Soumettre la recherche
Mettre en ligne
Mobile security
•
Télécharger en tant que PPTX, PDF
•
9 j'aime
•
19,768 vues
Basant Kumar
Suivre
Threats in mobile and it's security .
Lire moins
Lire la suite
Technologie
Business
Affichage du diaporama
Signaler
Partager
Affichage du diaporama
Signaler
Partager
1 sur 18
Télécharger maintenant
Recommandé
Literature Survey on Mobile Database Tools
Literature Survey on Mobile Database Tools
Sisuru Kekiriwaragodage
Mobile / Nomadic Databse
Mobile / Nomadic Databse
Rahul Sharma
Mobile Database and Service Oriented Architecture
Mobile Database and Service Oriented Architecture
Lucas Jellema
Lecture 4 mobile database system
Lecture 4 mobile database system
salbiahhamzah
Mobile Database ,alrazgi
Mobile Database ,alrazgi
alrazgi
Mobile databases
Mobile databases
Harsh Behl
Mobile databases
Mobile databases
Dabbal Singh Mahara
Mobile dbms
Mobile dbms
Tech_MX
Recommandé
Literature Survey on Mobile Database Tools
Literature Survey on Mobile Database Tools
Sisuru Kekiriwaragodage
Mobile / Nomadic Databse
Mobile / Nomadic Databse
Rahul Sharma
Mobile Database and Service Oriented Architecture
Mobile Database and Service Oriented Architecture
Lucas Jellema
Lecture 4 mobile database system
Lecture 4 mobile database system
salbiahhamzah
Mobile Database ,alrazgi
Mobile Database ,alrazgi
alrazgi
Mobile databases
Mobile databases
Harsh Behl
Mobile databases
Mobile databases
Dabbal Singh Mahara
Mobile dbms
Mobile dbms
Tech_MX
Unit 1 - mobile computing introduction
Unit 1 - mobile computing introduction
Vintesh Patel
Architecture of Mobile Computing
Architecture of Mobile Computing
JAINIK PATEL
Mobile Computing Architecture
Mobile Computing Architecture
Trinity Dwarka
Overview of mobile computing
Overview of mobile computing
VENNILAV6
The internet & the new information technology infrastructure
The internet & the new information technology infrastructure
Prof. Othman Alsalloum
2
2
Ankit Anand
Distributed Systems, Mobile Computing and Security
Distributed Systems, Mobile Computing and Security
Department of Computer Science, Aalto University
Knowledge on IT Infrastructure
Knowledge on IT Infrastructure
Lopamudra Das
Sdn whitepaper
Sdn whitepaper
Hari Sasank
5 - Infrastructure and Cloud Computing
5 - Infrastructure and Cloud Computing
Raymond Gao
Company profile TriCoSys Solutions Private Limited
Company profile TriCoSys Solutions Private Limited
Subodh Deshpande
Mobile Computing Complete Introduction
Mobile Computing Complete Introduction
Denis R
Network administration Book
Network administration Book
Muhammad Jawwad Hashmi
Client server based computing
Client server based computing
Mohammad Affan
Mobile agents in a distributed multimedia dabase system(synopsis)
Mobile agents in a distributed multimedia dabase system(synopsis)
Mumbai Academisc
IT Infrastructure Project
IT Infrastructure Project
Robert D. Williams
Information technology infrastructures by- neo arya
Information technology infrastructures by- neo arya
neoarya2012
Prachi gupta 8 a
Prachi gupta 8 a
EashaGupta
Ict infrastructure management
Ict infrastructure management
Paramaguru Kandasamy
Computer communication network
Computer communication network
himz676987
Intra mart accel platform 2021winter-en
Intra mart accel platform 2021winter-en
NTTDATA INTRAMART
IOT in 5G Training and Certification by TELCOMA Global
IOT in 5G Training and Certification by TELCOMA Global
Gaganpreet Singh Walia
Contenu connexe
Tendances
Unit 1 - mobile computing introduction
Unit 1 - mobile computing introduction
Vintesh Patel
Architecture of Mobile Computing
Architecture of Mobile Computing
JAINIK PATEL
Mobile Computing Architecture
Mobile Computing Architecture
Trinity Dwarka
Overview of mobile computing
Overview of mobile computing
VENNILAV6
The internet & the new information technology infrastructure
The internet & the new information technology infrastructure
Prof. Othman Alsalloum
2
2
Ankit Anand
Distributed Systems, Mobile Computing and Security
Distributed Systems, Mobile Computing and Security
Department of Computer Science, Aalto University
Knowledge on IT Infrastructure
Knowledge on IT Infrastructure
Lopamudra Das
Sdn whitepaper
Sdn whitepaper
Hari Sasank
5 - Infrastructure and Cloud Computing
5 - Infrastructure and Cloud Computing
Raymond Gao
Company profile TriCoSys Solutions Private Limited
Company profile TriCoSys Solutions Private Limited
Subodh Deshpande
Mobile Computing Complete Introduction
Mobile Computing Complete Introduction
Denis R
Network administration Book
Network administration Book
Muhammad Jawwad Hashmi
Client server based computing
Client server based computing
Mohammad Affan
Mobile agents in a distributed multimedia dabase system(synopsis)
Mobile agents in a distributed multimedia dabase system(synopsis)
Mumbai Academisc
IT Infrastructure Project
IT Infrastructure Project
Robert D. Williams
Information technology infrastructures by- neo arya
Information technology infrastructures by- neo arya
neoarya2012
Prachi gupta 8 a
Prachi gupta 8 a
EashaGupta
Ict infrastructure management
Ict infrastructure management
Paramaguru Kandasamy
Computer communication network
Computer communication network
himz676987
Tendances
(20)
Unit 1 - mobile computing introduction
Unit 1 - mobile computing introduction
Architecture of Mobile Computing
Architecture of Mobile Computing
Mobile Computing Architecture
Mobile Computing Architecture
Overview of mobile computing
Overview of mobile computing
The internet & the new information technology infrastructure
The internet & the new information technology infrastructure
2
2
Distributed Systems, Mobile Computing and Security
Distributed Systems, Mobile Computing and Security
Knowledge on IT Infrastructure
Knowledge on IT Infrastructure
Sdn whitepaper
Sdn whitepaper
5 - Infrastructure and Cloud Computing
5 - Infrastructure and Cloud Computing
Company profile TriCoSys Solutions Private Limited
Company profile TriCoSys Solutions Private Limited
Mobile Computing Complete Introduction
Mobile Computing Complete Introduction
Network administration Book
Network administration Book
Client server based computing
Client server based computing
Mobile agents in a distributed multimedia dabase system(synopsis)
Mobile agents in a distributed multimedia dabase system(synopsis)
IT Infrastructure Project
IT Infrastructure Project
Information technology infrastructures by- neo arya
Information technology infrastructures by- neo arya
Prachi gupta 8 a
Prachi gupta 8 a
Ict infrastructure management
Ict infrastructure management
Computer communication network
Computer communication network
Similaire à Mobile security
Intra mart accel platform 2021winter-en
Intra mart accel platform 2021winter-en
NTTDATA INTRAMART
IOT in 5G Training and Certification by TELCOMA Global
IOT in 5G Training and Certification by TELCOMA Global
Gaganpreet Singh Walia
IOT in 5G Training and Certification by TELCOMA Global
IOT in 5G Training and Certification by TELCOMA Global
Gaganpreet Singh Walia
Decision to offload the task to Cloud for increasing energy efficiency of Mob...
Decision to offload the task to Cloud for increasing energy efficiency of Mob...
IRJET Journal
Mobile security
Mobile security
SanjaySharma1059
Assessment to Delegate the Task to Cloud for Increasing Energy Efficiency of ...
Assessment to Delegate the Task to Cloud for Increasing Energy Efficiency of ...
IRJET Journal
Cisco Connect Vancouver 2017 - Optimizing your client's wi fi experience
Cisco Connect Vancouver 2017 - Optimizing your client's wi fi experience
Cisco Canada
802.11 Wireless LAN Vulnerability Assessment (ITSPSR-21A)
802.11 Wireless LAN Vulnerability Assessment (ITSPSR-21A)
Sunghun Kim
Sudhakar Resume
Sudhakar Resume
Sudhakar Singh
Securing Network-Attached HSMs: The SafeNet Luna SA Three-Layer Authenticatio...
Securing Network-Attached HSMs: The SafeNet Luna SA Three-Layer Authenticatio...
SafeNet
Sangfor SSL VPN Brochure
Sangfor SSL VPN Brochure
Sangfor Technologies USA
IEEE 2014 NS2 Projects
IEEE 2014 NS2 Projects
Vijay Karan
IEEE 2014 NS2 Projects
IEEE 2014 NS2 Projects
Vijay Karan
Week 7 lecture material
Week 7 lecture material
Ankit Gupta
Telco Private Clouds - The RISE and SHINE
Telco Private Clouds - The RISE and SHINE
Imad Ayad
What SD-WAN Means for Enterprise
What SD-WAN Means for Enterprise
Toshal Dudhwala
Advanced Integrated Communication System
Advanced Integrated Communication System
Mayank Srivastava
Net motion mobility_intro_overview
Net motion mobility_intro_overview
Stef Coetzee
Mobile Backend as a Service via Cloud Foundry
Mobile Backend as a Service via Cloud Foundry
天青 王
Running head NETWORK INFRASTRUCTURE AND SECURITY 1NETWOR.docx
Running head NETWORK INFRASTRUCTURE AND SECURITY 1NETWOR.docx
todd581
Similaire à Mobile security
(20)
Intra mart accel platform 2021winter-en
Intra mart accel platform 2021winter-en
IOT in 5G Training and Certification by TELCOMA Global
IOT in 5G Training and Certification by TELCOMA Global
IOT in 5G Training and Certification by TELCOMA Global
IOT in 5G Training and Certification by TELCOMA Global
Decision to offload the task to Cloud for increasing energy efficiency of Mob...
Decision to offload the task to Cloud for increasing energy efficiency of Mob...
Mobile security
Mobile security
Assessment to Delegate the Task to Cloud for Increasing Energy Efficiency of ...
Assessment to Delegate the Task to Cloud for Increasing Energy Efficiency of ...
Cisco Connect Vancouver 2017 - Optimizing your client's wi fi experience
Cisco Connect Vancouver 2017 - Optimizing your client's wi fi experience
802.11 Wireless LAN Vulnerability Assessment (ITSPSR-21A)
802.11 Wireless LAN Vulnerability Assessment (ITSPSR-21A)
Sudhakar Resume
Sudhakar Resume
Securing Network-Attached HSMs: The SafeNet Luna SA Three-Layer Authenticatio...
Securing Network-Attached HSMs: The SafeNet Luna SA Three-Layer Authenticatio...
Sangfor SSL VPN Brochure
Sangfor SSL VPN Brochure
IEEE 2014 NS2 Projects
IEEE 2014 NS2 Projects
IEEE 2014 NS2 Projects
IEEE 2014 NS2 Projects
Week 7 lecture material
Week 7 lecture material
Telco Private Clouds - The RISE and SHINE
Telco Private Clouds - The RISE and SHINE
What SD-WAN Means for Enterprise
What SD-WAN Means for Enterprise
Advanced Integrated Communication System
Advanced Integrated Communication System
Net motion mobility_intro_overview
Net motion mobility_intro_overview
Mobile Backend as a Service via Cloud Foundry
Mobile Backend as a Service via Cloud Foundry
Running head NETWORK INFRASTRUCTURE AND SECURITY 1NETWOR.docx
Running head NETWORK INFRASTRUCTURE AND SECURITY 1NETWOR.docx
Dernier
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
rafiqahmad00786416
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
Remote DBA Services
Architecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
apidays
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Juan lago vázquez
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
Khushali Kathiriya
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
sammart93
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
UiPathCommunity
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
apidays
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
sudhanshuwaghmare1
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Edi Saputra
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
johnbeverley2021
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
Christopher Logan Kennedy
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
Dropbox
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Orbitshub
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
Nanddeep Nachan
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
WSO2
Dernier
(20)
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
Architecting Cloud Native Applications
Architecting Cloud Native Applications
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
Mobile security
1.
Prepared by,
BASANT KUMAR 0801216257 CSE 1 © NOKIA mobile-security.PPT/ 11/12/2011 / N.Asokan (NRC/COM)
2.
2
© NOKIA mobile-security.PPT/ 11/12/2011 / N.Asokan (NRC/COM)
3.
3
© NOKIA mobile-security.PPT/ 11/12/2011 / N.Asokan (NRC/COM)
4.
4
© NOKIA mobile-security.PPT/ 11/12/2011 / N.Asokan (NRC/COM)
5.
• Mobile users
must be able to work without a wireless connection due to poor or even non-existent connections. • Applications must be able to access local device/vehicle hardware, such as printers, bar code scanners, or GPS units (for mapping or Automatic Vehicle Location systems). • Bandwidth must be conserved (a common requirement on wireless networks that charge per megabyte or data transferred). 5 © NOKIA mobile-security.PPT/ 11/12/2011 / N.Asokan (NRC/COM)
6.
6
© NOKIA mobile-security.PPT/ 11/12/2011 / N.Asokan (NRC/COM)
7.
7
© NOKIA mobile-security.PPT/ 11/12/2011 / N.Asokan (NRC/COM)
8.
8
© NOKIA mobile-security.PPT/ 11/12/2011 / N.Asokan (NRC/COM)
9.
9
© NOKIA mobile-security.PPT/ 11/12/2011 / N.Asokan (NRC/COM)
10.
10
© NOKIA mobile-security.PPT/ 11/12/2011 / N.Asokan (NRC/COM)
11.
11
© NOKIA mobile-security.PPT/ 11/12/2011 / N.Asokan (NRC/COM)
12.
12
© NOKIA mobile-security.PPT/ 11/12/2011 / N.Asokan (NRC/COM)
13.
• Location Dependent
Data (LDD):- The class of data whose value is functionally dependent on location. Thus the value of location determines the correct value of data. Ex- City tax, City area. • Location Independent Data (LID):- The class of data whose value is functionally independent on location. Thus the value of location does not determines the correct value of data. Ex- Person name , account nuber. 13 © NOKIA mobile-security.PPT/ 11/12/2011 / N.Asokan (NRC/COM)
14.
14
© NOKIA mobile-security.PPT/ 11/12/2011 / N.Asokan (NRC/COM)
15.
• The mobile
database and the central database have to be synchronized at specific times. We have selected the secure http protocol (https) to perform the necessary synchronization operations between the mobile and the central database. More precisely we use https with server and client authentication. This choice assures: – Confidentiality of the data that is transferred. – Authentication of the server computer. – Authentication of the client computer. 15 © NOKIA mobile-security.PPT/ 11/12/2011 / N.Asokan (NRC/COM)
16.
The local database
on the mobile device is encrypted and each time the user opens the mobile database, he has to enter his password. In case the mobile device is stolen or violated by an intruder, the data that is stored on the local database is not readable. The encryption algorithm is part of SQL Server Mobile Edition and unfortunately we were not able to find documentation for the specific algorithm. 16 © NOKIA mobile-security.PPT/ 11/12/2011 / N.Asokan (NRC/COM)
17.
For authoring operations,
each user has access only to his own data. A set of database triggers implemented in the database server, check that the data manipulation operations of the user are valid. This check prevents all users from accidental or malicious modifications of data for which they have no authorization. More precisely, an author – can create new announcements that are signed with his name, – can delete or update announcements that are signed with his name, and – has no access to announcements created/signed by other users. 17 © NOKIA mobile-security.PPT/ 11/12/2011 / N.Asokan (NRC/COM)
18.
18
© NOKIA mobile-security.PPT/ 11/12/2011 / N.Asokan (NRC/COM)
Télécharger maintenant