• Share
  • Email
  • Embed
  • Like
  • Save
  • Private Content
Mobile database security threats
 

Mobile database security threats

on

  • 2,363 views

 

Statistics

Views

Total Views
2,363
Views on SlideShare
2,363
Embed Views
0

Actions

Likes
1
Downloads
64
Comments
2

0 Embeds 0

No embeds

Accessibility

Categories

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel

12 of 2 previous next

  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

    Mobile database security threats Mobile database security threats Presentation Transcript

    • Mobile Database Security Threats By N.Avani(08Q61A0584)
    • Introduction The purpose of this document is to provide information to users and organizations on the security capabilities of Worldwide Interoperability for mobile database system and provide recommendations on securing mobile database technologies effectively to users and organizations employing them. In the existing research, there is lack of integrated presentation of solutions to all the security issues of mobile database system, which is important for researchers and developers of mobile database.
    • new First, security issues divided to four fields that they areimportant from many aspects. Mobile device, operating system on mobile device, mobiledatabase and mobile tork are four fields that we will discusssecurity issues.
    • History A mobile database is a database that can be connected toby a mobile computingdevice over a mobile network. Theclient and server have wireless connections. A cacheismaintained to hold frequent data and transactions so that they are not lost due connection failure An example of this is a mobile workforce. In this scenariouser would require to access and update information fromfiles in the home directories on a server or customerrecords from a database.
    • Need for mobile Databases•users must be able to work without a wireless connection due to poor or even non-existent connections.•Applications must provide significant interactivity.•Applications must be able to access local device/vehicle hardware, such aprinters, bar code scanners, or GPS units (for mapping or Automatic Vehicle Location systems).•Bandwidth must be conserved (a common requirement on wireless netwo that charge per megabyte or data transferred).•Users dont require access to truly live data, only recently modified data.•Limited life of power supply(battery)•The changing topology of network
    • Working process• For any mobile architecture, things to be considered are:• Users are not attached to a fixed geographical location• Mobile computing devices: low-power, low-cost, portable• Wireless networks• Mobile computing constraints
    • • Three partiesMobile databases typically involve three parties:1.fixed hosts2.mobile units3.base stations
    • Advantages & Disadvantages1)Security of mobile device.2)security of operating system on mobile device.3)security of mobile database and security of mobile network.4)security vulnerabilities on mobile database and try to applyappropriate technique to decrease side affect for mobile databasesecurity.
    • Disadvantages1)Device corruption2)Malicious software or viruses on mobile devices
    • ConclusionDistributed Database Security is integral to the design andfunction of a distributed database. There are three importantpieces to Distributed database security; Physical, User, andNetwork. These pieces work in conjunction with policiesstandards, and procedures. Policies are directions that supporta goal.Solutions described above must be applied to a distributeddatabase on a goal. Also, human factor and traits should not beignored in this system. Because, a user as who one uses thissystem, would be considered as an effective factor for security.
    • THANKYOU