Ethical and Social...J.M.Kizza 1 Module 14: Mobile Systems and Their Intractable Social, Ethical and Security Issues Introduction Role of Operating Systems.

Slides:



Advertisements
Similar presentations
Mobile Computing and Commerce And Pervasive Computing
Advertisements

CHAPTER 7: LEARNING OUTCOMES
CS898T Mobile and Wireless Network Handheld Device Security By Yuan Chen July 25 th, 2005.
Security for Mobile Devices
Mobile And Wireless Computing Dr. Michael Katchabaw The University of Western Ontario Department of Computer Science.
310KM M-Commerce Application Selection of Mobile Platform Group 4 Choy Chun Lung, Lawrence Hui Yiu Ting, Eddy Chan Ki Yin, CKY Liu Tsz Ping, Scott.
Intro to Android and iOS CS-328 Dick Steflik. The Players Android – Open source mobile OS developed ny the Open Handset Alliance led by Google. Based.
 یعنی چی؟  تاریخچه  مقایسه  مزایا  معایب.  1979–1992 Mobile phones use embedded systems to control operation.  Martin Cooper.
Sophos Mobile Control. Tablets on the rise 2 Trends 3 75% of 157 polled companies encourage employee owned smart phones and tablets to access corporate.
Chapter 61 Introduction to Information Technology Turban, Rainer and Potter John Wiley & Sons, Inc. Copyright 2005.
Chapter 20: Mobile Communication Systems and Related Security Issues Guide to Computer Network Security.
Lab4 Part2 Lau Ting Nga Virginia Tsang Pui Yu Wong Sin Man.
Handheld Devices and OS
310KM Mobile Commerce Applications Lab/Tutorial 1 Zeturl Ho ( )
Smartphones & Privacy Homero Martinez and Jose Juarez.
Mobile UIs First Mobile Radio Telephone 1924 Courtesy of Rich Howard.
Chung Man Ho Willims Chow Man Kei Gary Kwok Pak Wai Lion.
Robin Estabrooks Computer Science 1631, Winter 2011.
Chan pak lim chau ho chit cheung tak ching yip pak ho g2
Student Name: Group.  Developed by Microsoft  Alliance with Nokia in 2011  4 main functions:  Outlook Mobile  Windows Media Player for Windows Mobile.
Mobile Mobile OS and Application Team: Kwok Tak Chi Law Tsz Hin So Ting Wai.
45 nm transistor 45nm =.045um (microns)= 450 Angstroms.
New Technologies Are Surfacing Everyday. l Some will have a dramatic affect on the business environment. l Others will totally change the way you live.
McGraw-Hill/Irwin © The McGraw-Hill Companies, All Rights Reserved BUSINESS PLUG-IN B21 Mobile Technology.
Business Driven Technology Unit 4 Building Innovation Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without.
SMARTPHONE OPERATION SYSTEM MARKET IN U.S. Ryan (Jang-Hoon) Doo ISM 158.
Chapter CHAPTER SEVEN OVERVIEW SECTION NETWORKS AND TELECOMMUNICATIONS  Network Basics  Voice over IP  Networking Businesses  Increasing.
Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin BUSINESS PLUG-IN B20 Mobile Technology.
CHAPTER SEVEN Networks, Telecommunications, and Mobile Technology.
A+ Certification Guide Chapter 10 Mobile Devices.
Mobile Handset Hardware Architecture
Wireless Technology Wireless devices transmit information via Electromagnetic waves Early wireless devices –Radios – often called wireless in.
AS ICT.  A portable communication device is a pocket sized device that is carried around by an individual  They typically have a display screen with.
Basic Data Communication
Communications & Networks
Information Systems Today: Managing in the Digital World TB4-1 4 Technology Briefing Networking.
CHAPTER OVERVIEW SECTION 7.1 – Connectivity: The Business Value of a Networked World Overview of a Connected World Benefits of a Connected World Challenges.
Mobile Operating System Security A PRESENTATION BY DANIEL ADAMS CSC 345 DR. BOX.
1 Remote Management of Wireless Gateway Student Name: Dinesh D N (BITS ID: 2004HZ12158) MphasiS Technologies Ltd, Bangalore March 2006.
Mobile Phone Networks Dr. Hassan Nojumi1 MOBLIE PHONE NETWORKS Dr. Hassan Nojumi.
Integrated digital enhanced network
McGraw-Hill/Irwin ©2008 The McGraw-Hill Companies, All Rights Reserved Business Plug-in 5 NETWORKS and TELECOMMUNICATIONS.
Invention of Telephone. Alexander Graham Bell Best known for inventing the telephone, Alexander Graham Bell was a passionate educator and innovator throughout.
NEAR FIELD COMMUNICATION. WHAT IS NFC??? NFC or Near Field Communication is a short range high frequency wireless communication technology. A radio communication.
McGraw-Hill/Irwin © 2008 The McGraw-Hill Companies, All Rights Reserved BUSINESS PLUG-IN B21 Mobile Technology.
McGraw-Hill/Irwin ©2009 The McGraw-Hill Companies, All Rights Reserved CHAPTER 7 NETWORKS, TELECOMMUNICATIONS, AND MOBILE TECHNOLOGY CHAPTER 7 NETWORKS,
Wireless Communication Meghan Synishin Kara MacDonald Arlene Pino “Last year more mobile phones were sold than the number of PC’s and cars combined.” -
45 nm transistor 45nm =.045um (microns)= 450 Angstroms.
Data Communications & Computer Networks, Second Edition1 Chapter 3 The Media: Conducted and Wireless.
Cellular positioning. What is cellular positioning? Determining the position of a Mobile Station (MS), using location sensitive parameters.
Mobile Platforms. Competitive Landscape Operating Systems iPhone BlackBerry Windows Mobile Android Symbian.
Submitted By: A.Anjaneyulu INTRODUCTION Near Field Communication (NFC) is based on a short-range wireless connectivity, designed for.
Wireless Networking Nandakumar.P. Web Resource
WIRELESS NETWORKING Ramiah Qasem, Jahmia Algahmie, Andrew Speice.
Business Driven Technology Unit 4 Building Innovation Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved.McGraw-Hill/Irwin.
Telephone and Telecommunication. Telephone - a device for transmitting and receiving sound at a distance. Modern phones are performed through the transmission.
Automated Data Capture Technologies O It is often necessary or convenient to capture data automatically, for example the delivery of a package by an Cable.
Strategic Innovation Management Prof. Marc Gruber January 27, 2011.
History of computers By tynan roach Apple  Apple Computer, Inc., is a multinational corporation that creates consumer electronics, personal computers,
Your Interactive Guide to the Digital World Discovering Computers 2012 Chapter 9 Networks and Communications.
System Software Chapter Handles technical details Works with end users, application software, and computer hardware Four types of programs –Operating.
Shlomo Golsherazian Jeff Heiser Etana Kenter Michael Rosenberg A.J. Shah Chelsea Schneider Danielle Zimmerman.
Mobile device security Practical advice on how to keep your mobile device and the data on it safe.
System Software Chapter Handles technical details Works with end users, application software, and computer hardware Four types of programs –Operating.
Mobile Computing Lecture#01 Mobile Horizon. Leading Mobile Phone Technologies  iOS  Android  Blackberry  Symbian  Windows Phone  J2ME.
Technologies in everyday’s life
Contents: Introduction Different Mobile Operating Systems
Introduction to Mobile Devices
Guide to Computer Network Security
Security in Wide Area Networks
Presentation transcript:

Ethical and Social...J.M.Kizza 1 Module 14: Mobile Systems and Their Intractable Social, Ethical and Security Issues Introduction Role of Operating Systems in the Growth of Mobile Ecosystems Ethical and Privacy Issues in Mobile Ecosystems* Security Issues in Mobile Ecosystems General Mobile Devices Attack Types Mitigation of Mobile Devices Attacks Users’ Role in Securing Mobile Devices

Introduction –The last two decades have witnessed a revolution of sorts in communication spearheaded by the rapidly evolving technologies in both software and hardware. –A mobile communication systems consists of: mobile telephone, broadly construed here to include devices based on Code Division Multiple Access (CDMA), Time Division Multiple Access (TDMA), Global System for Mobile Communications (GSM), Wireless Personal Digital Assistants (WPDA) digital technologies and follow-ons, as well as satellite telephones and appliances. –Mobile communication systems are revolutionising and shrinking the world to between two or more small handheld mobile devices. –Competition between the mobile telecommunication operators resulting in plummeting device prices, the quickly developing smartphone technology and growing number of undersea cables and cheaper satellites technologies are bringing Internet access to almost every one Ethical and Social...J.M.Kizza 2

Role of Operating Systems in the Growth of Mobile Ecosystems –Android - developed by a small startup company that was purchased by Google Inc., is a Linux-derived OS backed by Google, along with major hardware and software developers (such as Intel, HTC, ARM, Samsung, Motorola and eBay, to name a few), that form the Open Handset Alliance. –iOS - iOS is Apple’s mobile operating system, originally developed for the iPhone, it has since been extended to support other Apple devices such as the iPod touch, iPad and Apple TV. –Windows Phone 7.5 (Mango) - is the mobile operating system, by Microsoft. Although the OS internally identified itself as version 7.1 during pre-beta 2 releases, it is marketed as version 7.5 in all published materials intended for end-users. Kizza - Guide to Computer Network Security 3

Bada (Samsang) – (Korean meaning “ocean” and “seashore”. First Wave S8500 was funvailed in 2010 in BarcelonaVersion 1.2 was released with the Samsung S8530 Wave II phone. The alpha- version of Bada 2.0 was introduced on February 15, 2011, with Samsung S8600 Wave III. BlackBerry OS (RIM) - The operating system provides multitasking and supports specialized input devices that have been adopted by RIM for use in its handhelds, particularly the trackwheel, trackball, trackpad and touchscreen. Best known for its native support for corporate , through MIDP 1.0 and, more recently, a subset of MIDP 2.0, which allows complete wireless activation and synchronization with Microsoft Exchange, Lotus Domino, or Novell GroupWise , calendar, tasks, notes, and contacts, when used with BlackBerry Enterprise Server. Kizza -Ethical and Social... 4

Symbian – (Nokia, Sony Ericsson) is used on more phones and smartphones globally than any other mobile OS. Symbian's strengths include its longevity, widespread use, and maturity as an operating system. With its most recent release, Symbian 9, increased emphasis has been placed on improved functionality, enhanced capabilities to assist third-party developers, and additional security functions. Ethical and Social...J.M.Kizza 5

Ethical and Privacy Issues in Mobile Ecosystems* One of the most privacy threatening aspect of mobile devices is location-based tracking system (LTS), part of all mobile devices. There are three types of LTS technologies in use today: –Global positioning systems (GPS)—This uses a constellation of GPS satellites orbiting the earth, which broadcast messages on radio frequencies that consist of the time of the message and orbital information. A GPS receiver measures the transit times of messages from four satellites to determine its distance from each satellite and thereby calculate its location. Ethical and Social...J.M.Kizza 6

–Radio frequency identification (RFID) tags—An RFID tag consists of a microchip and an antenna with typical ranges in size between a postage stamp and a pager. Each tag stores a unique identification number. An active RFID tag, which has its own power source, can transmit identification information up to a mile away. A passive RFID tag, which is activated by an external source of power, can transmit information up to 20 or 30 ft –Global system for mobile communications (GSM)—This provides personalized services to cell phone subscribers based on their current locations. A GSM uses several methods to find the location of a subscriber, using the time taken by signals to travel between the subscriber’s handset and the cellular network base stations. GSM signals emitted by cell phones in vehicles can automatically report their positions, travel time, traffic incidents, and road surface problems [8]. Ethical and Social...J.M.Kizza 7

Security Issues in Mobile Ecosystems As mobile devices, more importantly smart devices, become ubiquitous, the risk for using them is increasing. They are increasingly holding and storing more private data like personal and business and they are roaming in public spaces on public networks with limited security and cryptographic protocols to protect the data. Major threats to mobile devices include: –Application-Based Threats –Web-based Threats –Network Threats –Physical Threats –Operating System Based Threats Kizza - Guide to Computer Network Security 8

General Mobile Devices Attack Types Most mobile system attacks are launched against specific mobile devices or operating systems or applications. Most of these attack techniques are carry overs from the computer and computer networks. The most common attack chancels and techniques are: –Denial-of-service (DDoS) –Phone Hacking –Mobile malware/virus –Spyware –Exploit –Everything Blue –Phishing –SMishing –Vishing Kizza - Guide to Computer Network Security 9

Mitigation of Mobile Devices Attacks More and more people are now using a mobile device with either personal or work related data. There is a growing number of employers are increasingly using unmanaged, personal devices to access sensitive enterprise resources and then connecting these devices to third party services outside of the enterprise security controls. This potentially expose the enterprise sensitive data to possible attackers. There are several security protocols and best practices that can come in handy to situations including: –Mobile Device Encryption –Mobile Remote Wiping –Mobile Passcode Policy Ethical and Social...J.M.Kizza 10

Users Role in Securing Mobile Devices. Users must be aware that there are risks to the convenience afforded by mobile devices. It is important to know that mobile computing devices can store large amounts of personal and sometimes sensitive data whose loss may cause problems to the owner or user. It is also important to know that it is easy to steal or lose that data. Unless precautions are taken, an unauthorized person can gain access to the information stored on these mobile devices or gain accessed through these devices to other devices or data because these devices may provide access to other services that store or display non-public data. This access may be enabled because the mobile device contains passwords or security certificates and other information that may help to identify the device, its user or its content. So our role as users is to be vigilant and security aware. Ethical and Social...J.M.Kizza 11