Mobile security

11,713 views

Published on

Threats in mobile and it's security .

Published in: Technology, Business
1 Comment
3 Likes
Statistics
Notes
  • For data visualization,data analytics,data intelligence and ERP Tools, online training with job placements, register at http://www.todaycourses.com
       Reply 
    Are you sure you want to  Yes  No
    Your message goes here
No Downloads
Views
Total views
11,713
On SlideShare
0
From Embeds
0
Number of Embeds
6
Actions
Shares
0
Downloads
452
Comments
1
Likes
3
Embeds 0
No embeds

No notes for slide

Mobile security

  1. 1. Prepared by, BASANT KUMAR 0801216257 CSE1 © NOKIA mobile-security.PPT/ 11/12/2011 / N.Asokan (NRC/COM)
  2. 2. 2 © NOKIA mobile-security.PPT/ 11/12/2011 / N.Asokan (NRC/COM)
  3. 3. 3 © NOKIA mobile-security.PPT/ 11/12/2011 / N.Asokan (NRC/COM)
  4. 4. 4 © NOKIA mobile-security.PPT/ 11/12/2011 / N.Asokan (NRC/COM)
  5. 5. • Mobile users must be able to work without a wireless connection due to poor or even non-existent connections. • Applications must be able to access local device/vehicle hardware, such as printers, bar code scanners, or GPS units (for mapping or Automatic Vehicle Location systems). • Bandwidth must be conserved (a common requirement on wireless networks that charge per megabyte or data transferred).5 © NOKIA mobile-security.PPT/ 11/12/2011 / N.Asokan (NRC/COM)
  6. 6. 6 © NOKIA mobile-security.PPT/ 11/12/2011 / N.Asokan (NRC/COM)
  7. 7. 7 © NOKIA mobile-security.PPT/ 11/12/2011 / N.Asokan (NRC/COM)
  8. 8. 8 © NOKIA mobile-security.PPT/ 11/12/2011 / N.Asokan (NRC/COM)
  9. 9. 9 © NOKIA mobile-security.PPT/ 11/12/2011 / N.Asokan (NRC/COM)
  10. 10. 10 © NOKIA mobile-security.PPT/ 11/12/2011 / N.Asokan (NRC/COM)
  11. 11. 11 © NOKIA mobile-security.PPT/ 11/12/2011 / N.Asokan (NRC/COM)
  12. 12. 12 © NOKIA mobile-security.PPT/ 11/12/2011 / N.Asokan (NRC/COM)
  13. 13. • Location Dependent Data (LDD):- The class of data whose value is functionally dependent on location. Thus the value of location determines the correct value of data. Ex- City tax, City area. • Location Independent Data (LID):- The class of data whose value is functionally independent on location. Thus the value of location does not determines the correct value of data. Ex- Person name , account nuber.13 © NOKIA mobile-security.PPT/ 11/12/2011 / N.Asokan (NRC/COM)
  14. 14. 14 © NOKIA mobile-security.PPT/ 11/12/2011 / N.Asokan (NRC/COM)
  15. 15. • The mobile database and the central database have to be synchronized at specific times. We have selected the secure http protocol (https) to perform the necessary synchronization operations between the mobile and the central database. More precisely we use https with server and client authentication. This choice assures: – Confidentiality of the data that is transferred. – Authentication of the server computer. – Authentication of the client computer.15 © NOKIA mobile-security.PPT/ 11/12/2011 / N.Asokan (NRC/COM)
  16. 16. The local database on the mobile device is encrypted and each time the user opens the mobile database, he has to enter his password. In case the mobile device is stolen or violated by an intruder, the data that is stored on the local database is not readable. The encryption algorithm is part of SQL Server Mobile Edition and unfortunately we were not able to find documentation for the specific algorithm.16 © NOKIA mobile-security.PPT/ 11/12/2011 / N.Asokan (NRC/COM)
  17. 17. For authoring operations, each user has access only to his own data. A set of database triggers implemented in the database server, check that the data manipulation operations of the user are valid. This check prevents all users from accidental or malicious modifications of data for which they have no authorization. More precisely, an author – can create new announcements that are signed with his name, – can delete or update announcements that are signed with his name, and – has no access to announcements created/signed by other users.17 © NOKIA mobile-security.PPT/ 11/12/2011 / N.Asokan (NRC/COM)
  18. 18. 18 © NOKIA mobile-security.PPT/ 11/12/2011 / N.Asokan (NRC/COM)

×