Mobile security application for SignSupport Protecting a Deaf person’s medical information that is stored on a mobile SD card Student: Lindokuhle Duma.

Slides:



Advertisements
Similar presentations
McAfee One Time Password
Advertisements

A mobile single sign-on system Master thesis 2006 Mats Byfuglien.
 Physical Logical Access  Physical and Logical Access  Total SSO and Password Automation  Disk/Data Encryption  Centralized management system  Biometric.
Lee Hang Lam Wong Kwun Yam Chan Sin Ping Wong Cecilia Kei Ka Mobile Phone OS.
Implementation of a Two-way Authentication Protocol Using Shared Key with Hash CS265 Sec. 2 David Wang.
Increased Security, while protecting Privacy ? True or False ? Christer Bergman, President and CEO, Precise Biometrics.
All rights reserved © 2005, Alcatel Risk Awareness in Enterprise IT Processes and Networks  Dr. Stephan Rupp.
310KM – Team Assignment: OS Platform of Mobile workforce for Logistics Company Window Mobile OS: Chan Wai Kai Android Operation Systems: Chan Kwok.
Polytechnic University of Tirana Faculty of Information Technology Computer Engineering Department Identification of on-line users and Digital Signature.
MITP 458 Application Layer Security By Techjocks.
Securing Data Storage Protecting Data at Rest Advanced Systems Group Dell Computer Asia Ltd.
1 Security and Protection Chapter 9. 2 The Security Environment Threats Security goals and threats.
Remarks on Voting using Cryptography Ronald L. Rivest MIT Laboratory for Computer Science.
Lexmark Print Management
Lecture 4 Cryptographic Tools (cont) modified from slides of Lawrie Brown.
DATABASE SECURITY By Oscar Suciadi CS 157B Prof. Sin-Min Lee.
OWASP Mobile Top 10 Why They Matter and What We Can Do
OV Copyright © 2011 Element K Content LLC. All rights reserved. System Security  Computer Security Basics  System Security Tools  Authentication.
RIVERA SÁNCHEZ-1 CSE 5810 User Authentication in Mobile Healthcare Applications Yaira K. Rivera Sánchez Computer Science & Engineering Department University.
© Pearson Education Limited, Chapter 5 Database Administration and Security Transparencies.
IBM Rhapsody Simulation of Distributed PACS and DIR systems Krupa Kuriakose, MASc Candidate.
1.NET Web Forms Security Issues © 2002 by Jerry Post.
PRESENTED BY : MOHAMMAD DIAB ALAA’ DWAIKAT SUPERVISOR: DR.SUFYAN SAMARA GRADUATION PROJECT PRESENTATION Amany 3la Al Tareeq أماني على الطريق.
Encryption Encryption is the process of obscuring information to make it unreadable without special knowledge. information
MOBILE MEDICAL INFORMATION FOR THE DEAF By: Siphokazi Dayile Supervisor: Prof I Venter Co-supervisor: Prof WD Tucker.
Starter How many methods of keeping data secure can you think of… Username and Password Biometrics Digital Signature Encryption Access Levels Physical.
Smart Card Technology & Features
Panda Anti-Rootkit & password storage tools
Chapter 19 Manager of Information Systems. Defining Informatics Process of using cognitive skills and computers to manage information.
Project PMR-Droid Group 6 Presenters: Kurt Seippel - Project Manager Michael Keesey – Domain Expert/Customer Liaison Jong Jang – Artifacts Manager/Web.
Database Security Cmpe 226 Fall 2015 By Akanksha Jain Jerry Mengyuan Zheng.
Mobile security application for SignSupport Protecting a Deaf person’s medical information that is stored on a mobile SD card Student: Lindokuhle Duma.
Video notification for SignSupport Remind Deaf users when and how to take medication Student : Vuyisa Phindiso Supervisor : Prof. Bill Tucker.
Video notification for SignSupport Remind Deaf users when and how to take medication Student : Vuyisa Phindiso Supervisor : Prof. Bill Tucker.
Private key
Video notification for SignSupport Remind Deaf users when and how to take medication Student : Vuyisa Phindiso Supervisor : Prof. Bill Tucker.
Securely assessing encrypted cloud storage from multiple devices Nguyen Hoang Long Supervisor : Prof. N. Asokan Advisor : Sandeep.
CIS 450 – Network Security Chapter 10 – UNIX Password Crackers.
 Encryption provides confidentiality  Information is unreadable to anyone without knowledge of the key  Hashing provides integrity  Verify the integrity.
Over 18 yrs experience with SQL Server
Information Systems Design and Development Security Precautions Computing Science.
Video notification for SignSupport Remind Deaf users when and how to take medication Student : Vuyisa Phindiso Supervisor : Prof. Bill Tucker.
BY. Secured Data Transmission through Network handles hiding a secret message with in an image in such a way that others cannot discern the presence or.
A Study of SNS App on Android Platform and Development of “Follow5 App” Name : Huang Xun Professor : Henry Cho Date :
Cryptographic Hash Function. A hash function H accepts a variable-length block of data as input and produces a fixed-size hash value h = H(M). The principal.
ORACLE's Approach ORALCE uses a proprietary mechanism for security. They user OLS.... ORACLE Labeling Security. They do data confidentiality They do adjudication.
SafeNet MobilePKI for BlackBerry® SSO solution, backed by strong MobilePKI-based security Name, Title.
Samsung Pay RAO Lu KONG Shuyi
PASSWORD SECURITY A Melbourne Athenaeum Library
Security Using Armstrong Numbers and Authentication using Colors
Logo: if available Project Name:
Cryptographic Hash Function
e-Health Platform End 2 End encryption
A Wireless LAN Security Protocol
By Oscar Suciadi CS 157B Prof. Sin-Min Lee
SafeNet MobilePKI for BlackBerry® SSO solution, backed by strong MobilePKI-based security Name, Title.
Google 2 Step Verification Backup Codes Google 2 Steps Verification Backup Codes is very important to get access Gmail account. Backup codes is usually.
By Oscar Suciadi CS 157B Prof. Sin-Min Lee
A mobile single sign-on system
Logo: if available Project Name:
CLIENT/SERVER COMPUTING ENVIRONMENT
E-cert (Digital Certificate)
By Oscar Suciadi CS 157B Prof. Sin-Min Lee
Module 2 OBJECTIVE 14: Compare various security mechanisms.
Security Issues with Wireless Protocols
Electronic Payment Security Technologies
Operating Systems Concepts
Presentation transcript:

Mobile security application for SignSupport Protecting a Deaf person’s medical information that is stored on a mobile SD card Student: Lindokuhle Duma Supervisor name: Prof. Tucker

SignSupport Mobile Application Developed by Michael Motlhabi (UWC Masters student)

SignSupport security flaws

User requirements Unreadable by intruders Confidential Authentication

Automatic encryption as a solution Platform independent. Encrypted data cannot be read until decrypted. Decrypted fileEncrypted file

Automatic Encryption Process Fewer CPU cycles Less battery power ReadEncryptSaveDecrypt

Tools to be used Android platform Java programming language Samsung galaxy S2

Project plan TermsTask Term1 (UR and RA) Find SignSupport security flaws Find other mobile security flaws that might affect SignSupport Verify profound security flaws Summarize user requirements in power point Propose "password + encryption" as a possible solution Write a UR and RA report and prepare a presentation Term2 (Modeling and design) Create an abuse-case diagram Create a story board and use-case diagram Design several encryption algorithms Verify designs against user requirements Produce pseudo code for designs Write a report and prepare a presentation Term3 Construction Term4 Testing

Thank you

Related work Password protection Token authentication Biometric authentication Controlling user behaviour

Image References Encrypted/Decrypted files Android platform: Java programming language: Samsung Galaxy S2: Question :