Security in Symbian Operating System
            Mobile and Wireless Devices




     Kunal Bansal

     kbansal@cs.odu.edu
Overview
   Wireless Platforms
   Why Symbian Platform over Windows
   Security Layer in Architecture
   Security Modu...
Wireless Platforms
   These are the Operating Systems for devices which are
    mobile and include Windows Mobile OS and ...
Why Symbian Platform over Windows
   Was initially developed by leading cellular manufacturers
    such as Nokia, Motorol...
Security Layers in Architecture




   Symbian OS v9.0 Platform Security and Security Services
Security Layers in Architecture
                 (Cont)
   The security subsystem provides underlying support for
    sec...
Security Modules
                   CRYPTOGRAPHIC MODULE

   The cryptography module includes the following significant
 ...
Security Modules (Cont)
               CERTIFICATE MANAGEMENT MODULE

   The certificate management module is used for
  ...
Drawbacks
    Initial cost of the instrument is high (in the range of $200
     onwards) and this limits its spread and d...
Future Developments in Symbian Security

   Recent collaboration with arch rival Microsoft in March 2005
    which will c...
Summary
   Its birth took place to prevent the monopoly of Microsoft
    from spreading to the wireless market too and mo...
Slide shots



EXCEL SHEETS   BUFFER RECORDS   MINI POWEPOINT
Security in Symbian Operating System
Upcoming SlideShare
Loading in...5
×

Security in Symbian Operating System

776

Published on

Published in: Technology, Business
0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total Views
776
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
14
Comments
0
Likes
1
Embeds 0
No embeds

No notes for slide

Security in Symbian Operating System

  1. 1. Security in Symbian Operating System Mobile and Wireless Devices Kunal Bansal kbansal@cs.odu.edu
  2. 2. Overview  Wireless Platforms  Why Symbian Platform over Windows  Security Layer in Architecture  Security Modules  Integration With Other Devices  Drawbacks  Future Developments in Symbian Security  Summary  Questions & Comments
  3. 3. Wireless Platforms  These are the Operating Systems for devices which are mobile and include Windows Mobile OS and the Symbian OS.  Enables the user to perform tasks from anywhere in the world in a secure and reliable environment.  Applications include office documents, controlling remote objects and providing interconnectivity with other wireless devices using Bluetooth, WAP and Infrared.  Available as a standard on virtually every 2.5-3G phone and PDA.
  4. 4. Why Symbian Platform over Windows  Was initially developed by leading cellular manufacturers such as Nokia, Motorola and Ericsson to counter Microsoft Windows monopoly over the PC and wireless market.  Symbian platform is based on an open source code which allows independent software vendors to develop third party applications, services and services.  Cost is reduced dramatically since most of the software is developed by various cell phone makers resulting in intense competition and reduced costs for the end user.  Approximately 80% of the world’s 3G GSM phones operate on Symbian platforms 7.0 and above.
  5. 5. Security Layers in Architecture Symbian OS v9.0 Platform Security and Security Services
  6. 6. Security Layers in Architecture (Cont)  The security subsystem provides underlying support for secure communications protocols such as SSL and authentication of installable software using digital signatures.  Users are prompted the minute an unverified installation is about to take place.
  7. 7. Security Modules CRYPTOGRAPHIC MODULE  The cryptography module includes the following significant components:  Cryptography algorithms which allow data to be encrypted and decrypted and support ciphering.  Pseudo-random number generator for generating cryptographic keys.  Hash functions such as MD5, SHA1 and HMAC
  8. 8. Security Modules (Cont) CERTIFICATE MANAGEMENT MODULE  The certificate management module is used for authentication of other entities such as third-party developers and web servers to the user of the phone and vice versa.  Verification of trust of a certificate.  Storage and retrieval of certificates using the cryptographic token framework.  Assignment of trust status to a certificate on an application- by-application basis.
  9. 9. Drawbacks  Initial cost of the instrument is high (in the range of $200 onwards) and this limits its spread and development.  Majority of the software installation done by the user thereby not making it friendly for the end user.  Since source is open code, its vulnerable to attacks by mobile viruses such as ‘Cabir’ which was the world’s first mobile virus. BLUETOOTH ENABLED INFILTRATION AND INSTALLATION DETECTION AND DELETION
  10. 10. Future Developments in Symbian Security  Recent collaboration with arch rival Microsoft in March 2005 which will change the way in which end users communicate via email.  This move alone will allow roughly 400m users of Symbian phones to access Microsoft’s most secure client mail server in a Windows free environment.  This could eventually lead to information sharing among major vendors resulting in lowering of prices and eventually making the instrument widely available.
  11. 11. Summary  Its birth took place to prevent the monopoly of Microsoft from spreading to the wireless market too and most of us have not even realized the true potential of Symbian. Symbian is a British based company which has the support of almost all the existing manufactures.  Security itself will outgrow all expectations to be a multi-billion dollar industry.
  12. 12. Slide shots EXCEL SHEETS BUFFER RECORDS MINI POWEPOINT
  1. A particular slide catching your eye?

    Clipping is a handy way to collect important slides you want to go back to later.

×