 5. • Mobile users must be able to work without a wireless connection due to poor or even non-existent connections. • Applications must be able to access local device/vehicle hardware, such as printers, bar code scanners, or GPS units (for mapping or Automatic Vehicle Location systems). • Bandwidth must be conserved (a common requirement on wireless networks that charge per megabyte or data transferred). 5 © NOKIA mobile-security.PPT/ 11/12/2011 / N.Asokan (NRC/COM)
  • 6. 6 © NOKIA mobile-security.PPT/ 11/12/2011 / N.Asokan (NRC/COM)
  • 7. 7 © NOKIA mobile-security.PPT/ 11/12/2011 / N.Asokan (NRC/COM)
  • 8. 8 © NOKIA mobile-security.PPT/ 11/12/2011 / N.Asokan (NRC/COM)
  • 9. 9 © NOKIA mobile-security.PPT/ 11/12/2011 / N.Asokan (NRC/COM)
  • 10. 10 © NOKIA mobile-security.PPT/ 11/12/2011 / N.Asokan (NRC/COM)
  • 11. 11 © NOKIA mobile-security.PPT/ 11/12/2011 / N.Asokan (NRC/COM)
  • 12. 12 © NOKIA mobile-security.PPT/ 11/12/2011 / N.Asokan (NRC/COM)
  • 13. • Location Dependent Data (LDD):- The class of data whose value is functionally dependent on location. Thus the value of location determines the correct value of data. Ex- City tax, City area. • Location Independent Data (LID):- The class of data whose value is functionally independent on location. Thus the value of location does not determines the correct value of data. Ex- Person name , account nuber. 13 © NOKIA mobile-security.PPT/ 11/12/2011 / N.Asokan (NRC/COM)
  • 14. 14 © NOKIA mobile-security.PPT/ 11/12/2011 / N.Asokan (NRC/COM)
  • 15. • The mobile database and the central database have to be synchronized at specific times. We have selected the secure http protocol (https) to perform the necessary synchronization operations between the mobile and the central database. More precisely we use https with server and client authentication. This choice assures: – Confidentiality of the data that is transferred. – Authentication of the server computer. – Authentication of the client computer. 15 © NOKIA mobile-security.PPT/ 11/12/2011 / N.Asokan (NRC/COM)
  • 16. The local database on the mobile device is encrypted and each time the user opens the mobile database, he has to enter his password. In case the mobile device is stolen or violated by an intruder, the data that is stored on the local database is not readable. The encryption algorithm is part of SQL Server Mobile Edition and unfortunately we were not able to find documentation for the specific algorithm. 16 © NOKIA mobile-security.PPT/ 11/12/2011 / N.Asokan (NRC/COM)
  • 17. For authoring operations, each user has access only to his own data. A set of database triggers implemented in the database server, check that the data manipulation operations of the user are valid. This check prevents all users from accidental or malicious modifications of data for which they have no authorization. More precisely, an author – can create new announcements that are signed with his name, – can delete or update announcements that are signed with his name, and – has no access to announcements created/signed by other users. 17 © NOKIA mobile-security.PPT/ 11/12/2011 / N.Asokan (NRC/COM)
  • 18. 18 © NOKIA mobile-security.PPT/ 11/12/2011 / N.Asokan (NRC/COM)