Mobile Security 310KM Lab 4 Group Presentation NG KING TUNG MA HO YIN CHE CHUN KIT WOO SHUN CHAK.

Slides:



Advertisements
Similar presentations
McAfee One Time Password
Advertisements

To the ISSA Las Vegas Chapter April 13, Definition People Technology Policy.
Security for Mobile Devices
November 14, 2012 Securely Manage your devices, applications and data. Deploy your corporate policies on smart devices. Comply with Regulatory Laws. Detroit.
Smart Phones and Tablets: Security Issues S. Roy 1.
Mobile Devices and Support Kathy Boock Diane Jachimowicz.
310KM M-Commerce Application Selection of Mobile Platform Group 4 Choy Chun Lung, Lawrence Hui Yiu Ting, Eddy Chan Ki Yin, CKY Liu Tsz Ping, Scott.
Mobile Protection Overview
Contents Different O.S. and platforms. Different programming languages. Possibilities for mobiles. GPS, digital compass, accelerometer,… Augmented reality.
Sophos Mobile Control SophSkills Session Name: Thomas Lippert – Product Management DPG Date: 17-Feb-2011.
Lee Hang Lam Wong Kwun Yam Chan Sin Ping Wong Cecilia Kei Ka Mobile Phone OS.
SANS Technology Institute - Candidate for Master of Science Degree Design Phase 1 of an iPhone Rollout Mark Baggett, Jim Horwath June 2010.
310km Lab4 Presentation. Comparison between mobile OS Palm OS Blackberry Os Windows Mobile Symbian i OS Android.
Windows 8.1 Device Management With Windows Intune Mark O’Shea MVP Windows Expert – IT Pro 30 June 2014.
6218 Mobile Devices- Are They Secure Enough for our Patient's Data? Presented By Aaron Hendriks, CISSP Other: Employee of University Health Network, Toronto,
Medical University of South Carolina Office of the CIO – Information Services Endpoint Security Team Mobile Device Management March 8, 2012.
Sophos Mobile Control. Tablets on the rise 2 Trends 3 75% of 157 polled companies encourage employee owned smart phones and tablets to access corporate.
Meraki Mobile Device Management
Nokia Research Center Usable Security for Smartphones Cynthia Kuo Senior Researcher October 26,
1 MIS 2000 Class 22 System Security Update: Winter 2015.
Building and Deploying Safe and Secure Android Apps for Enterprise Presented by Technology Consulting Group at Endeavour Software Technologies.
Steps to Compliance: Bring Your Own Device PRESENTED BY.
Lab4 Part2 Lau Ting Nga Virginia Tsang Pui Yu Wong Sin Man.
Vivek-Vijayan University of Tennessee at Chattanooga.
310KM Mobile Commerce Applications Lab/Tutorial 1 Zeturl Ho ( )
KoolSpan Comparison to CellCrypt
Chung Man Ho Willims Chow Man Kei Gary Kwok Pak Wai Lion.
310KM Mobile Commerce Applications Lab/Tutorial 4 Part 3 Team members: Li Chun Yin Pun Hoi Lam Shek Hin Shing.
Mobile Mobile OS and Application Team: Kwok Tak Chi Law Tsz Hin So Ting Wai.
310KM – Team Assignment: OS Platform of Mobile workforce for Logistics Company Window Mobile OS: Chan Wai Kai Android Operation Systems: Chan Kwok.
Hidden Apps Carrier IQ and Privacy in Mobile Devices.
Suggested platform for development and support of a mobile workforce Lab/Tutorial 4 CHAN Chi Yin Lam Tak Faat LAU Hiu Tung SO Ho Ka, Rambo.
SMARTPHONE OPERATION SYSTEM MARKET IN U.S. Ryan (Jang-Hoon) Doo ISM 158.
Phone Trivia McKay Fackrell PLAY. What is the current operating system for Apple? Question one iOS Apple 8 OS X Lion OS X Yosemite.
Managing BYOD Legal IT’s Next Great Challenge. Agenda  The BYOD Trend – benefits and risks  Best practices for managing mobile device usage  Overview.
A+ Certification Guide Chapter 10 Mobile Devices.
Howard A. Carter III Senior Consultant Microsoft Consulting Services
Mobile Operating System Security A PRESENTATION BY DANIEL ADAMS CSC 345 DR. BOX.
Anil Karmel Deputy Chief Technology Officer National Nuclear Security Administration Streamlined Application Management The Intersection of Cloud and Mobility.
Mobile Devices Carry Hidden Threats With Financial Consequences Hold StillInstalled.
 Security and Smartphones By Parker Moore. The Smartphone Takeover  Half of mobile phone subscribers in the United States have a smartphone.  An estimated.
PROJECT PAPER ON BLUEFIRE MOBILE SECURITY. BY PONNURU VENKATA DINESH KUMAR STUDENT ID # A0815 PROFESSOR – VICKY HSU CS-426.
Week #7 Objectives: Secure Windows 7 Desktop
A security system for tracking and remote management of Android mobile devices client design and implementation Ihor Karpachev.
20 21 Remote Wipe.
Presented by Team Alpha MOBILE DEVICE SECURITY 1.
1 Company Proprietary and ConfidentialThe document name can go here Android OS Security Omar Alaql July 8, 2013 Kent State University Android OS Security.
Enabling users to be productive, responsibly Finding the right balance Devices & Experiences Users Want Applications and data across devices, anywhere.
Mobile Security iPhone and Android OS. iPhone Security Features Find my iPhone Remote wipe Automated back up at sync Auto lock / passcode lock Wipe after.
SMARTPHONE FORENSICS 101 General Overview of Smartphone Investigations.
Mobile security application for SignSupport Protecting a Deaf person’s medical information that is stored on a mobile SD card Student: Lindokuhle Duma.
THE WINDOWS OPERATING SYSTEM Computer Basics 1.2.
WIDESCREEN PRESENTATION Tips and tools for creating and presenting wide format slides.
20 21 Remote Wipe.
WELCOME. Mobile Application Development Dreamsoft4u.
Why EMS? What benefit does EMS provide O365 customers Manage Mobile Productivity Increase IT ProductivitySimplify app delivery and deployment LOB Apps.
30 Apps for Librarians Sana Moulder & Bryson Kopf.
Analysis And Research Of System Security Based On.
Mobile Device Security Threats Christina Blakley Host Computer Security.
By: Collin Molnar. Overview  Intro to Android  Security basics  Android architecture  Application isolation  Application permissions  Physical access.
Mobile device security Practical advice on how to keep your mobile device and the data on it safe.
How Kaspersky helps in recovering lost or stolen mobile device.
Mobile Operating Systems
DATA SECURITY FOR MEDICAL RESEARCH
Two-factor authentication
Security of Mobile Operating Systems
Fix All Your Issues at Trezor Support Phone Number
Google 2 Step Verification Backup Codes Google 2 Steps Verification Backup Codes is very important to get access Gmail account. Backup codes is usually.
Keno Kozie Associates -
Presentation transcript:

Mobile Security 310KM Lab 4 Group Presentation NG KING TUNG MA HO YIN CHE CHUN KIT WOO SHUN CHAK

Compare Security  Mobile OS  Android  BlackBerry  iOS  Windows Phone 7

Security on Software

Screen Time out and Screen lock

 Time out  Mobile phone Idle  Requiring password  PIN  Password  Pattern  Most smartphone support

AndroidBlackBerry Pattern unlock PINs passwords (2.2+) Four-digit PIN Passwords iOSWindows Phone 7 Four-digit PIN Password (4.0+) Four-digit PIN Password

Screen Lock Demo

Remote wipe

 Mobile phone lost or stolen  Remotely clear data   Contacts  SMS  Documents  Lock the handset  Track the handset

AndroidBlackBerry Third-party applications  My Droid Third-party applications  Lookout Mobile Security iOSWindows Phone 7 Mobile Me Third-party applications  Lookout Mobile Security

Remote wipe Demo

Application Verification

 Ensure maximum protection  platform and the data  Verifying an application  “who and what”  Determine an authentic  Allow or disallow applications run on the device

AndroidBlackBerry Limited ability to verify individual applications Verifying the signature of each installed application iOSWindows Phone 7 All applications require a digital certificate issued by Apple Limited ability to verify individual applications

Security on Hardware

Encrypted SD Cards  BlackBerry  Device wide encryption  Including SD Card  Android  Lack of encryption on the SD Card  iOS and Windows Phone 7  Not support removable storage

Encrypted SD Cards  BlackBerry  Device wide encryption  Including SD Card  Android  Lack of encryption on the SD Card  iOS and Windows Phone 7  Not support removable storage

Conclusion AndroidBlackberryiOSWins mobile Screen Time out and Screen lock Remote wipe Application Verification Encrypted SD Cards --- Total5765

Q & A

Ref.  2/smartphone_security_how_to_keep_your_handset_safe.html 2/smartphone_security_how_to_keep_your_handset_safe.html  A J.Gold Associates White Paper, “Choosing an Enterprise-Class Wireless Operating System: A Comparison of BlackBerry, iPhone and Windows Mobile” 

The End