This Presentation will cover the attacks. defenses, protocols
Some contents are taken from http://www.ieeesb.ucy.ac.cy/files/2017/11/fundamentals.pdf ,Mobile Computing Technology , Applications and Service Creation by Ashoke K Talukder, Hasan Ahmed, Roopa R Yavagal, wiki and also some other sites.
2. Contents
21-11-20182
Mobile Computing
Attacks
Attack on Static Data
Attack on Dynamic Data
Components of Security
Measures of Defenses from the Attack
Techniques for ensuring Security
Security Protocols
Security Framework in Mobile Environment
3. Mobile Computing
21-11-20183
Mobile devices are
connected through
Wireless Networks.
Major concern –
Security
Necessary to have
robust security and
secure infrastructure.
5. Attacks
21-11-20185
Attacks are carried
out on the point of
vulnerability.
Attack on Static Data-
Virus deleting files or
jamming device
Attack on Dynamic
Data- Credit card
number theft while
transaction.
6. Attack on Static Data
21-11-20186
Virus: These are the type of programs that
propagates from one computer to another.
8. Attack on Static Data (cont’d…)
21-11-20188
Intrusion: These are people or software, which
enter into systems and perform functions without
the knowledge of the owner.
13. The attacker needs “MOM”!
21-11-201813
Method: the skills, knowledge, and tools with
which to be able to pull off the attack
Opportunity: the time and access to accomplish
the attack
Motive: a reason to want to perform this attack
against a particular system
15. Components of Security
(cont’d…)
21-11-201815
Confidentiality: It is a property where information
is kept secret from the unauthorized users.
How to ensure Confidentiality?
Encryption
Authorization
16. Components of Security
(cont’d…)
21-11-201816
Integrity
Keeping the information intact.
maintaining the consistency, accuracy, and
trustworthiness of data over its entire life cycle
How to ensure Integrity?
Checksums
Digital signatures
20. Techniques for ensuring Security
21-11-201820
Encryption
Maintains the confidentiality of data
Idea: Scramble the data so that they become
unreadable to the attacker.
Source:http://www.ieeesb.ucy.ac.cy/files/2017/1
1/fundamentals.pdf
21. Techniques for ensuring Security
(cont’d..)
21-11-201821
Types of Encryption
Symmetric Encryption
Asymmetric Encryption
25. Security Protocols
21-11-201825
SSL (Presentation Layer) – Security of data over
public networks like internet. (HTTPs)
TLS (Transport Layer) - Provide privacy and data
integrity between two communications
WTLS(Transport Layer) – Provide interface for
creating and terminating secure connections.
27. Security Framework in Mobile
Environment
21-11-201827
3GPP Security
Mobile Virtual Private Network
Multifactor Security
Smart Card Security
Mobile Virus
28. References
21-11-201828
Mobile Computing Technology , Applications and
Service Creation by Ashoke K Talukder, Hasan
Ahmed, Roopa R Yavagal.
http://www.ieeesb.ucy.ac.cy/files/2017/11/fundam
entals.pdf