310km Lab4 Presentation. Comparison between mobile OS Palm OS Blackberry Os Windows Mobile Symbian i OS Android.

Slides:



Advertisements
Similar presentations
1 G CARD Lock your data in memory card. The key to unlock your data is your memory card. Cross Platform for your security solution 8/25/2011.
Advertisements

To the ISSA Las Vegas Chapter April 13, Definition People Technology Policy.
Smart Phones and Tablets: Security Issues S. Roy 1.
310KM M-Commerce Application Selection of Mobile Platform Group 4 Choy Chun Lung, Lawrence Hui Yiu Ting, Eddy Chan Ki Yin, CKY Liu Tsz Ping, Scott.
Portable Device Operating Systems. Portable Device OS Portable devices use scaled down operating systems, which are smaller than those found in notebook.
310KM M-Commerce Application Cheuk Ting Hei, Ng Ka Ming, Yuen Chun Pong.
Objectives Overview Define an operating system
Lee Hang Lam Wong Kwun Yam Chan Sin Ping Wong Cecilia Kei Ka Mobile Phone OS.
Mobile Security 310KM Lab 4 Group Presentation NG KING TUNG MA HO YIN CHE CHUN KIT WOO SHUN CHAK.
Medical University of South Carolina Office of the CIO – Information Services Endpoint Security Team Mobile Device Management March 8, 2012.
 Real-time two-way wireless delivery of GroupWise   Calendar and Meeting Requests  Directory Lookup  Contacts  Tasks  Notes  Supports hundreds.
Chapter 20: Mobile Communication Systems and Related Security Issues Guide to Computer Network Security.
Lab4 Part2 Lau Ting Nga Virginia Tsang Pui Yu Wong Sin Man.
eToken PKI Client Overview
KoolSpan Comparison to CellCrypt
310KM Lab 4 Part 3 Tutorial Group:2 Student Name:Chan Nga Lok Fan Ka Yan Lo Yuen Ki Tsui Sui Wa.
Chung Man Ho Willims Chow Man Kei Gary Kwok Pak Wai Lion.
310KM Mobile Commerce Applications Lab/Tutorial 4 Part 3 Team members: Li Chun Yin Pun Hoi Lam Shek Hin Shing.
310KM Mobile Commerce Applications Tutorial 4 Team Assignment Group 4a Team Members: Cheung Chi Wai Ho Kwun Lam Lau Wai Ho Siao Chi Yeung.
Ho Ting Chung, Zeturl ( ) 1.  Authentication  Encryption 2.
Robin Estabrooks Computer Science 1631, Winter 2011.
Student Name: Group.  Developed by Microsoft  Alliance with Nokia in 2011  4 main functions:  Outlook Mobile  Windows Media Player for Windows Mobile.
Mobile Mobile OS and Application Team: Kwok Tak Chi Law Tsz Hin So Ting Wai.
Identity and Access IDGo Secure (ISE) for Android Didier Bonnet April 2015.
Research of difference OS for authentication and encryption Group member:Li Man Yiu Tsun Yu Hin Wong Nok Wai.
310KM – Team Assignment: OS Platform of Mobile workforce for Logistics Company Window Mobile OS: Chan Wai Kai Android Operation Systems: Chan Kwok.
About PKI Key Stores Dartmouth College PKI Lab. Key Store Defined Protected “vault” to hold user’s private key with their copy of their x.509 certificate.
Suggested platform for development and support of a mobile workforce Lab/Tutorial 4 CHAN Chi Yin Lam Tak Faat LAU Hiu Tung SO Ho Ka, Rambo.
SmartPhones Student 1 Student 2 Student 3. SmartPhone Definition “A SmartPhone is one device that can take care of all your handheld computing and communication.
RSA SecurID November 10, 2005.
SMARTPHONE OPERATION SYSTEM MARKET IN U.S. Ryan (Jang-Hoon) Doo ISM 158.
Phone Trivia McKay Fackrell PLAY. What is the current operating system for Apple? Question one iOS Apple 8 OS X Lion OS X Yosemite.
OPERATING SYSTEMS AND SYSTEMS SOFTWARE. SYSTEMS SOFTWARE Systems software consists of the programs that control the operations of the computer and its.
ENCRYPTION Coffee Hour for August HISTORY OF ENCRYPTION Scytale Ciphers – paper wrapped around rod, receiver needed same size rod to get the message.
Public Key Infrastructure from the Most Trusted Name in e-Security.
Symbian os with smart phones Guided by: Hetal A Josiyara
A+ Certification Guide Chapter 10 Mobile Devices.
Identity and Access IDGo Secure (ISE) for Android Didier Bonnet November 2014.
Operating Systems Chapter 4.
RSA Security Validating Users and Devices to Protect Network Assets Endpoint Solutions for Cisco Environments.
Your Interactive Guide to the Digital World Discovering Computers 2012.
PROJECT PAPER ON BLUEFIRE MOBILE SECURITY. BY PONNURU VENKATA DINESH KUMAR STUDENT ID # A0815 PROFESSOR – VICKY HSU CS-426.
Survey of PC and Network Operating Systems
20 21 Remote Wipe.
How to complete the Europass Language Passport The current situation.
Frequently Asked Questions NCSC Product Certification Payroll Anytime, Anywhere!
Lieberman Software Random Password Manager & Two-Factor Authentication.
Three main types of computer operating systems By Chloe Monks.
1 Eurostat products for mobile devices Working Group "European Statistical Data Support“ February 2012 Matthias Fritz, Dissemination Unit.
Chapter 9 Operating Systems Discovering Computers Technology in a World of Computers, Mobile Devices, and the Internet.
Chapter 2 – Part 1 Introduction To Windows Operating Systems CMPF 112 : COMPUTING SKILLS.
THE WINDOWS OPERATING SYSTEM Computer Basics 1.2.
20 21 Remote Wipe.
U N C L A S S I F I E D LA-UR Exchange 2007 Pilot at LANL Anil Karmel Technical Staff Member
Citrix ShareFile. Instant file access from any device Sharing and collaboration—with anyone Easy & Familiar (love Dropbox) USERS DEMAND Security Control.
Anatomy of a Smartphone Matthew Vartabedian (708)
Antony Edwin Keane Inc Ltd
Mobile Computing Lecture#01 Mobile Horizon. Leading Mobile Phone Technologies  iOS  Android  Blackberry  Symbian  Windows Phone  J2ME.
What Are the Different Platforms for Enterprise Mobility Solutions?
CHAPTER 7 Operating System Copyright © Cengage Learning. All rights reserved.
DISCOVERING COMPUTERS 2018 Digital Technology, Data, and Devices
Introduction to Mobile Computing
Mobile Security for QlikView
Mobile Security for QlikView
Computing Fundamentals
Guide to Computer Network Security
Google 2 Step Verification Backup Codes Google 2 Steps Verification Backup Codes is very important to get access Gmail account. Backup codes is usually.
OPERATING SYSTEMS.
Install AD Certificate Services
IT Management, Simplified
Presentation transcript:

310km Lab4 Presentation

Comparison between mobile OS Palm OS Blackberry Os Windows Mobile Symbian i OS Android

Inactivity Timeout native timeout interval When the lock interval is set, the device will lock any time the screen is turned off then back on

Clear Device / Remote WIPE , PIM and mailbox account are deleted and the device enters a pre- registration state

Palm OS Developed by Palm, Inc Designed for touch-screen-based graphical user interface Allows the user to set a password RSA SecurID

Blackberry OS Developed by Research In Motion Supports End-to-end Encryption Advanced Encryption Standard (AES) Triple Data Encryption Standard (3 DES) Allows data transmitted between BlackBerry Enterprise Server and smartphones

Continue Supports Private encryption keys Keys are regenerated wirelessly by the user RSA SecurID

Window Mobile Developed by Microsoft using the Windows Mobile Device Security Model one-tier and two-tier security models using digital certificates

Symbians open source operating system (OS) maintained by Nokia

i OS Apple's mobile operating system hardware encryption unique device passcode to generate the encryption key remote wipe command from Exchange or a Mobile Device Management server

Android developed by Android Inc Java-based, object-oriented application Public Key Infrastructure (PKI) Advanced Encryption Standard (AES) Triple Data Encryption Standard (3DES) supports BioLock

Encryption Android, iOS 4, AES 256 bit Nokia S60 3rd edition devices – 256 bit Windows Mobile 6.1 and 6.5 – AES 128-bit Blackberry AES 256 bit

Our Suggestion Android Open-source-low cost to develop application wide choice of devices High security standard (bio-lock)

References Palm, 2001, [online] Available at: [Accessed 23 February 2011]. 11 Blackberry, [online] Available at: [Accessed 23 February 2011]. Microsoft, [online] Available at: [Accessed 23 February 2011]. us/library/cc aspx Apple, [online] Available at: [Accessed 23 February 2011]. BioLock, [online] Available at: [Accessed 23 February 2011].

The End