TEMPLATE DESIGN © 2008 www.PosterPresentations.com Android Data Confidentiality Alex Mayer University of Houston Abstract Employees are increasingly relying.

Slides:



Advertisements
Similar presentations
UBIQUITY V3 An extensible platform for creating dynamic, customized, and geocentric native mobile applications.
Advertisements

CS898T Mobile and Wireless Network Handheld Device Security By Yuan Chen July 25 th, 2005.
INADEQUATE SECURITY POLICIES Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA standards.
COMPREHENSIVE APPROACH TO INFORMATION SECURITY IN ADVANCED COMPANIES.
© 2009 VMware Inc. All rights reserved VMware Horizon Mobile Intro - NetHope Deepak Puri Director Mobile Business Development +1 (415)
IPads Everywhere! Management Considerations for the Enterprise Bill Morrison Director of Technology, Rapides Parish School District
Sophos Mobile Control. Tablets on the rise 2 Trends 3 75% of 157 polled companies encourage employee owned smart phones and tablets to access corporate.
1 Electronic Information Security – What Researchers Need to Know University of California Office of the President Office of Research May 2005.
© 2012 Citrix | Confidential – Do Not Distribute BYOD Champion Presentation CIO How-To Kit: Bring-Your-Own Devices © 2014.
CS691 Robin Kimzey Cell Phone Security a little computer in your pocket an easy target for malcontents.
MOBILE MALWARE TOPIC #5 – INFORMATION ASSURANCE AND SECURITY Michael Fine 1.
1 ZIXCORP The Criticality of Security Dena Bauckman Director Product Management April 2015.
PDAs and Cloud Computing in Teaching and Learning Dr.S.Rajasekar, Professor of Education Annamalai University Website:
Empower Enterprise Mobility Jasbir Gill Azure Mobility.
New Data Regulation Law 201 CMR TJX Video.
Presentation By Deepak Katta
Auditing Logical Access in a Network Environment Presented By, Eric Booker and Mark Ren New York State Comptroller’s Office Network Security Unit.
Market Trends Enterprise Web Applications Cloud Computing SaaS Applications BYOD Data Compliance Regulations 30 Second Elevator Pitch Web browsers have.
Chapter Three OPERATING SYSTEMS.
INFORMATION SECURITY THE NEXT GENERATION 13 th World Electronics Forum Israel Christopher Joscelyne Board Member & Membership Chairman AEEMA November 2007.
© Pearson Education Limited, Chapter 5 Database Administration and Security Transparencies.
Adam Leidigh Brandon Pyle Bernardo Ruiz Daniel Nakamura Arianna Campos.
IC3 Chapter 8 Computer Fundamentals
Phish your victims in 5 quick steps. Phish yourself today In less than 5 minutes What is Phish5? Phish5 is a Security Awareness service With Phish5, a.
 Security and Smartphones By Parker Moore. The Smartphone Takeover  Half of mobile phone subscribers in the United States have a smartphone.  An estimated.
David Overton Head of Small Business Technology – Head of Small Business Technology – Microsoft solutions for.
Living in a Digital World Discovering Computers Fundamentals, 2010 Edition.
BRING YOUR OWN DEVICE. BYOD AND THE IMPACT ON IT SECURITY BYOD and pressure employees put on IT organization to supply or allow consumer mobility devices.
Computer Security “Measures and controls that ensure confidentiality, integrity, and availability of IS assets including hardware, software, firmware,
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
Environment for Information Security n Distributed computing n Decentralization of IS function n Outsourcing.
 INADEQUATE SECURITY POLICIES ›Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA.
© 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker.
Blancco – Data Erasure Management
IT Introduction to Information Technology CHAPTER 01.
Your Interactive Guide to the Digital World Discovering Computers 2012.
PRIVACY, SECURITY & ID THEFT PREVENTION - TIPS FOR THE VIGILANT BUSINESS - SMALL BUSINESS & ECONOMIC DEVELOPMENT FORUM October 21, WITH THANKS TO.
Mobile Device Security Drew Hayes Christ Liechty November 27, 2007.
Presented by Team Alpha MOBILE DEVICE SECURITY 1.
The State of Computer & Data Security in Corporations Independent Survey.
ANDROID DATA CONFIDENTIALITY Tips and tools for keeping corporate confidential information confidential on Android Mobile Devices. Alex Mayer University.
What is Android……? Android is an Operating System (OS) created by Google to run on any small electronic devices such as cell phones, e- books, Media Internet.
Microsoft ® Windows ® Small Business Server 2003 R2 Sales Cycle.
Module 6: Designing Security for Network Hosts
Working with HIT Systems
Sponsored by the U.S. Department of Defense © 2008 by Carnegie Mellon University page 1 Pittsburgh, PA The Implications of a Single Mobile Computing.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
User and Device Management
Cyber Security in the Mobile Era KEEPING ENTERPRISE DATA SAFE IN THE BYOD ERA.
1 Information Governance (For Dental Practices) Norman Pottinger Information Governance Manager NHS Suffolk.
BYOD: An IT Security Perspective. What is BYOD? Bring your own device - refers to the policy of permitting employees to bring personally owned mobile.
©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. Securing Your Data in Endpoint and Mobile Environments Frank Suijten Security.
System Software Chapter Handles technical details Works with end users, application software, and computer hardware Four types of programs –Operating.
 client  client/server network  communication hardware  extranet  firewall  hacker  Internet  intranet  local area network (LAN)  Network 
Information Technology Acceptable Use An Overview CSTMC All Staff Meeting February 10, 2014.
Corporate Collaboration with Visual Communications Visual communications is the future of corporate collaboration technology and organizations need to.
System Software Chapter Handles technical details Works with end users, application software, and computer hardware Four types of programs –Operating.
Short Customer Presentation September The Company  Storgrid delivers a secure software platform for creating secure file sync and sharing solutions.
Workshifting Transform your business – empower your people.
LESSON 12 Business Internet. Electronic business, or e-business, is the application of information and communication technologies (ICT) in support of.
What Are the Different Platforms for Enterprise Mobility Solutions?
Handling Personal Data & Security of Information Paula Trim, Information Officer, Children’s Strategic Services, Mon – Thurs 9:15-2:15.
SOFTWARE PIRACY & WORKPLACE ETHICS. What Is Software Piracy? Unauthorized copying/installation/use Unauthorized distribution or sale.
Protecting PHI & PII 12/30/2017 6:45 AM
The time to address enterprise mobility is now
Transforming business
MICROSOFT AZURE ISV PROFILE: ONEBE
Personal Mobile Device Acceptable Use Policy Training Slideshow
Presentation transcript:

TEMPLATE DESIGN © Android Data Confidentiality Alex Mayer University of Houston Abstract Employees are increasingly relying on mobile devices to perform daily job functions. Today's mobile devices are what connect the employee back to the office. Confidential company information remains on the mobile devices after they are at the end of their lifecycle. Company’s need to be able to secure confidential data left on mobile devices in order to meet security and business policy objectives. Mobile Device’s in Corporate Environments Data Remanence Problem DesDROID Flash Disk ApplicationSummary Mobile devices are increasingly being utilized by business to help ease the gap between work and home. Most enterprises currently use some type of smart device for their employees, consequently the confidentiality of data on these devices needs to be maintained. As mobile devices become more important in daily business processes, it is equally important to ensure information contained on those devices does not get into the wrong hands. Using DesDROID will positively impact your business by ensuring confidential data is not lost or stolen. By taking these necessary steps, your business complies with business standards and reduces unneeded risk. References Most, if not all large companies issue mobile devices to their employees Mobile devices can connect to any and all information systems used by companies 1 Confidential company information is stored on mobile devices and remains on the devices when they reach the end of their life cycle When a mobile device malfunctions, it is important to get into the device and backup the confidential data and destroy any and all traces of that data. The Android operating system is fast replacing RIM and Windows Mobile devices which shows in the 3Q of 2010 to own 25% of the market share According to NIST, cell phones and personal digital assistants (PDAs) have become indispensable tools for today's highly mobile workforce. Small and relatively inexpensive, these devices can be used for many functions, including sending and receiving electronic mail, storing documents, delivering presentations, and remotely accessing data. While these devices provide productivity benefits, they also pose new risks to organizations. 2 Data remanence is the left over physical data that either has been erased or overwritten. Since mobile devices use flash for data storage, typically files are not overwritten due to the nature of how flash disks operate. There are several methods to retrieve old data from mobile devices, all of which are not easy and require some technical expertise. However, the point being that it is possible to retrieve data from mobile devices even after the data was deleted. 3 Collection, data cleansing, and disposal of wireless devices. This software service secures corporate data assets and completes the lifecycle of individual communications devices in an environmentally responsible manner, while also providing your organization an opportunity to earn potential cash rebates based on the device type. In order to delete confidential data from the mobile device, I have created a flash disk compilation of Android software, called DesDROID. These apps are needed to destroy system and user data on Android Mobile Operating System 2.1 and 2.2. All the following files will be located on DesDROID disk, and are apps all free to use. Root Explorer SPRecovery Terminal Emulator Superuser Androot Step 1 :: Root the DROID Run Androot and follow the directions **Now the DROID is rooted proceed to step two. Step 2 :: Run Superuser Grant Terminal Emulator Root Access Step 3 :: Run Console Emulator Type: su (grants root access to Droid OS) Type Reboot Recovery (See blue image above) Step 4 :: SPRecovery ( Sir Psychosis Recovery) Choose “wipe data/factory reset” and run it 7 times NIST Standards Journals and Articles Global Mobile Device Market Share for A 1.B 1.C 2.B2.A 3 Android Vulnerable To Data Theft Exploit Google is working to patch a new data-stealing vulnerability that affects all versions of the Android operating system. 5 CIOs See Smart phones As Data Breach Time Bomb Eight out of 10 CIOs think that using smart phones in the workplace increases the business's vulnerability to attack, and rank data breaches as their top related security concern. Yet half of organizations fail to authenticate their employees' mobile devices, among other basic security measures. 6 Data loss challenges rise Organizations are starting to realize the importance of data protection, but possible routes of data loss have become complicated and numerous, making countermeasures difficult to develop. 7 Guidelines on Cell Phone and PDA Security 2 Guidelines for Media Sanitization 8 CompanyUnits% Symbian Android iOS Research in Motion MS Windows Mobile Linux Other OS