Enviar búsqueda
Cargar
Mobile security
•
Descargar como PPTX, PDF
•
9 recomendaciones
•
19,768 vistas
Basant Kumar
Seguir
Threats in mobile and it's security .
Leer menos
Leer más
Tecnología
Empresariales
Denunciar
Compartir
Denunciar
Compartir
1 de 18
Descargar ahora
Recomendados
Literature Survey on Mobile Database Tools
Literature Survey on Mobile Database Tools
Sisuru Kekiriwaragodage
Mobile / Nomadic Databse
Mobile / Nomadic Databse
Rahul Sharma
Mobile Database and Service Oriented Architecture
Mobile Database and Service Oriented Architecture
Lucas Jellema
Lecture 4 mobile database system
Lecture 4 mobile database system
salbiahhamzah
Mobile Database ,alrazgi
Mobile Database ,alrazgi
alrazgi
Mobile databases
Mobile databases
Harsh Behl
Mobile databases
Mobile databases
Dabbal Singh Mahara
Mobile dbms
Mobile dbms
Tech_MX
Recomendados
Literature Survey on Mobile Database Tools
Literature Survey on Mobile Database Tools
Sisuru Kekiriwaragodage
Mobile / Nomadic Databse
Mobile / Nomadic Databse
Rahul Sharma
Mobile Database and Service Oriented Architecture
Mobile Database and Service Oriented Architecture
Lucas Jellema
Lecture 4 mobile database system
Lecture 4 mobile database system
salbiahhamzah
Mobile Database ,alrazgi
Mobile Database ,alrazgi
alrazgi
Mobile databases
Mobile databases
Harsh Behl
Mobile databases
Mobile databases
Dabbal Singh Mahara
Mobile dbms
Mobile dbms
Tech_MX
Unit 1 - mobile computing introduction
Unit 1 - mobile computing introduction
Vintesh Patel
Architecture of Mobile Computing
Architecture of Mobile Computing
JAINIK PATEL
Mobile Computing Architecture
Mobile Computing Architecture
Trinity Dwarka
Overview of mobile computing
Overview of mobile computing
VENNILAV6
The internet & the new information technology infrastructure
The internet & the new information technology infrastructure
Prof. Othman Alsalloum
2
2
Ankit Anand
Distributed Systems, Mobile Computing and Security
Distributed Systems, Mobile Computing and Security
Department of Computer Science, Aalto University
Knowledge on IT Infrastructure
Knowledge on IT Infrastructure
Lopamudra Das
Sdn whitepaper
Sdn whitepaper
Hari Sasank
5 - Infrastructure and Cloud Computing
5 - Infrastructure and Cloud Computing
Raymond Gao
Company profile TriCoSys Solutions Private Limited
Company profile TriCoSys Solutions Private Limited
Subodh Deshpande
Mobile Computing Complete Introduction
Mobile Computing Complete Introduction
Denis R
Network administration Book
Network administration Book
Muhammad Jawwad Hashmi
Client server based computing
Client server based computing
Mohammad Affan
Mobile agents in a distributed multimedia dabase system(synopsis)
Mobile agents in a distributed multimedia dabase system(synopsis)
Mumbai Academisc
IT Infrastructure Project
IT Infrastructure Project
Robert D. Williams
Information technology infrastructures by- neo arya
Information technology infrastructures by- neo arya
neoarya2012
Prachi gupta 8 a
Prachi gupta 8 a
EashaGupta
Ict infrastructure management
Ict infrastructure management
Paramaguru Kandasamy
Computer communication network
Computer communication network
himz676987
Intra mart accel platform 2021winter-en
Intra mart accel platform 2021winter-en
NTTDATA INTRAMART
IOT in 5G Training and Certification by TELCOMA Global
IOT in 5G Training and Certification by TELCOMA Global
Gaganpreet Singh Walia
Más contenido relacionado
La actualidad más candente
Unit 1 - mobile computing introduction
Unit 1 - mobile computing introduction
Vintesh Patel
Architecture of Mobile Computing
Architecture of Mobile Computing
JAINIK PATEL
Mobile Computing Architecture
Mobile Computing Architecture
Trinity Dwarka
Overview of mobile computing
Overview of mobile computing
VENNILAV6
The internet & the new information technology infrastructure
The internet & the new information technology infrastructure
Prof. Othman Alsalloum
2
2
Ankit Anand
Distributed Systems, Mobile Computing and Security
Distributed Systems, Mobile Computing and Security
Department of Computer Science, Aalto University
Knowledge on IT Infrastructure
Knowledge on IT Infrastructure
Lopamudra Das
Sdn whitepaper
Sdn whitepaper
Hari Sasank
5 - Infrastructure and Cloud Computing
5 - Infrastructure and Cloud Computing
Raymond Gao
Company profile TriCoSys Solutions Private Limited
Company profile TriCoSys Solutions Private Limited
Subodh Deshpande
Mobile Computing Complete Introduction
Mobile Computing Complete Introduction
Denis R
Network administration Book
Network administration Book
Muhammad Jawwad Hashmi
Client server based computing
Client server based computing
Mohammad Affan
Mobile agents in a distributed multimedia dabase system(synopsis)
Mobile agents in a distributed multimedia dabase system(synopsis)
Mumbai Academisc
IT Infrastructure Project
IT Infrastructure Project
Robert D. Williams
Information technology infrastructures by- neo arya
Information technology infrastructures by- neo arya
neoarya2012
Prachi gupta 8 a
Prachi gupta 8 a
EashaGupta
Ict infrastructure management
Ict infrastructure management
Paramaguru Kandasamy
Computer communication network
Computer communication network
himz676987
La actualidad más candente
(20)
Unit 1 - mobile computing introduction
Unit 1 - mobile computing introduction
Architecture of Mobile Computing
Architecture of Mobile Computing
Mobile Computing Architecture
Mobile Computing Architecture
Overview of mobile computing
Overview of mobile computing
The internet & the new information technology infrastructure
The internet & the new information technology infrastructure
2
2
Distributed Systems, Mobile Computing and Security
Distributed Systems, Mobile Computing and Security
Knowledge on IT Infrastructure
Knowledge on IT Infrastructure
Sdn whitepaper
Sdn whitepaper
5 - Infrastructure and Cloud Computing
5 - Infrastructure and Cloud Computing
Company profile TriCoSys Solutions Private Limited
Company profile TriCoSys Solutions Private Limited
Mobile Computing Complete Introduction
Mobile Computing Complete Introduction
Network administration Book
Network administration Book
Client server based computing
Client server based computing
Mobile agents in a distributed multimedia dabase system(synopsis)
Mobile agents in a distributed multimedia dabase system(synopsis)
IT Infrastructure Project
IT Infrastructure Project
Information technology infrastructures by- neo arya
Information technology infrastructures by- neo arya
Prachi gupta 8 a
Prachi gupta 8 a
Ict infrastructure management
Ict infrastructure management
Computer communication network
Computer communication network
Similar a Mobile security
Intra mart accel platform 2021winter-en
Intra mart accel platform 2021winter-en
NTTDATA INTRAMART
IOT in 5G Training and Certification by TELCOMA Global
IOT in 5G Training and Certification by TELCOMA Global
Gaganpreet Singh Walia
IOT in 5G Training and Certification by TELCOMA Global
IOT in 5G Training and Certification by TELCOMA Global
Gaganpreet Singh Walia
Decision to offload the task to Cloud for increasing energy efficiency of Mob...
Decision to offload the task to Cloud for increasing energy efficiency of Mob...
IRJET Journal
Mobile security
Mobile security
SanjaySharma1059
Assessment to Delegate the Task to Cloud for Increasing Energy Efficiency of ...
Assessment to Delegate the Task to Cloud for Increasing Energy Efficiency of ...
IRJET Journal
Cisco Connect Vancouver 2017 - Optimizing your client's wi fi experience
Cisco Connect Vancouver 2017 - Optimizing your client's wi fi experience
Cisco Canada
802.11 Wireless LAN Vulnerability Assessment (ITSPSR-21A)
802.11 Wireless LAN Vulnerability Assessment (ITSPSR-21A)
Sunghun Kim
Sudhakar Resume
Sudhakar Resume
Sudhakar Singh
Securing Network-Attached HSMs: The SafeNet Luna SA Three-Layer Authenticatio...
Securing Network-Attached HSMs: The SafeNet Luna SA Three-Layer Authenticatio...
SafeNet
Sangfor SSL VPN Brochure
Sangfor SSL VPN Brochure
Sangfor Technologies USA
IEEE 2014 NS2 Projects
IEEE 2014 NS2 Projects
Vijay Karan
IEEE 2014 NS2 Projects
IEEE 2014 NS2 Projects
Vijay Karan
Week 7 lecture material
Week 7 lecture material
Ankit Gupta
Telco Private Clouds - The RISE and SHINE
Telco Private Clouds - The RISE and SHINE
Imad Ayad
What SD-WAN Means for Enterprise
What SD-WAN Means for Enterprise
Toshal Dudhwala
Advanced Integrated Communication System
Advanced Integrated Communication System
Mayank Srivastava
Net motion mobility_intro_overview
Net motion mobility_intro_overview
Stef Coetzee
Mobile Backend as a Service via Cloud Foundry
Mobile Backend as a Service via Cloud Foundry
天青 王
Running head NETWORK INFRASTRUCTURE AND SECURITY 1NETWOR.docx
Running head NETWORK INFRASTRUCTURE AND SECURITY 1NETWOR.docx
todd581
Similar a Mobile security
(20)
Intra mart accel platform 2021winter-en
Intra mart accel platform 2021winter-en
IOT in 5G Training and Certification by TELCOMA Global
IOT in 5G Training and Certification by TELCOMA Global
IOT in 5G Training and Certification by TELCOMA Global
IOT in 5G Training and Certification by TELCOMA Global
Decision to offload the task to Cloud for increasing energy efficiency of Mob...
Decision to offload the task to Cloud for increasing energy efficiency of Mob...
Mobile security
Mobile security
Assessment to Delegate the Task to Cloud for Increasing Energy Efficiency of ...
Assessment to Delegate the Task to Cloud for Increasing Energy Efficiency of ...
Cisco Connect Vancouver 2017 - Optimizing your client's wi fi experience
Cisco Connect Vancouver 2017 - Optimizing your client's wi fi experience
802.11 Wireless LAN Vulnerability Assessment (ITSPSR-21A)
802.11 Wireless LAN Vulnerability Assessment (ITSPSR-21A)
Sudhakar Resume
Sudhakar Resume
Securing Network-Attached HSMs: The SafeNet Luna SA Three-Layer Authenticatio...
Securing Network-Attached HSMs: The SafeNet Luna SA Three-Layer Authenticatio...
Sangfor SSL VPN Brochure
Sangfor SSL VPN Brochure
IEEE 2014 NS2 Projects
IEEE 2014 NS2 Projects
IEEE 2014 NS2 Projects
IEEE 2014 NS2 Projects
Week 7 lecture material
Week 7 lecture material
Telco Private Clouds - The RISE and SHINE
Telco Private Clouds - The RISE and SHINE
What SD-WAN Means for Enterprise
What SD-WAN Means for Enterprise
Advanced Integrated Communication System
Advanced Integrated Communication System
Net motion mobility_intro_overview
Net motion mobility_intro_overview
Mobile Backend as a Service via Cloud Foundry
Mobile Backend as a Service via Cloud Foundry
Running head NETWORK INFRASTRUCTURE AND SECURITY 1NETWOR.docx
Running head NETWORK INFRASTRUCTURE AND SECURITY 1NETWOR.docx
Último
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
apidays
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
The Digital Insurer
Slack Application Development 101 Slides
Slack Application Development 101 Slides
praypatel2
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
Safe Software
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
Martijn de Jong
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
The Digital Insurer
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
Delhi Call girls
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
Michael W. Hawkins
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
Paola De la Torre
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Neo4j
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
V3cube
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
debabhi2
🐬 The future of MySQL is Postgres 🐘
🐬 The future of MySQL is Postgres 🐘
RTylerCroy
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Igalia
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Miguel Araújo
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
Delhi Call girls
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
Anna Loughnan Colquhoun
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
gurkirankumar98700
Último
(20)
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
Slack Application Development 101 Slides
Slack Application Development 101 Slides
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
🐬 The future of MySQL is Postgres 🐘
🐬 The future of MySQL is Postgres 🐘
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Mobile security
1.
Prepared by,
BASANT KUMAR 0801216257 CSE 1 © NOKIA mobile-security.PPT/ 11/12/2011 / N.Asokan (NRC/COM)
2.
2
© NOKIA mobile-security.PPT/ 11/12/2011 / N.Asokan (NRC/COM)
3.
3
© NOKIA mobile-security.PPT/ 11/12/2011 / N.Asokan (NRC/COM)
4.
4
© NOKIA mobile-security.PPT/ 11/12/2011 / N.Asokan (NRC/COM)
5.
• Mobile users
must be able to work without a wireless connection due to poor or even non-existent connections. • Applications must be able to access local device/vehicle hardware, such as printers, bar code scanners, or GPS units (for mapping or Automatic Vehicle Location systems). • Bandwidth must be conserved (a common requirement on wireless networks that charge per megabyte or data transferred). 5 © NOKIA mobile-security.PPT/ 11/12/2011 / N.Asokan (NRC/COM)
6.
6
© NOKIA mobile-security.PPT/ 11/12/2011 / N.Asokan (NRC/COM)
7.
7
© NOKIA mobile-security.PPT/ 11/12/2011 / N.Asokan (NRC/COM)
8.
8
© NOKIA mobile-security.PPT/ 11/12/2011 / N.Asokan (NRC/COM)
9.
9
© NOKIA mobile-security.PPT/ 11/12/2011 / N.Asokan (NRC/COM)
10.
10
© NOKIA mobile-security.PPT/ 11/12/2011 / N.Asokan (NRC/COM)
11.
11
© NOKIA mobile-security.PPT/ 11/12/2011 / N.Asokan (NRC/COM)
12.
12
© NOKIA mobile-security.PPT/ 11/12/2011 / N.Asokan (NRC/COM)
13.
• Location Dependent
Data (LDD):- The class of data whose value is functionally dependent on location. Thus the value of location determines the correct value of data. Ex- City tax, City area. • Location Independent Data (LID):- The class of data whose value is functionally independent on location. Thus the value of location does not determines the correct value of data. Ex- Person name , account nuber. 13 © NOKIA mobile-security.PPT/ 11/12/2011 / N.Asokan (NRC/COM)
14.
14
© NOKIA mobile-security.PPT/ 11/12/2011 / N.Asokan (NRC/COM)
15.
• The mobile
database and the central database have to be synchronized at specific times. We have selected the secure http protocol (https) to perform the necessary synchronization operations between the mobile and the central database. More precisely we use https with server and client authentication. This choice assures: – Confidentiality of the data that is transferred. – Authentication of the server computer. – Authentication of the client computer. 15 © NOKIA mobile-security.PPT/ 11/12/2011 / N.Asokan (NRC/COM)
16.
The local database
on the mobile device is encrypted and each time the user opens the mobile database, he has to enter his password. In case the mobile device is stolen or violated by an intruder, the data that is stored on the local database is not readable. The encryption algorithm is part of SQL Server Mobile Edition and unfortunately we were not able to find documentation for the specific algorithm. 16 © NOKIA mobile-security.PPT/ 11/12/2011 / N.Asokan (NRC/COM)
17.
For authoring operations,
each user has access only to his own data. A set of database triggers implemented in the database server, check that the data manipulation operations of the user are valid. This check prevents all users from accidental or malicious modifications of data for which they have no authorization. More precisely, an author – can create new announcements that are signed with his name, – can delete or update announcements that are signed with his name, and – has no access to announcements created/signed by other users. 17 © NOKIA mobile-security.PPT/ 11/12/2011 / N.Asokan (NRC/COM)
18.
18
© NOKIA mobile-security.PPT/ 11/12/2011 / N.Asokan (NRC/COM)
Descargar ahora