SlideShare uma empresa Scribd logo
1 de 28
Securing Mobile Services Miguel Ponce de Leon, John Ronan, Jimmy McGibney Telecommunications Software & Systems Group Waterford Institute of Technology Ireland [email_address] Security for the pervasive computing world
Contents ,[object Object],[object Object],[object Object],[object Object]
Security – a difficult problem ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
m-Government Security ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
General threats & vulnerabilities ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Specific Threats to Mobile Services
 
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Worldwide War Drive 2004
Some tips for wireless LAN security ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
SEINIT Project ,[object Object],[object Object],[object Object],Security for the pervasive computing world
SEINIT: conceptual approach ,[object Object],[object Object],[object Object],[object Object],[object Object],} Classical security just looks at these layers
SEINIT: conceptual approach Space / Geography Instantiation Time UMTS Internet Wi-Fi Bluetooth Interface Interface Interface Virtual Virtual Logical Logical Logical
SEINIT: conceptual approach ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Infospheres Security Domains Alice’s personal data Cybercafe Alice’s office Alice’s Bank Alice’s ISP Alice’s Telecom operator Software company – e.g. Microsoft
SEINIT: conceptual approach ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],SEINIT work in progress
[object Object],[object Object],[object Object],[object Object],[object Object],Intrusion Detection System (IDS)
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Honeypot
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Combining IDS and Honeypots
Collaboration and “reputation”
[object Object],[object Object],[object Object],Collaboration and “reputation”
[object Object],[object Object],[object Object],[object Object],[object Object],Architecture 5 main components
[object Object],[object Object],Architecture 5 main components
Architecture 5 main components ,[object Object],[object Object]
Architecture 5 main components ,[object Object],[object Object]
Architecture 5 main components ,[object Object],[object Object]
Architecture 5 main components ,[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Implementation Use available components
SEINIT: other activities ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]

Mais conteúdo relacionado

Mais procurados

Intrusion Detection and Prevention System in an Enterprise Network
Intrusion Detection and Prevention System in an Enterprise NetworkIntrusion Detection and Prevention System in an Enterprise Network
Intrusion Detection and Prevention System in an Enterprise NetworkOkehie Collins
 
Intrusion detection system
Intrusion detection systemIntrusion detection system
Intrusion detection systemNikhil Singh
 
Next Generation Network: Security and Architecture
Next Generation Network: Security and ArchitectureNext Generation Network: Security and Architecture
Next Generation Network: Security and Architectureijsrd.com
 
امن نظم المعلومات وامن الشبكات
امن نظم المعلومات وامن الشبكاتامن نظم المعلومات وامن الشبكات
امن نظم المعلومات وامن الشبكاتAmr Rashed
 
Ch04 Network Vulnerabilities and Attacks
Ch04 Network Vulnerabilities and AttacksCh04 Network Vulnerabilities and Attacks
Ch04 Network Vulnerabilities and AttacksInformation Technology
 
Seminar Presentation | Network Intrusion Detection using Supervised Machine L...
Seminar Presentation | Network Intrusion Detection using Supervised Machine L...Seminar Presentation | Network Intrusion Detection using Supervised Machine L...
Seminar Presentation | Network Intrusion Detection using Supervised Machine L...Jowin John Chemban
 
Network Attack and Intrusion Prevention System
Network Attack and  Intrusion Prevention System Network Attack and  Intrusion Prevention System
Network Attack and Intrusion Prevention System Deris Stiawan
 
Wireless Networking
Wireless NetworkingWireless Networking
Wireless NetworkingGulshanAra14
 

Mais procurados (15)

Intrusion Detection and Prevention System in an Enterprise Network
Intrusion Detection and Prevention System in an Enterprise NetworkIntrusion Detection and Prevention System in an Enterprise Network
Intrusion Detection and Prevention System in an Enterprise Network
 
Intrusion detection system
Intrusion detection systemIntrusion detection system
Intrusion detection system
 
Next Generation Network: Security and Architecture
Next Generation Network: Security and ArchitectureNext Generation Network: Security and Architecture
Next Generation Network: Security and Architecture
 
امن نظم المعلومات وامن الشبكات
امن نظم المعلومات وامن الشبكاتامن نظم المعلومات وامن الشبكات
امن نظم المعلومات وامن الشبكات
 
call for papers, research paper publishing, where to publish research paper, ...
call for papers, research paper publishing, where to publish research paper, ...call for papers, research paper publishing, where to publish research paper, ...
call for papers, research paper publishing, where to publish research paper, ...
 
Ch04 Network Vulnerabilities and Attacks
Ch04 Network Vulnerabilities and AttacksCh04 Network Vulnerabilities and Attacks
Ch04 Network Vulnerabilities and Attacks
 
Review of network diagram
Review of network diagramReview of network diagram
Review of network diagram
 
Seminar Presentation | Network Intrusion Detection using Supervised Machine L...
Seminar Presentation | Network Intrusion Detection using Supervised Machine L...Seminar Presentation | Network Intrusion Detection using Supervised Machine L...
Seminar Presentation | Network Intrusion Detection using Supervised Machine L...
 
NSA and PT
NSA and PTNSA and PT
NSA and PT
 
Lect13 security
Lect13   securityLect13   security
Lect13 security
 
Ijnsa050214
Ijnsa050214Ijnsa050214
Ijnsa050214
 
1776 1779
1776 17791776 1779
1776 1779
 
Defending Industrial Control Systems From Cyberattack
Defending Industrial Control Systems From CyberattackDefending Industrial Control Systems From Cyberattack
Defending Industrial Control Systems From Cyberattack
 
Network Attack and Intrusion Prevention System
Network Attack and  Intrusion Prevention System Network Attack and  Intrusion Prevention System
Network Attack and Intrusion Prevention System
 
Wireless Networking
Wireless NetworkingWireless Networking
Wireless Networking
 

Destaque

Appunti di Diritto Privato: Saggi
Appunti di Diritto Privato: SaggiAppunti di Diritto Privato: Saggi
Appunti di Diritto Privato: Saggiprofman
 
10 Reasons Why Social Media Week Should Be Every Week
10 Reasons Why Social Media Week Should Be Every Week10 Reasons Why Social Media Week Should Be Every Week
10 Reasons Why Social Media Week Should Be Every WeekDavid Berkowitz
 
Appunti di Elaborazione automatica dei dati: matrici e matlab
Appunti di Elaborazione automatica dei dati: matrici e matlabAppunti di Elaborazione automatica dei dati: matrici e matlab
Appunti di Elaborazione automatica dei dati: matrici e matlabprofman
 
Power point presentations dos and don’ts
Power point presentations dos and don’tsPower point presentations dos and don’ts
Power point presentations dos and don’tsDaniela Munca-Aftenev
 
Education and Social Inclusion through Information
Education and Social Inclusion through InformationEducation and Social Inclusion through Information
Education and Social Inclusion through InformationSameer Verma
 
Mobile marketing - Italia 2013
Mobile marketing - Italia 2013Mobile marketing - Italia 2013
Mobile marketing - Italia 2013Francesco Ronchi
 

Destaque (20)

Daidalos Integration Framework TridentCom 2007
Daidalos Integration Framework TridentCom 2007Daidalos Integration Framework TridentCom 2007
Daidalos Integration Framework TridentCom 2007
 
Appunti di Diritto Privato: Saggi
Appunti di Diritto Privato: SaggiAppunti di Diritto Privato: Saggi
Appunti di Diritto Privato: Saggi
 
10 Reasons Why Social Media Week Should Be Every Week
10 Reasons Why Social Media Week Should Be Every Week10 Reasons Why Social Media Week Should Be Every Week
10 Reasons Why Social Media Week Should Be Every Week
 
Appunti di Elaborazione automatica dei dati: matrici e matlab
Appunti di Elaborazione automatica dei dati: matrici e matlabAppunti di Elaborazione automatica dei dati: matrici e matlab
Appunti di Elaborazione automatica dei dati: matrici e matlab
 
Power point presentations dos and don’ts
Power point presentations dos and don’tsPower point presentations dos and don’ts
Power point presentations dos and don’ts
 
Education and Social Inclusion through Information
Education and Social Inclusion through InformationEducation and Social Inclusion through Information
Education and Social Inclusion through Information
 
A Framework for In-Network Management in Heterogeneous Future Communication N...
A Framework for In-Network Management in Heterogeneous Future Communication N...A Framework for In-Network Management in Heterogeneous Future Communication N...
A Framework for In-Network Management in Heterogeneous Future Communication N...
 
13. wit tssg-efii-arch-jun_2010
13. wit tssg-efii-arch-jun_201013. wit tssg-efii-arch-jun_2010
13. wit tssg-efii-arch-jun_2010
 
Resource Description: : The cornerstone of federation
Resource Description: : The cornerstone of federationResource Description: : The cornerstone of federation
Resource Description: : The cornerstone of federation
 
Physics with Computing what does that mean?
Physics with Computing what does that mean?Physics with Computing what does that mean?
Physics with Computing what does that mean?
 
eChallenges e2006 Large scale interoperability, integrating the Daidalos pro...
eChallenges e2006 Large scale interoperability, integrating  the Daidalos pro...eChallenges e2006 Large scale interoperability, integrating  the Daidalos pro...
eChallenges e2006 Large scale interoperability, integrating the Daidalos pro...
 
Mobile marketing - Italia 2013
Mobile marketing - Italia 2013Mobile marketing - Italia 2013
Mobile marketing - Italia 2013
 
A User Centric Always Best Connected Service Business Model for MVNOs
A User Centric Always Best Connected Service Business Model for MVNOsA User Centric Always Best Connected Service Business Model for MVNOs
A User Centric Always Best Connected Service Business Model for MVNOs
 
Towards a New Architectural Framework – The Nth Stratum Concept Mobimedia 08
Towards a New Architectural Framework – The Nth Stratum Concept Mobimedia 08Towards a New Architectural Framework – The Nth Stratum Concept Mobimedia 08
Towards a New Architectural Framework – The Nth Stratum Concept Mobimedia 08
 
Daidalos Evaluation ECIME 2007
Daidalos Evaluation  ECIME 2007Daidalos Evaluation  ECIME 2007
Daidalos Evaluation ECIME 2007
 
FI PPP Use Case Examples 2011
FI PPP Use Case Examples 2011FI PPP Use Case Examples 2011
FI PPP Use Case Examples 2011
 
PRISTINE: Perfect Pitch Net Futures 2015
PRISTINE: Perfect Pitch Net Futures 2015PRISTINE: Perfect Pitch Net Futures 2015
PRISTINE: Perfect Pitch Net Futures 2015
 
2010 10 19 Open Source Research in FP7 Future Networks
2010 10 19 Open Source Research in FP7 Future Networks2010 10 19 Open Source Research in FP7 Future Networks
2010 10 19 Open Source Research in FP7 Future Networks
 
EU FP7 Perspectives of a researcher
EU FP7 Perspectives of a researcherEU FP7 Perspectives of a researcher
EU FP7 Perspectives of a researcher
 
TridentCom 2006 paper on the Living Lab approach
TridentCom 2006 paper on the Living Lab approachTridentCom 2006 paper on the Living Lab approach
TridentCom 2006 paper on the Living Lab approach
 

Semelhante a Euro mGov Securing Mobile Services

information security technology
information security technologyinformation security technology
information security technologygarimasagar
 
Network and web security
Network and web securityNetwork and web security
Network and web securityNitesh Saitwal
 
Cyber Security: A Hands on review
Cyber Security: A Hands on reviewCyber Security: A Hands on review
Cyber Security: A Hands on reviewMiltonBiswas8
 
Using Your Network as a Sensor for Enhanced Visibility and Security
Using Your Network as a Sensor for Enhanced Visibility and Security Using Your Network as a Sensor for Enhanced Visibility and Security
Using Your Network as a Sensor for Enhanced Visibility and Security Lancope, Inc.
 
IRJET - IDS for Wifi Security
IRJET -  	  IDS for Wifi SecurityIRJET -  	  IDS for Wifi Security
IRJET - IDS for Wifi SecurityIRJET Journal
 
Honeypots for Cloud Providers - SDN World Congress
Honeypots for Cloud Providers - SDN World CongressHoneypots for Cloud Providers - SDN World Congress
Honeypots for Cloud Providers - SDN World CongressVallie Joseph
 
Eximbank security presentation
Eximbank security presentationEximbank security presentation
Eximbank security presentationlaonap166
 
TIG / Infocyte: Proactive Cybersecurity for State and Local Government
TIG / Infocyte: Proactive Cybersecurity for State and Local GovernmentTIG / Infocyte: Proactive Cybersecurity for State and Local Government
TIG / Infocyte: Proactive Cybersecurity for State and Local GovernmentInfocyte
 
Certified Ethical Hacking
Certified Ethical HackingCertified Ethical Hacking
Certified Ethical HackingJennifer Wood
 
MT17_Building Integrated and Secure Networks with limited IT Support
MT17_Building Integrated and Secure Networks with limited IT SupportMT17_Building Integrated and Secure Networks with limited IT Support
MT17_Building Integrated and Secure Networks with limited IT SupportDell EMC World
 
Detection &Amp; Prevention Systems
Detection &Amp; Prevention SystemsDetection &Amp; Prevention Systems
Detection &Amp; Prevention SystemsAlison Hall
 

Semelhante a Euro mGov Securing Mobile Services (20)

eChallenges2005 Seinit
eChallenges2005 SeiniteChallenges2005 Seinit
eChallenges2005 Seinit
 
information security technology
information security technologyinformation security technology
information security technology
 
Network and web security
Network and web securityNetwork and web security
Network and web security
 
Reveelium Smart Predictive Analytics - Datasheet EN
Reveelium Smart Predictive Analytics - Datasheet ENReveelium Smart Predictive Analytics - Datasheet EN
Reveelium Smart Predictive Analytics - Datasheet EN
 
Security and-visibility
Security and-visibilitySecurity and-visibility
Security and-visibility
 
Cyber Security: A Hands on review
Cyber Security: A Hands on reviewCyber Security: A Hands on review
Cyber Security: A Hands on review
 
Day4
Day4Day4
Day4
 
Using Your Network as a Sensor for Enhanced Visibility and Security
Using Your Network as a Sensor for Enhanced Visibility and Security Using Your Network as a Sensor for Enhanced Visibility and Security
Using Your Network as a Sensor for Enhanced Visibility and Security
 
IRJET - IDS for Wifi Security
IRJET -  	  IDS for Wifi SecurityIRJET -  	  IDS for Wifi Security
IRJET - IDS for Wifi Security
 
Honeypots for Cloud Providers - SDN World Congress
Honeypots for Cloud Providers - SDN World CongressHoneypots for Cloud Providers - SDN World Congress
Honeypots for Cloud Providers - SDN World Congress
 
Network security
Network security Network security
Network security
 
Iot(security)
Iot(security)Iot(security)
Iot(security)
 
Eximbank security presentation
Eximbank security presentationEximbank security presentation
Eximbank security presentation
 
Data security
Data securityData security
Data security
 
NetWitness
NetWitnessNetWitness
NetWitness
 
TIG / Infocyte: Proactive Cybersecurity for State and Local Government
TIG / Infocyte: Proactive Cybersecurity for State and Local GovernmentTIG / Infocyte: Proactive Cybersecurity for State and Local Government
TIG / Infocyte: Proactive Cybersecurity for State and Local Government
 
Cloud Computing & Security
Cloud Computing & SecurityCloud Computing & Security
Cloud Computing & Security
 
Certified Ethical Hacking
Certified Ethical HackingCertified Ethical Hacking
Certified Ethical Hacking
 
MT17_Building Integrated and Secure Networks with limited IT Support
MT17_Building Integrated and Secure Networks with limited IT SupportMT17_Building Integrated and Secure Networks with limited IT Support
MT17_Building Integrated and Secure Networks with limited IT Support
 
Detection &Amp; Prevention Systems
Detection &Amp; Prevention SystemsDetection &Amp; Prevention Systems
Detection &Amp; Prevention Systems
 

Mais de Miguel Ponce de Leon @ TSSG / Waterford Institute of Technology

Mais de Miguel Ponce de Leon @ TSSG / Waterford Institute of Technology (13)

Mooncoin academy form
Mooncoin academy formMooncoin academy form
Mooncoin academy form
 
WebRTC in the Call Centre
WebRTC in the Call CentreWebRTC in the Call Centre
WebRTC in the Call Centre
 
PROSE: Empowering FLOSS in European Projects
PROSE: Empowering FLOSS in European ProjectsPROSE: Empowering FLOSS in European Projects
PROSE: Empowering FLOSS in European Projects
 
EC FIA Activities overview 2011
EC FIA Activities overview 2011EC FIA Activities overview 2011
EC FIA Activities overview 2011
 
RINA: Recursive Inter Network Architecture
RINA: Recursive Inter Network ArchitectureRINA: Recursive Inter Network Architecture
RINA: Recursive Inter Network Architecture
 
4 w mobility-wpmc2008-final
4 w mobility-wpmc2008-final4 w mobility-wpmc2008-final
4 w mobility-wpmc2008-final
 
Mobility Scenarios for the Future Internet: the 4WARD approach
Mobility Scenarios for the Future Internet: the 4WARD approachMobility Scenarios for the Future Internet: the 4WARD approach
Mobility Scenarios for the Future Internet: the 4WARD approach
 
Services Of LivingLabs and the European Network of Living Labs (ENoLL)
Services Of  LivingLabs and the European Network of Living Labs (ENoLL)Services Of  LivingLabs and the European Network of Living Labs (ENoLL)
Services Of LivingLabs and the European Network of Living Labs (ENoLL)
 
How to Write a Competitive FP7 Proposal
How to Write a Competitive FP7 ProposalHow to Write a Competitive FP7 Proposal
How to Write a Competitive FP7 Proposal
 
EU FP7 Perspectives of a researcher
EU FP7 Perspectives of a researcherEU FP7 Perspectives of a researcher
EU FP7 Perspectives of a researcher
 
FITCE 2007 Network Technology Trends Miguelpdl
FITCE 2007 Network Technology Trends MiguelpdlFITCE 2007 Network Technology Trends Miguelpdl
FITCE 2007 Network Technology Trends Miguelpdl
 
Management Of Future Communication Networks And Services
Management Of Future Communication Networks And ServicesManagement Of Future Communication Networks And Services
Management Of Future Communication Networks And Services
 
Experiences of an Irish Researcher in FP6
Experiences of an Irish Researcher in FP6Experiences of an Irish Researcher in FP6
Experiences of an Irish Researcher in FP6
 

Último

Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Kaya Weers
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...itnewsafrica
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesManik S Magar
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructureitnewsafrica
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesBernd Ruecker
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...itnewsafrica
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 

Último (20)

Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architectures
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 

Euro mGov Securing Mobile Services

  • 1. Securing Mobile Services Miguel Ponce de Leon, John Ronan, Jimmy McGibney Telecommunications Software & Systems Group Waterford Institute of Technology Ireland [email_address] Security for the pervasive computing world
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.  
  • 8.
  • 9.
  • 10.
  • 11.
  • 12. SEINIT: conceptual approach Space / Geography Instantiation Time UMTS Internet Wi-Fi Bluetooth Interface Interface Interface Virtual Virtual Logical Logical Logical
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.