mobile computing - security issues - advisor : dr. celeste team number : 6 941633 張耕瑋 941634...

28
Advisor : Dr. Celeste Team Number : 6 941633 張張張 941634 張張張 941636 張張張 941641 張張張 941718 張張張 941635 張張張

Upload: philomena-ferguson

Post on 25-Dec-2015

231 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Mobile Computing - Security Issues - Advisor : Dr. Celeste Team Number : 6 941633 張耕瑋 941634 黃峻亨 941636 楊銘鴻 941641 李昌諭 941718 吳政穎 941635 陳建廷

Advisor : Dr. CelesteTeam Number : 6

941633 張耕瑋 941634 黃峻亨941636 楊銘鴻 941641 李昌諭941718 吳政穎 941635 陳建廷

Page 2: Mobile Computing - Security Issues - Advisor : Dr. Celeste Team Number : 6 941633 張耕瑋 941634 黃峻亨 941636 楊銘鴻 941641 李昌諭 941718 吳政穎 941635 陳建廷

Introduction to Mobile Computing Security Issues of Mobile Computing Security Policies Security Prevent Applications and Enterprise Case

Page 3: Mobile Computing - Security Issues - Advisor : Dr. Celeste Team Number : 6 941633 張耕瑋 941634 黃峻亨 941636 楊銘鴻 941641 李昌諭 941718 吳政穎 941635 陳建廷

Definition◦ Mobile computing & Ubiquitous computing

Features◦ Technical and other limitations of mobile

computing Insufficient bandwidth Security standards Power consumption Transmission interferences Potential health hazards Human interface with device

。Wireless communication and network

Page 4: Mobile Computing - Security Issues - Advisor : Dr. Celeste Team Number : 6 941633 張耕瑋 941634 黃峻亨 941636 楊銘鴻 941641 李昌諭 941718 吳政穎 941635 陳建廷

Data is cited from www.SearchMobileComputing.com

Page 5: Mobile Computing - Security Issues - Advisor : Dr. Celeste Team Number : 6 941633 張耕瑋 941634 黃峻亨 941636 楊銘鴻 941641 李昌諭 941718 吳政穎 941635 陳建廷

Data is cited from www.SearchMobileComputing.com

Page 6: Mobile Computing - Security Issues - Advisor : Dr. Celeste Team Number : 6 941633 張耕瑋 941634 黃峻亨 941636 楊銘鴻 941641 李昌諭 941718 吳政穎 941635 陳建廷

Security is major issue◦Protection of Mobile Devices◦Software Security – program vulnerabilities

◦Security Protocols - authentication Different architecture has different security vulnerabilities

Page 7: Mobile Computing - Security Issues - Advisor : Dr. Celeste Team Number : 6 941633 張耕瑋 941634 黃峻亨 941636 楊銘鴻 941641 李昌諭 941718 吳政穎 941635 陳建廷

Common security threat in wireless network can be categorized into two types:◦Passive - difficult to detect◦Active – possible to detect

Page 8: Mobile Computing - Security Issues - Advisor : Dr. Celeste Team Number : 6 941633 張耕瑋 941634 黃峻亨 941636 楊銘鴻 941641 李昌諭 941718 吳政穎 941635 陳建廷

Interception Modification Fabrication Interruption

Page 9: Mobile Computing - Security Issues - Advisor : Dr. Celeste Team Number : 6 941633 張耕瑋 941634 黃峻亨 941636 楊銘鴻 941641 李昌諭 941718 吳政穎 941635 陳建廷
Page 10: Mobile Computing - Security Issues - Advisor : Dr. Celeste Team Number : 6 941633 張耕瑋 941634 黃峻亨 941636 楊銘鴻 941641 李昌諭 941718 吳政穎 941635 陳建廷

Virus and Worms Denial of Service Intrusion

Page 11: Mobile Computing - Security Issues - Advisor : Dr. Celeste Team Number : 6 941633 張耕瑋 941634 黃峻亨 941636 楊銘鴻 941641 李昌諭 941718 吳政穎 941635 陳建廷

911 Virus

PalmOS/LibertyCrack

Page 12: Mobile Computing - Security Issues - Advisor : Dr. Celeste Team Number : 6 941633 張耕瑋 941634 黃峻亨 941636 楊銘鴻 941641 李昌諭 941718 吳政穎 941635 陳建廷

Security policies! Symbian: Protect your data, not just your device

Technical support

Page 13: Mobile Computing - Security Issues - Advisor : Dr. Celeste Team Number : 6 941633 張耕瑋 941634 黃峻亨 941636 楊銘鴻 941641 李昌諭 941718 吳政穎 941635 陳建廷

Confidentiality Integrity Availability Authorization Dependability and Reliability Accountability

Page 14: Mobile Computing - Security Issues - Advisor : Dr. Celeste Team Number : 6 941633 張耕瑋 941634 黃峻亨 941636 楊銘鴻 941641 李昌諭 941718 吳政穎 941635 陳建廷

A process when devices be stole Security policy between wired network and

wireless network A mechanism to manage carrier who has

secret data Standard to control virus, worm… Hierarchy certificate mechanism

Page 15: Mobile Computing - Security Issues - Advisor : Dr. Celeste Team Number : 6 941633 張耕瑋 941634 黃峻亨 941636 楊銘鴻 941641 李昌諭 941718 吳政穎 941635 陳建廷

Information security Network security Device security People training

Page 16: Mobile Computing - Security Issues - Advisor : Dr. Celeste Team Number : 6 941633 張耕瑋 941634 黃峻亨 941636 楊銘鴻 941641 李昌諭 941718 吳政穎 941635 陳建廷

Hotspot◦ Hotspot is the location supply LAN that is open for public.◦ Data transfer don’t encrypt.

Hotspot Security◦ Establish system to prevent fake Hotspot Service◦ Turn off the Ad-hoc network mode◦ Don’t set auto-connect to AP◦ Pre-set to use VPN

Mobile Computing Security◦ Don’t use trusted network and un-trusted network at same time

Page 17: Mobile Computing - Security Issues - Advisor : Dr. Celeste Team Number : 6 941633 張耕瑋 941634 黃峻亨 941636 楊銘鴻 941641 李昌諭 941718 吳政穎 941635 陳建廷

Types of AttackInterceptionFabricationInterruptionModification

PreventionEncrypt

Signature + CASignature + CA

Digital Signature

Page 18: Mobile Computing - Security Issues - Advisor : Dr. Celeste Team Number : 6 941633 張耕瑋 941634 黃峻亨 941636 楊銘鴻 941641 李昌諭 941718 吳政穎 941635 陳建廷

TEK exchange

SS BS

authentication informationX.509 certificate

authorization requestX.509 certificate, capability, Basic CID

authorization replyencrypted AK, SAIDs, SQNAK,…

AK exchange

key requestSAID, HMAC-Digest,…

key replyencrypted TEK, CBC IV,

HMAC-Digest,…

Data exchange( encrypt by TEK)

Page 19: Mobile Computing - Security Issues - Advisor : Dr. Celeste Team Number : 6 941633 張耕瑋 941634 黃峻亨 941636 楊銘鴻 941641 李昌諭 941718 吳政穎 941635 陳建廷

Encrypt Separate risks Firewall Redact

Page 20: Mobile Computing - Security Issues - Advisor : Dr. Celeste Team Number : 6 941633 張耕瑋 941634 黃峻亨 941636 楊銘鴻 941641 李昌諭 941718 吳政穎 941635 陳建廷

EFS (Encrypting file system)

symmetric encryption: asymmetric encryption :

Page 21: Mobile Computing - Security Issues - Advisor : Dr. Celeste Team Number : 6 941633 張耕瑋 941634 黃峻亨 941636 楊銘鴻 941641 李昌諭 941718 吳政穎 941635 陳建廷

Two-factor authentication

+

Or others :

password IC Card

Page 22: Mobile Computing - Security Issues - Advisor : Dr. Celeste Team Number : 6 941633 張耕瑋 941634 黃峻亨 941636 楊銘鴻 941641 李昌諭 941718 吳政穎 941635 陳建廷

Server Notebook

CD-Rom

USB flash drive

Page 23: Mobile Computing - Security Issues - Advisor : Dr. Celeste Team Number : 6 941633 張耕瑋 941634 黃峻亨 941636 楊銘鴻 941641 李昌諭 941718 吳政穎 941635 陳建廷
Page 24: Mobile Computing - Security Issues - Advisor : Dr. Celeste Team Number : 6 941633 張耕瑋 941634 黃峻亨 941636 楊銘鴻 941641 李昌諭 941718 吳政穎 941635 陳建廷

coping sensitive record into removable disk before employees carry documents out .

1.

2.

Sensitive data

Employees

Document

Page 25: Mobile Computing - Security Issues - Advisor : Dr. Celeste Team Number : 6 941633 張耕瑋 941634 黃峻亨 941636 楊銘鴻 941641 李昌諭 941718 吳政穎 941635 陳建廷

Notebook computer PDA

Page 26: Mobile Computing - Security Issues - Advisor : Dr. Celeste Team Number : 6 941633 張耕瑋 941634 黃峻亨 941636 楊銘鴻 941641 李昌諭 941718 吳政穎 941635 陳建廷

Beginning of Mobile Phone Virus Recent Viruses The Way Viruses Infect Problems of Anti-Virus

Page 27: Mobile Computing - Security Issues - Advisor : Dr. Celeste Team Number : 6 941633 張耕瑋 941634 黃峻亨 941636 楊銘鴻 941641 李昌諭 941718 吳政穎 941635 陳建廷

Wikipedia www.searchmobilecomputing.com www.ZDnet.com.tw Security in Distributed, Grid, Mobile, and

Pervasive Computing by Yang Xiao www.cert.org.tw/index.php www.cio.com

Page 28: Mobile Computing - Security Issues - Advisor : Dr. Celeste Team Number : 6 941633 張耕瑋 941634 黃峻亨 941636 楊銘鴻 941641 李昌諭 941718 吳政穎 941635 陳建廷