Mobile Computing - Security Issues - Advisor : Dr. Celeste Team Number : 6 941633 張耕瑋 941634...
-
Upload
philomena-ferguson -
Category
Documents
-
view
233 -
download
0
Transcript of Mobile Computing - Security Issues - Advisor : Dr. Celeste Team Number : 6 941633 張耕瑋 941634...
![Page 1: Mobile Computing - Security Issues - Advisor : Dr. Celeste Team Number : 6 941633 張耕瑋 941634 黃峻亨 941636 楊銘鴻 941641 李昌諭 941718 吳政穎 941635 陳建廷.](https://reader035.fdocuments.net/reader035/viewer/2022081420/56649e035503460f94aef0c5/html5/thumbnails/1.jpg)
Advisor : Dr. CelesteTeam Number : 6
941633 張耕瑋 941634 黃峻亨941636 楊銘鴻 941641 李昌諭941718 吳政穎 941635 陳建廷
![Page 2: Mobile Computing - Security Issues - Advisor : Dr. Celeste Team Number : 6 941633 張耕瑋 941634 黃峻亨 941636 楊銘鴻 941641 李昌諭 941718 吳政穎 941635 陳建廷.](https://reader035.fdocuments.net/reader035/viewer/2022081420/56649e035503460f94aef0c5/html5/thumbnails/2.jpg)
Introduction to Mobile Computing Security Issues of Mobile Computing Security Policies Security Prevent Applications and Enterprise Case
![Page 3: Mobile Computing - Security Issues - Advisor : Dr. Celeste Team Number : 6 941633 張耕瑋 941634 黃峻亨 941636 楊銘鴻 941641 李昌諭 941718 吳政穎 941635 陳建廷.](https://reader035.fdocuments.net/reader035/viewer/2022081420/56649e035503460f94aef0c5/html5/thumbnails/3.jpg)
Definition◦ Mobile computing & Ubiquitous computing
Features◦ Technical and other limitations of mobile
computing Insufficient bandwidth Security standards Power consumption Transmission interferences Potential health hazards Human interface with device
。Wireless communication and network
![Page 4: Mobile Computing - Security Issues - Advisor : Dr. Celeste Team Number : 6 941633 張耕瑋 941634 黃峻亨 941636 楊銘鴻 941641 李昌諭 941718 吳政穎 941635 陳建廷.](https://reader035.fdocuments.net/reader035/viewer/2022081420/56649e035503460f94aef0c5/html5/thumbnails/4.jpg)
Data is cited from www.SearchMobileComputing.com
![Page 5: Mobile Computing - Security Issues - Advisor : Dr. Celeste Team Number : 6 941633 張耕瑋 941634 黃峻亨 941636 楊銘鴻 941641 李昌諭 941718 吳政穎 941635 陳建廷.](https://reader035.fdocuments.net/reader035/viewer/2022081420/56649e035503460f94aef0c5/html5/thumbnails/5.jpg)
Data is cited from www.SearchMobileComputing.com
![Page 6: Mobile Computing - Security Issues - Advisor : Dr. Celeste Team Number : 6 941633 張耕瑋 941634 黃峻亨 941636 楊銘鴻 941641 李昌諭 941718 吳政穎 941635 陳建廷.](https://reader035.fdocuments.net/reader035/viewer/2022081420/56649e035503460f94aef0c5/html5/thumbnails/6.jpg)
Security is major issue◦Protection of Mobile Devices◦Software Security – program vulnerabilities
◦Security Protocols - authentication Different architecture has different security vulnerabilities
![Page 7: Mobile Computing - Security Issues - Advisor : Dr. Celeste Team Number : 6 941633 張耕瑋 941634 黃峻亨 941636 楊銘鴻 941641 李昌諭 941718 吳政穎 941635 陳建廷.](https://reader035.fdocuments.net/reader035/viewer/2022081420/56649e035503460f94aef0c5/html5/thumbnails/7.jpg)
Common security threat in wireless network can be categorized into two types:◦Passive - difficult to detect◦Active – possible to detect
![Page 8: Mobile Computing - Security Issues - Advisor : Dr. Celeste Team Number : 6 941633 張耕瑋 941634 黃峻亨 941636 楊銘鴻 941641 李昌諭 941718 吳政穎 941635 陳建廷.](https://reader035.fdocuments.net/reader035/viewer/2022081420/56649e035503460f94aef0c5/html5/thumbnails/8.jpg)
Interception Modification Fabrication Interruption
![Page 9: Mobile Computing - Security Issues - Advisor : Dr. Celeste Team Number : 6 941633 張耕瑋 941634 黃峻亨 941636 楊銘鴻 941641 李昌諭 941718 吳政穎 941635 陳建廷.](https://reader035.fdocuments.net/reader035/viewer/2022081420/56649e035503460f94aef0c5/html5/thumbnails/9.jpg)
![Page 10: Mobile Computing - Security Issues - Advisor : Dr. Celeste Team Number : 6 941633 張耕瑋 941634 黃峻亨 941636 楊銘鴻 941641 李昌諭 941718 吳政穎 941635 陳建廷.](https://reader035.fdocuments.net/reader035/viewer/2022081420/56649e035503460f94aef0c5/html5/thumbnails/10.jpg)
Virus and Worms Denial of Service Intrusion
![Page 11: Mobile Computing - Security Issues - Advisor : Dr. Celeste Team Number : 6 941633 張耕瑋 941634 黃峻亨 941636 楊銘鴻 941641 李昌諭 941718 吳政穎 941635 陳建廷.](https://reader035.fdocuments.net/reader035/viewer/2022081420/56649e035503460f94aef0c5/html5/thumbnails/11.jpg)
911 Virus
PalmOS/LibertyCrack
![Page 12: Mobile Computing - Security Issues - Advisor : Dr. Celeste Team Number : 6 941633 張耕瑋 941634 黃峻亨 941636 楊銘鴻 941641 李昌諭 941718 吳政穎 941635 陳建廷.](https://reader035.fdocuments.net/reader035/viewer/2022081420/56649e035503460f94aef0c5/html5/thumbnails/12.jpg)
Security policies! Symbian: Protect your data, not just your device
Technical support
![Page 13: Mobile Computing - Security Issues - Advisor : Dr. Celeste Team Number : 6 941633 張耕瑋 941634 黃峻亨 941636 楊銘鴻 941641 李昌諭 941718 吳政穎 941635 陳建廷.](https://reader035.fdocuments.net/reader035/viewer/2022081420/56649e035503460f94aef0c5/html5/thumbnails/13.jpg)
Confidentiality Integrity Availability Authorization Dependability and Reliability Accountability
![Page 14: Mobile Computing - Security Issues - Advisor : Dr. Celeste Team Number : 6 941633 張耕瑋 941634 黃峻亨 941636 楊銘鴻 941641 李昌諭 941718 吳政穎 941635 陳建廷.](https://reader035.fdocuments.net/reader035/viewer/2022081420/56649e035503460f94aef0c5/html5/thumbnails/14.jpg)
A process when devices be stole Security policy between wired network and
wireless network A mechanism to manage carrier who has
secret data Standard to control virus, worm… Hierarchy certificate mechanism
![Page 15: Mobile Computing - Security Issues - Advisor : Dr. Celeste Team Number : 6 941633 張耕瑋 941634 黃峻亨 941636 楊銘鴻 941641 李昌諭 941718 吳政穎 941635 陳建廷.](https://reader035.fdocuments.net/reader035/viewer/2022081420/56649e035503460f94aef0c5/html5/thumbnails/15.jpg)
Information security Network security Device security People training
![Page 16: Mobile Computing - Security Issues - Advisor : Dr. Celeste Team Number : 6 941633 張耕瑋 941634 黃峻亨 941636 楊銘鴻 941641 李昌諭 941718 吳政穎 941635 陳建廷.](https://reader035.fdocuments.net/reader035/viewer/2022081420/56649e035503460f94aef0c5/html5/thumbnails/16.jpg)
Hotspot◦ Hotspot is the location supply LAN that is open for public.◦ Data transfer don’t encrypt.
Hotspot Security◦ Establish system to prevent fake Hotspot Service◦ Turn off the Ad-hoc network mode◦ Don’t set auto-connect to AP◦ Pre-set to use VPN
Mobile Computing Security◦ Don’t use trusted network and un-trusted network at same time
![Page 17: Mobile Computing - Security Issues - Advisor : Dr. Celeste Team Number : 6 941633 張耕瑋 941634 黃峻亨 941636 楊銘鴻 941641 李昌諭 941718 吳政穎 941635 陳建廷.](https://reader035.fdocuments.net/reader035/viewer/2022081420/56649e035503460f94aef0c5/html5/thumbnails/17.jpg)
Types of AttackInterceptionFabricationInterruptionModification
PreventionEncrypt
Signature + CASignature + CA
Digital Signature
![Page 18: Mobile Computing - Security Issues - Advisor : Dr. Celeste Team Number : 6 941633 張耕瑋 941634 黃峻亨 941636 楊銘鴻 941641 李昌諭 941718 吳政穎 941635 陳建廷.](https://reader035.fdocuments.net/reader035/viewer/2022081420/56649e035503460f94aef0c5/html5/thumbnails/18.jpg)
TEK exchange
SS BS
authentication informationX.509 certificate
authorization requestX.509 certificate, capability, Basic CID
authorization replyencrypted AK, SAIDs, SQNAK,…
AK exchange
key requestSAID, HMAC-Digest,…
key replyencrypted TEK, CBC IV,
HMAC-Digest,…
Data exchange( encrypt by TEK)
![Page 19: Mobile Computing - Security Issues - Advisor : Dr. Celeste Team Number : 6 941633 張耕瑋 941634 黃峻亨 941636 楊銘鴻 941641 李昌諭 941718 吳政穎 941635 陳建廷.](https://reader035.fdocuments.net/reader035/viewer/2022081420/56649e035503460f94aef0c5/html5/thumbnails/19.jpg)
Encrypt Separate risks Firewall Redact
![Page 20: Mobile Computing - Security Issues - Advisor : Dr. Celeste Team Number : 6 941633 張耕瑋 941634 黃峻亨 941636 楊銘鴻 941641 李昌諭 941718 吳政穎 941635 陳建廷.](https://reader035.fdocuments.net/reader035/viewer/2022081420/56649e035503460f94aef0c5/html5/thumbnails/20.jpg)
EFS (Encrypting file system)
symmetric encryption: asymmetric encryption :
![Page 21: Mobile Computing - Security Issues - Advisor : Dr. Celeste Team Number : 6 941633 張耕瑋 941634 黃峻亨 941636 楊銘鴻 941641 李昌諭 941718 吳政穎 941635 陳建廷.](https://reader035.fdocuments.net/reader035/viewer/2022081420/56649e035503460f94aef0c5/html5/thumbnails/21.jpg)
Two-factor authentication
+
Or others :
password IC Card
![Page 22: Mobile Computing - Security Issues - Advisor : Dr. Celeste Team Number : 6 941633 張耕瑋 941634 黃峻亨 941636 楊銘鴻 941641 李昌諭 941718 吳政穎 941635 陳建廷.](https://reader035.fdocuments.net/reader035/viewer/2022081420/56649e035503460f94aef0c5/html5/thumbnails/22.jpg)
Server Notebook
CD-Rom
USB flash drive
![Page 23: Mobile Computing - Security Issues - Advisor : Dr. Celeste Team Number : 6 941633 張耕瑋 941634 黃峻亨 941636 楊銘鴻 941641 李昌諭 941718 吳政穎 941635 陳建廷.](https://reader035.fdocuments.net/reader035/viewer/2022081420/56649e035503460f94aef0c5/html5/thumbnails/23.jpg)
![Page 24: Mobile Computing - Security Issues - Advisor : Dr. Celeste Team Number : 6 941633 張耕瑋 941634 黃峻亨 941636 楊銘鴻 941641 李昌諭 941718 吳政穎 941635 陳建廷.](https://reader035.fdocuments.net/reader035/viewer/2022081420/56649e035503460f94aef0c5/html5/thumbnails/24.jpg)
coping sensitive record into removable disk before employees carry documents out .
1.
2.
Sensitive data
Employees
Document
![Page 25: Mobile Computing - Security Issues - Advisor : Dr. Celeste Team Number : 6 941633 張耕瑋 941634 黃峻亨 941636 楊銘鴻 941641 李昌諭 941718 吳政穎 941635 陳建廷.](https://reader035.fdocuments.net/reader035/viewer/2022081420/56649e035503460f94aef0c5/html5/thumbnails/25.jpg)
Notebook computer PDA
![Page 26: Mobile Computing - Security Issues - Advisor : Dr. Celeste Team Number : 6 941633 張耕瑋 941634 黃峻亨 941636 楊銘鴻 941641 李昌諭 941718 吳政穎 941635 陳建廷.](https://reader035.fdocuments.net/reader035/viewer/2022081420/56649e035503460f94aef0c5/html5/thumbnails/26.jpg)
Beginning of Mobile Phone Virus Recent Viruses The Way Viruses Infect Problems of Anti-Virus
![Page 27: Mobile Computing - Security Issues - Advisor : Dr. Celeste Team Number : 6 941633 張耕瑋 941634 黃峻亨 941636 楊銘鴻 941641 李昌諭 941718 吳政穎 941635 陳建廷.](https://reader035.fdocuments.net/reader035/viewer/2022081420/56649e035503460f94aef0c5/html5/thumbnails/27.jpg)
Wikipedia www.searchmobilecomputing.com www.ZDnet.com.tw Security in Distributed, Grid, Mobile, and
Pervasive Computing by Yang Xiao www.cert.org.tw/index.php www.cio.com
![Page 28: Mobile Computing - Security Issues - Advisor : Dr. Celeste Team Number : 6 941633 張耕瑋 941634 黃峻亨 941636 楊銘鴻 941641 李昌諭 941718 吳政穎 941635 陳建廷.](https://reader035.fdocuments.net/reader035/viewer/2022081420/56649e035503460f94aef0c5/html5/thumbnails/28.jpg)