SlideShare una empresa de Scribd logo
1 de 18
Prepared by,
                                                                     BASANT KUMAR
                                                                     0801216257
                                                                     CSE

1   © NOKIA   mobile-security.PPT/ 11/12/2011 / N.Asokan (NRC/COM)
2   © NOKIA   mobile-security.PPT/ 11/12/2011 / N.Asokan (NRC/COM)
3   © NOKIA   mobile-security.PPT/ 11/12/2011 / N.Asokan (NRC/COM)
4   © NOKIA   mobile-security.PPT/ 11/12/2011 / N.Asokan (NRC/COM)
• Mobile users must be able to work
      without a wireless connection due to poor
      or even non-existent connections.
    • Applications must be able to access local
      device/vehicle hardware, such as printers,
      bar code scanners, or GPS units (for
      mapping or Automatic Vehicle Location
      systems).
    • Bandwidth must be conserved (a common
      requirement on wireless networks that
      charge per megabyte or data transferred).

5   © NOKIA   mobile-security.PPT/ 11/12/2011 / N.Asokan (NRC/COM)
6   © NOKIA   mobile-security.PPT/ 11/12/2011 / N.Asokan (NRC/COM)
7   © NOKIA   mobile-security.PPT/ 11/12/2011 / N.Asokan (NRC/COM)
8   © NOKIA   mobile-security.PPT/ 11/12/2011 / N.Asokan (NRC/COM)
9   © NOKIA   mobile-security.PPT/ 11/12/2011 / N.Asokan (NRC/COM)
10   © NOKIA   mobile-security.PPT/ 11/12/2011 / N.Asokan (NRC/COM)
11   © NOKIA   mobile-security.PPT/ 11/12/2011 / N.Asokan (NRC/COM)
12   © NOKIA   mobile-security.PPT/ 11/12/2011 / N.Asokan (NRC/COM)
• Location Dependent Data (LDD):- The class of data
       whose value is functionally dependent on location.
       Thus the value of location determines the correct
       value of data. Ex- City tax, City area.
     • Location Independent Data (LID):- The class of data
       whose value is functionally independent on location.
       Thus the value of location does not determines the
       correct value of data. Ex- Person name , account
       nuber.




13   © NOKIA   mobile-security.PPT/ 11/12/2011 / N.Asokan (NRC/COM)
14   © NOKIA   mobile-security.PPT/ 11/12/2011 / N.Asokan (NRC/COM)
• The mobile database and the central database have to be
       synchronized at specific times. We have selected the secure
       http protocol (https) to perform the necessary synchronization
       operations between the mobile and the central database. More
       precisely we use https with server and client authentication.
       This choice assures:
               – Confidentiality of the data that is transferred.
               – Authentication of the server computer.
               – Authentication of the client computer.




15   © NOKIA   mobile-security.PPT/ 11/12/2011 / N.Asokan (NRC/COM)
The local database on the mobile device is encrypted and each
     time the user opens the mobile database, he has to enter his
     password. In case the mobile device is stolen or violated by an
     intruder, the data that is stored on the local database is not
     readable. The encryption algorithm is part of SQL Server Mobile
     Edition and unfortunately we were not able to find documentation
     for the specific algorithm.




16   © NOKIA   mobile-security.PPT/ 11/12/2011 / N.Asokan (NRC/COM)
For authoring operations, each user has access only to his own data. A set of

     database triggers implemented in the database server, check that the data

     manipulation operations of the user are valid. This check prevents all users from

     accidental or malicious modifications of data for which they have no authorization.

     More precisely, an author

               – can create new announcements that are signed with his name,

               – can delete or update announcements that are signed with his name, and

               – has no access to announcements created/signed by other users.



17   © NOKIA   mobile-security.PPT/ 11/12/2011 / N.Asokan (NRC/COM)
18   © NOKIA   mobile-security.PPT/ 11/12/2011 / N.Asokan (NRC/COM)

Más contenido relacionado

La actualidad más candente

Unit 1 - mobile computing introduction
Unit 1 - mobile computing introductionUnit 1 - mobile computing introduction
Unit 1 - mobile computing introductionVintesh Patel
 
Architecture of Mobile Computing
Architecture of Mobile ComputingArchitecture of Mobile Computing
Architecture of Mobile ComputingJAINIK PATEL
 
Mobile Computing Architecture
Mobile Computing ArchitectureMobile Computing Architecture
Mobile Computing ArchitectureTrinity Dwarka
 
Overview of mobile computing
Overview of mobile computingOverview of mobile computing
Overview of mobile computingVENNILAV6
 
The internet & the new information technology infrastructure
The internet & the new information technology infrastructureThe internet & the new information technology infrastructure
The internet & the new information technology infrastructureProf. Othman Alsalloum
 
Knowledge on IT Infrastructure
Knowledge on IT InfrastructureKnowledge on IT Infrastructure
Knowledge on IT InfrastructureLopamudra Das
 
5 - Infrastructure and Cloud Computing
5 - Infrastructure and Cloud Computing5 - Infrastructure and Cloud Computing
5 - Infrastructure and Cloud ComputingRaymond Gao
 
Company profile TriCoSys Solutions Private Limited
Company profile TriCoSys Solutions Private LimitedCompany profile TriCoSys Solutions Private Limited
Company profile TriCoSys Solutions Private LimitedSubodh Deshpande
 
Mobile Computing Complete Introduction
Mobile Computing Complete IntroductionMobile Computing Complete Introduction
Mobile Computing Complete IntroductionDenis R
 
Client server based computing
Client server based computingClient server based computing
Client server based computingMohammad Affan
 
Mobile agents in a distributed multimedia dabase system(synopsis)
Mobile agents in a distributed multimedia dabase system(synopsis)Mobile agents in a distributed multimedia dabase system(synopsis)
Mobile agents in a distributed multimedia dabase system(synopsis)Mumbai Academisc
 
Information technology infrastructures by- neo arya
Information technology infrastructures by- neo aryaInformation technology infrastructures by- neo arya
Information technology infrastructures by- neo aryaneoarya2012
 
Prachi gupta 8 a
Prachi gupta 8 aPrachi gupta 8 a
Prachi gupta 8 aEashaGupta
 
Computer communication network
Computer communication networkComputer communication network
Computer communication networkhimz676987
 

La actualidad más candente (20)

Unit 1 - mobile computing introduction
Unit 1 - mobile computing introductionUnit 1 - mobile computing introduction
Unit 1 - mobile computing introduction
 
Architecture of Mobile Computing
Architecture of Mobile ComputingArchitecture of Mobile Computing
Architecture of Mobile Computing
 
Mobile Computing Architecture
Mobile Computing ArchitectureMobile Computing Architecture
Mobile Computing Architecture
 
Overview of mobile computing
Overview of mobile computingOverview of mobile computing
Overview of mobile computing
 
The internet & the new information technology infrastructure
The internet & the new information technology infrastructureThe internet & the new information technology infrastructure
The internet & the new information technology infrastructure
 
2
22
2
 
Distributed Systems, Mobile Computing and Security
Distributed Systems, Mobile Computing and SecurityDistributed Systems, Mobile Computing and Security
Distributed Systems, Mobile Computing and Security
 
Knowledge on IT Infrastructure
Knowledge on IT InfrastructureKnowledge on IT Infrastructure
Knowledge on IT Infrastructure
 
Sdn whitepaper
Sdn whitepaperSdn whitepaper
Sdn whitepaper
 
5 - Infrastructure and Cloud Computing
5 - Infrastructure and Cloud Computing5 - Infrastructure and Cloud Computing
5 - Infrastructure and Cloud Computing
 
Company profile TriCoSys Solutions Private Limited
Company profile TriCoSys Solutions Private LimitedCompany profile TriCoSys Solutions Private Limited
Company profile TriCoSys Solutions Private Limited
 
Mobile Computing Complete Introduction
Mobile Computing Complete IntroductionMobile Computing Complete Introduction
Mobile Computing Complete Introduction
 
Network administration Book
Network administration BookNetwork administration Book
Network administration Book
 
Client server based computing
Client server based computingClient server based computing
Client server based computing
 
Mobile agents in a distributed multimedia dabase system(synopsis)
Mobile agents in a distributed multimedia dabase system(synopsis)Mobile agents in a distributed multimedia dabase system(synopsis)
Mobile agents in a distributed multimedia dabase system(synopsis)
 
IT Infrastructure Project
IT Infrastructure ProjectIT Infrastructure Project
IT Infrastructure Project
 
Information technology infrastructures by- neo arya
Information technology infrastructures by- neo aryaInformation technology infrastructures by- neo arya
Information technology infrastructures by- neo arya
 
Prachi gupta 8 a
Prachi gupta 8 aPrachi gupta 8 a
Prachi gupta 8 a
 
Ict infrastructure management
Ict infrastructure managementIct infrastructure management
Ict infrastructure management
 
Computer communication network
Computer communication networkComputer communication network
Computer communication network
 

Similar a Mobile security

Intra mart accel platform 2021winter-en
Intra mart accel platform 2021winter-enIntra mart accel platform 2021winter-en
Intra mart accel platform 2021winter-enNTTDATA INTRAMART
 
IOT in 5G Training and Certification by TELCOMA Global
IOT in 5G Training and Certification by TELCOMA GlobalIOT in 5G Training and Certification by TELCOMA Global
IOT in 5G Training and Certification by TELCOMA GlobalGaganpreet Singh Walia
 
IOT in 5G Training and Certification by TELCOMA Global
IOT in 5G Training and Certification by TELCOMA GlobalIOT in 5G Training and Certification by TELCOMA Global
IOT in 5G Training and Certification by TELCOMA GlobalGaganpreet Singh Walia
 
Decision to offload the task to Cloud for increasing energy efficiency of Mob...
Decision to offload the task to Cloud for increasing energy efficiency of Mob...Decision to offload the task to Cloud for increasing energy efficiency of Mob...
Decision to offload the task to Cloud for increasing energy efficiency of Mob...IRJET Journal
 
Assessment to Delegate the Task to Cloud for Increasing Energy Efficiency of ...
Assessment to Delegate the Task to Cloud for Increasing Energy Efficiency of ...Assessment to Delegate the Task to Cloud for Increasing Energy Efficiency of ...
Assessment to Delegate the Task to Cloud for Increasing Energy Efficiency of ...IRJET Journal
 
Cisco Connect Vancouver 2017 - Optimizing your client's wi fi experience
Cisco Connect Vancouver 2017 - Optimizing your client's wi fi experienceCisco Connect Vancouver 2017 - Optimizing your client's wi fi experience
Cisco Connect Vancouver 2017 - Optimizing your client's wi fi experienceCisco Canada
 
802.11 Wireless LAN Vulnerability Assessment (ITSPSR-21A)
802.11 Wireless LAN Vulnerability Assessment (ITSPSR-21A)802.11 Wireless LAN Vulnerability Assessment (ITSPSR-21A)
802.11 Wireless LAN Vulnerability Assessment (ITSPSR-21A)Sunghun Kim
 
Securing Network-Attached HSMs: The SafeNet Luna SA Three-Layer Authenticatio...
Securing Network-Attached HSMs: The SafeNet Luna SA Three-Layer Authenticatio...Securing Network-Attached HSMs: The SafeNet Luna SA Three-Layer Authenticatio...
Securing Network-Attached HSMs: The SafeNet Luna SA Three-Layer Authenticatio...SafeNet
 
IEEE 2014 NS2 Projects
IEEE 2014 NS2 ProjectsIEEE 2014 NS2 Projects
IEEE 2014 NS2 ProjectsVijay Karan
 
IEEE 2014 NS2 Projects
IEEE 2014 NS2 ProjectsIEEE 2014 NS2 Projects
IEEE 2014 NS2 ProjectsVijay Karan
 
Week 7 lecture material
Week 7 lecture materialWeek 7 lecture material
Week 7 lecture materialAnkit Gupta
 
Telco Private Clouds - The RISE and SHINE
Telco Private Clouds - The RISE and SHINETelco Private Clouds - The RISE and SHINE
Telco Private Clouds - The RISE and SHINEImad Ayad
 
What SD-WAN Means for Enterprise
What SD-WAN Means for EnterpriseWhat SD-WAN Means for Enterprise
What SD-WAN Means for EnterpriseToshal Dudhwala
 
Advanced Integrated Communication System
Advanced Integrated Communication SystemAdvanced Integrated Communication System
Advanced Integrated Communication SystemMayank Srivastava
 
Net motion mobility_intro_overview
Net motion mobility_intro_overviewNet motion mobility_intro_overview
Net motion mobility_intro_overviewStef Coetzee
 
Mobile Backend as a Service via Cloud Foundry
Mobile Backend as a Service via Cloud FoundryMobile Backend as a Service via Cloud Foundry
Mobile Backend as a Service via Cloud Foundry天青 王
 
Running head NETWORK INFRASTRUCTURE AND SECURITY 1NETWOR.docx
Running head NETWORK INFRASTRUCTURE AND SECURITY  1NETWOR.docxRunning head NETWORK INFRASTRUCTURE AND SECURITY  1NETWOR.docx
Running head NETWORK INFRASTRUCTURE AND SECURITY 1NETWOR.docxtodd581
 

Similar a Mobile security (20)

Intra mart accel platform 2021winter-en
Intra mart accel platform 2021winter-enIntra mart accel platform 2021winter-en
Intra mart accel platform 2021winter-en
 
IOT in 5G Training and Certification by TELCOMA Global
IOT in 5G Training and Certification by TELCOMA GlobalIOT in 5G Training and Certification by TELCOMA Global
IOT in 5G Training and Certification by TELCOMA Global
 
IOT in 5G Training and Certification by TELCOMA Global
IOT in 5G Training and Certification by TELCOMA GlobalIOT in 5G Training and Certification by TELCOMA Global
IOT in 5G Training and Certification by TELCOMA Global
 
Decision to offload the task to Cloud for increasing energy efficiency of Mob...
Decision to offload the task to Cloud for increasing energy efficiency of Mob...Decision to offload the task to Cloud for increasing energy efficiency of Mob...
Decision to offload the task to Cloud for increasing energy efficiency of Mob...
 
Mobile security
Mobile securityMobile security
Mobile security
 
Assessment to Delegate the Task to Cloud for Increasing Energy Efficiency of ...
Assessment to Delegate the Task to Cloud for Increasing Energy Efficiency of ...Assessment to Delegate the Task to Cloud for Increasing Energy Efficiency of ...
Assessment to Delegate the Task to Cloud for Increasing Energy Efficiency of ...
 
Cisco Connect Vancouver 2017 - Optimizing your client's wi fi experience
Cisco Connect Vancouver 2017 - Optimizing your client's wi fi experienceCisco Connect Vancouver 2017 - Optimizing your client's wi fi experience
Cisco Connect Vancouver 2017 - Optimizing your client's wi fi experience
 
802.11 Wireless LAN Vulnerability Assessment (ITSPSR-21A)
802.11 Wireless LAN Vulnerability Assessment (ITSPSR-21A)802.11 Wireless LAN Vulnerability Assessment (ITSPSR-21A)
802.11 Wireless LAN Vulnerability Assessment (ITSPSR-21A)
 
Sudhakar Resume
Sudhakar ResumeSudhakar Resume
Sudhakar Resume
 
Securing Network-Attached HSMs: The SafeNet Luna SA Three-Layer Authenticatio...
Securing Network-Attached HSMs: The SafeNet Luna SA Three-Layer Authenticatio...Securing Network-Attached HSMs: The SafeNet Luna SA Three-Layer Authenticatio...
Securing Network-Attached HSMs: The SafeNet Luna SA Three-Layer Authenticatio...
 
Sangfor SSL VPN Brochure
Sangfor SSL VPN BrochureSangfor SSL VPN Brochure
Sangfor SSL VPN Brochure
 
IEEE 2014 NS2 Projects
IEEE 2014 NS2 ProjectsIEEE 2014 NS2 Projects
IEEE 2014 NS2 Projects
 
IEEE 2014 NS2 Projects
IEEE 2014 NS2 ProjectsIEEE 2014 NS2 Projects
IEEE 2014 NS2 Projects
 
Week 7 lecture material
Week 7 lecture materialWeek 7 lecture material
Week 7 lecture material
 
Telco Private Clouds - The RISE and SHINE
Telco Private Clouds - The RISE and SHINETelco Private Clouds - The RISE and SHINE
Telco Private Clouds - The RISE and SHINE
 
What SD-WAN Means for Enterprise
What SD-WAN Means for EnterpriseWhat SD-WAN Means for Enterprise
What SD-WAN Means for Enterprise
 
Advanced Integrated Communication System
Advanced Integrated Communication SystemAdvanced Integrated Communication System
Advanced Integrated Communication System
 
Net motion mobility_intro_overview
Net motion mobility_intro_overviewNet motion mobility_intro_overview
Net motion mobility_intro_overview
 
Mobile Backend as a Service via Cloud Foundry
Mobile Backend as a Service via Cloud FoundryMobile Backend as a Service via Cloud Foundry
Mobile Backend as a Service via Cloud Foundry
 
Running head NETWORK INFRASTRUCTURE AND SECURITY 1NETWOR.docx
Running head NETWORK INFRASTRUCTURE AND SECURITY  1NETWOR.docxRunning head NETWORK INFRASTRUCTURE AND SECURITY  1NETWOR.docx
Running head NETWORK INFRASTRUCTURE AND SECURITY 1NETWOR.docx
 

Último

Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 

Último (20)

Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 

Mobile security

  • 1. Prepared by, BASANT KUMAR 0801216257 CSE 1 © NOKIA mobile-security.PPT/ 11/12/2011 / N.Asokan (NRC/COM)
  • 2. 2 © NOKIA mobile-security.PPT/ 11/12/2011 / N.Asokan (NRC/COM)
  • 3. 3 © NOKIA mobile-security.PPT/ 11/12/2011 / N.Asokan (NRC/COM)
  • 4. 4 © NOKIA mobile-security.PPT/ 11/12/2011 / N.Asokan (NRC/COM)
  • 5. • Mobile users must be able to work without a wireless connection due to poor or even non-existent connections. • Applications must be able to access local device/vehicle hardware, such as printers, bar code scanners, or GPS units (for mapping or Automatic Vehicle Location systems). • Bandwidth must be conserved (a common requirement on wireless networks that charge per megabyte or data transferred). 5 © NOKIA mobile-security.PPT/ 11/12/2011 / N.Asokan (NRC/COM)
  • 6. 6 © NOKIA mobile-security.PPT/ 11/12/2011 / N.Asokan (NRC/COM)
  • 7. 7 © NOKIA mobile-security.PPT/ 11/12/2011 / N.Asokan (NRC/COM)
  • 8. 8 © NOKIA mobile-security.PPT/ 11/12/2011 / N.Asokan (NRC/COM)
  • 9. 9 © NOKIA mobile-security.PPT/ 11/12/2011 / N.Asokan (NRC/COM)
  • 10. 10 © NOKIA mobile-security.PPT/ 11/12/2011 / N.Asokan (NRC/COM)
  • 11. 11 © NOKIA mobile-security.PPT/ 11/12/2011 / N.Asokan (NRC/COM)
  • 12. 12 © NOKIA mobile-security.PPT/ 11/12/2011 / N.Asokan (NRC/COM)
  • 13. • Location Dependent Data (LDD):- The class of data whose value is functionally dependent on location. Thus the value of location determines the correct value of data. Ex- City tax, City area. • Location Independent Data (LID):- The class of data whose value is functionally independent on location. Thus the value of location does not determines the correct value of data. Ex- Person name , account nuber. 13 © NOKIA mobile-security.PPT/ 11/12/2011 / N.Asokan (NRC/COM)
  • 14. 14 © NOKIA mobile-security.PPT/ 11/12/2011 / N.Asokan (NRC/COM)
  • 15. • The mobile database and the central database have to be synchronized at specific times. We have selected the secure http protocol (https) to perform the necessary synchronization operations between the mobile and the central database. More precisely we use https with server and client authentication. This choice assures: – Confidentiality of the data that is transferred. – Authentication of the server computer. – Authentication of the client computer. 15 © NOKIA mobile-security.PPT/ 11/12/2011 / N.Asokan (NRC/COM)
  • 16. The local database on the mobile device is encrypted and each time the user opens the mobile database, he has to enter his password. In case the mobile device is stolen or violated by an intruder, the data that is stored on the local database is not readable. The encryption algorithm is part of SQL Server Mobile Edition and unfortunately we were not able to find documentation for the specific algorithm. 16 © NOKIA mobile-security.PPT/ 11/12/2011 / N.Asokan (NRC/COM)
  • 17. For authoring operations, each user has access only to his own data. A set of database triggers implemented in the database server, check that the data manipulation operations of the user are valid. This check prevents all users from accidental or malicious modifications of data for which they have no authorization. More precisely, an author – can create new announcements that are signed with his name, – can delete or update announcements that are signed with his name, and – has no access to announcements created/signed by other users. 17 © NOKIA mobile-security.PPT/ 11/12/2011 / N.Asokan (NRC/COM)
  • 18. 18 © NOKIA mobile-security.PPT/ 11/12/2011 / N.Asokan (NRC/COM)