• Share
  • Email
  • Embed
  • Like
  • Save
  • Private Content
Mobile database security threats

Mobile database security threats






Total Views
Views on SlideShare
Embed Views



0 Embeds 0

No embeds



Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.


12 of 2 previous next

  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
Post Comment
Edit your comment

    Mobile database security threats Mobile database security threats Presentation Transcript

    • Mobile Database Security Threats By N.Avani(08Q61A0584)
    • Introduction The purpose of this document is to provide information to users and organizations on the security capabilities of Worldwide Interoperability for mobile database system and provide recommendations on securing mobile database technologies effectively to users and organizations employing them. In the existing research, there is lack of integrated presentation of solutions to all the security issues of mobile database system, which is important for researchers and developers of mobile database.
    • new First, security issues divided to four fields that they areimportant from many aspects. Mobile device, operating system on mobile device, mobiledatabase and mobile tork are four fields that we will discusssecurity issues.
    • History A mobile database is a database that can be connected toby a mobile computingdevice over a mobile network. Theclient and server have wireless connections. A cacheismaintained to hold frequent data and transactions so that they are not lost due connection failure An example of this is a mobile workforce. In this scenariouser would require to access and update information fromfiles in the home directories on a server or customerrecords from a database.
    • Need for mobile Databases•users must be able to work without a wireless connection due to poor or even non-existent connections.•Applications must provide significant interactivity.•Applications must be able to access local device/vehicle hardware, such aprinters, bar code scanners, or GPS units (for mapping or Automatic Vehicle Location systems).•Bandwidth must be conserved (a common requirement on wireless netwo that charge per megabyte or data transferred).•Users dont require access to truly live data, only recently modified data.•Limited life of power supply(battery)•The changing topology of network
    • Working process• For any mobile architecture, things to be considered are:• Users are not attached to a fixed geographical location• Mobile computing devices: low-power, low-cost, portable• Wireless networks• Mobile computing constraints
    • • Three partiesMobile databases typically involve three parties:1.fixed hosts2.mobile units3.base stations
    • Advantages & Disadvantages1)Security of mobile device.2)security of operating system on mobile device.3)security of mobile database and security of mobile network.4)security vulnerabilities on mobile database and try to applyappropriate technique to decrease side affect for mobile databasesecurity.
    • Disadvantages1)Device corruption2)Malicious software or viruses on mobile devices
    • ConclusionDistributed Database Security is integral to the design andfunction of a distributed database. There are three importantpieces to Distributed database security; Physical, User, andNetwork. These pieces work in conjunction with policiesstandards, and procedures. Policies are directions that supporta goal.Solutions described above must be applied to a distributeddatabase on a goal. Also, human factor and traits should not beignored in this system. Because, a user as who one uses thissystem, would be considered as an effective factor for security.