mobile computing - security issues - advisor : dr. celeste team number : 6 941633 張耕瑋 941634...
TRANSCRIPT
Advisor : Dr. CelesteTeam Number : 6
941633 張耕瑋 941634 黃峻亨941636 楊銘鴻 941641 李昌諭941718 吳政穎 941635 陳建廷
Introduction to Mobile Computing Security Issues of Mobile Computing Security Policies Security Prevent Applications and Enterprise Case
Definition◦ Mobile computing & Ubiquitous computing
Features◦ Technical and other limitations of mobile
computing Insufficient bandwidth Security standards Power consumption Transmission interferences Potential health hazards Human interface with device
。Wireless communication and network
Data is cited from www.SearchMobileComputing.com
Data is cited from www.SearchMobileComputing.com
Security is major issue◦Protection of Mobile Devices◦Software Security – program vulnerabilities
◦Security Protocols - authentication Different architecture has different security vulnerabilities
Common security threat in wireless network can be categorized into two types:◦Passive - difficult to detect◦Active – possible to detect
Interception Modification Fabrication Interruption
Virus and Worms Denial of Service Intrusion
911 Virus
PalmOS/LibertyCrack
Security policies! Symbian: Protect your data, not just your device
Technical support
Confidentiality Integrity Availability Authorization Dependability and Reliability Accountability
A process when devices be stole Security policy between wired network and
wireless network A mechanism to manage carrier who has
secret data Standard to control virus, worm… Hierarchy certificate mechanism
Information security Network security Device security People training
Hotspot◦ Hotspot is the location supply LAN that is open for public.◦ Data transfer don’t encrypt.
Hotspot Security◦ Establish system to prevent fake Hotspot Service◦ Turn off the Ad-hoc network mode◦ Don’t set auto-connect to AP◦ Pre-set to use VPN
Mobile Computing Security◦ Don’t use trusted network and un-trusted network at same time
Types of AttackInterceptionFabricationInterruptionModification
PreventionEncrypt
Signature + CASignature + CA
Digital Signature
TEK exchange
SS BS
authentication informationX.509 certificate
authorization requestX.509 certificate, capability, Basic CID
authorization replyencrypted AK, SAIDs, SQNAK,…
AK exchange
key requestSAID, HMAC-Digest,…
key replyencrypted TEK, CBC IV,
HMAC-Digest,…
Data exchange( encrypt by TEK)
Encrypt Separate risks Firewall Redact
EFS (Encrypting file system)
symmetric encryption: asymmetric encryption :
Two-factor authentication
+
Or others :
password IC Card
Server Notebook
CD-Rom
USB flash drive
coping sensitive record into removable disk before employees carry documents out .
1.
2.
Sensitive data
Employees
Document
Notebook computer PDA
Beginning of Mobile Phone Virus Recent Viruses The Way Viruses Infect Problems of Anti-Virus
Wikipedia www.searchmobilecomputing.com www.ZDnet.com.tw Security in Distributed, Grid, Mobile, and
Pervasive Computing by Yang Xiao www.cert.org.tw/index.php www.cio.com