© 2009 Research In Motion Limited Advanced Java Application Development for the BlackBerry Smartphone Trainer name Date.

Slides:



Advertisements
Similar presentations
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 8: Monitoring the Network Connecting Networks.
Advertisements

V0.1 Inclusive and Accessible Application Design June 21, 2012.
Introduction to push technology © 2009 Research In Motion Limited.
V1.00 © 2009 Research In Motion Limited Introduction to BlackBerry Smartphone Web Development—The BlackBerry Infrastructure Trainer name Date.
UNDERSTANDING JAVA APIS FOR MOBILE DEVICES v0.01.
Bluetooth Technology. What is Bluetooth? Bluetooth is a short- range communications technology that allows devices to communicate with each other without.
© 2009 Research In Motion Limited Advanced Java Application Development for the BlackBerry Smartphone Trainer name Date.
V0.01 © 2009 Research In Motion Limited Introduction to Java Application Development for the BlackBerry Smartphone Trainer name Date.
Security in By: Abdulelah Algosaibi Supervised by: Prof. Michael Rothstein Summer II 2010: CS 6/79995 Operating System Security.
© 2009 Research In Motion Limited Methods of application development for mobile devices.
1 Lecture 30 Introduction to Data Communications Overview  Lecture Objectives.  Data Communications: Basics.  Major Issues in Data Communications. 
V0.01 © 2009 Research In Motion Limited Introduction to Java Application Development for the BlackBerry Smartphone Trainer name Date.
V0.01 © 2009 Research In Motion Limited Introduction to Java Application Development for the BlackBerry Smartphone Trainer name Date.
V0.01 © 2009 Research In Motion Limited Introduction to Java Application Development for the BlackBerry Smartphone Trainer name Date.
V0.01 © 2009 Research In Motion Limited Understanding Java APIs for Mobile Devices Trainer name Date.
A Comparison of Bluetooth and competing technologies
V1.00 © 2009 Research In Motion Limited Introduction to Mobile Device Web Development Trainer name Date.
© 2009 Research In Motion Limited Introduction to GPS and Wi-Fi technology on BlackBerry smartphones.
Sujeeth Narayan1 Smartphones Security CS 691 Sujeeth Narayan.
V0.01 © 2009 Research In Motion Limited Push technology for Java applications Trainer name Date.
How secure is Darren Adams, Kyle Coble, and Lakshmi Kasoji.
Directory and File Transfer Services Chapter 7. Learning Objectives Explain benefits offered by centralized enterprise directory services such as LDAP.
V0.1 BlackBerry HTML5/WebWorks Applications for the BlackBerry ® PlayBook™ Tablet BlackBerry Academic Program Module 1 - Overview.
© 2009 Research In Motion Limited Advanced Java Application Development for the BlackBerry Smartphone Trainer name Date.
Information Systems Today: Managing in the Digital World TB4-1 4 Technology Briefing Networking.
Wireless Networking and Security
MOBILE DEVICE SECURITY. WHAT IS MOBILE DEVICE SECURITY? Mobile Devices  Smartphones  Laptops  Tablets  USB Memory  Portable Media Player  Handheld.
Using Windows Firewall and Windows Defender
“Security Weakness in Bluetooth” M.Jakobsson, S.Wetzel LNCS 2020, 2001 The introduction of new technology and functionality can provides its users with.
© 2009 Research In Motion Limited Advanced Java Application Development for the BlackBerry Smartphone Trainer name Date.
1 of6 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2007 Microsoft Corporation.
KAIS T In-Vehicle Secure Wireless Personal Area Network (SWPAN) Reference: S. M. Mahmud and Shobhit Shanker, “In-Vehicle Secure Wireless Personal Area.
Small Devices on DBGlobe System George Samaras Chara Skouteli.
Objectives Configure routing in Windows Server 2008 Configure Routing and Remote Access Services in Windows Server 2008 Network Address Translation 1.
V0.1 BlackBerry HTML5/WebWorks Applications for the BlackBerry ® PlayBook™ Tablet BlackBerry Academic Program Module 5 - Writing HTML5/WebWorks API Extensions.
Windows 7 Firewall.
© 2009 Research In Motion Limited Advanced Java Application Development for the BlackBerry Smartphone Trainer name Date.
Distributed systems – Part 2  Bluetooth 4 Anila Mjeda.
Bluetooth Presented by Venkateshwar R Gotur CMPT
Course code: ABI 204 Introduction to E-Commerce Chapter 5: Security Threats to Electronic Commerce AMA University 1.
A l a d d i n. c o m eSafe 6 FR2 Product Overview.
Module 8: Planning and Troubleshooting IPSec. Overview Understanding Default Policy Rules Planning an IPSec Deployment Troubleshooting IPSec Communications.
Wi-Fi Technology. Agenda Introduction Introduction History History Wi-Fi Technologies Wi-Fi Technologies Wi-Fi Network Elements Wi-Fi Network Elements.
BLUETOOTH Created By: Ajay Bahoriya. Agenda Introduction to Bluetooth Bluetooth Basics Mode of operation Technology Security Advantages Integrating BT.
Enforcing Cyber security in Mobile Applications – Public Sector Use Case SAPHINA MCHOME, VIOLA RUKIZA TANZANIA REVENUE AUTHORITY INFORMATION AND COMMUNICATION.
Storage Device Design Pattern JEFF MEISSNER; KEN HARDY Windows Program Management.
© 2009 Research In Motion Limited Advanced Java Application Development for the BlackBerry Smartphone Trainer name Date.
Lecture 24 Wireless Network Security
Focus On Bluetooth Security Presented by Kanij Fatema Sharme.
Week I Security and Mobile Devices. Overview Purpose of Security Application to Mobile Devices Threats to Mobile Devices Security and the Blackberry Threats.
© 2015 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other marks contained herein are trademarks of AT&T Intellectual Property.
1 of 5 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2007 Microsoft Corporation.
Communications and Networks Chapter 9 9-1Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved.
Don’t Log in!. Recap on the previous units I’ve tried to make it as concise as possible but there is a bit of writing, to ensure that you have some notes.
© 2013 Toshiba Corporation B2B PC Training Mailer - Toshiba Device Access Control.
1 © 2004, Cisco Systems, Inc. All rights reserved. Wireless LAN (network) security.
BLUETOOTH HACKING - Image the world without wireless By Indra Divya.K Kalasalingam University CSE-Final yr.
Cisco Exam Questions IMPLEMENTING CISCO IOS NETWORK SECURITY (IINS V2.0) VERSION: Presents: 1.
ActiveSync & DLP management in Exchange Online
Instructor Materials Chapter 6 Building a Home Network
Module 8: Securing Network Traffic by Using IPSec and Certificates
Wireless LAN Security 4.3 Wireless LAN Security.
Module 8: Securing Network Traffic by Using IPSec and Certificates
Microsoft Virtual Academy
Short-Range Radio Frequency Networking
Short-Range Radio Frequency Networking
Wireless networking Rytis Garbauskas.
Presentation transcript:

© 2009 Research In Motion Limited Advanced Java Application Development for the BlackBerry Smartphone Trainer name Date

© 2009 Research In Motion Limited Agenda In this course, you will cover the following topics: –Introduction to advanced mobile application development for the BlackBerry ® smartphone –Application control for mobile devices –Optimization for mobile application development –Advanced BlackBerry user interface –Introduction to multimedia application development for the BlackBerry smartphone –Understanding push technology

© 2009 Research In Motion Limited Agenda In this course, you will cover the following topics: –Understanding client/server push –Introduction to developing Bluetooth ® applications for mobile devices –Developing secure applications

Advanced Java Application Development for the BlackBerry Smartphone Objectives: –Describe Bluetooth wireless technology –Identify supported Bluetooth wireless technology profiles –Discuss Bluetooth wireless technology security –Discuss the implementation of Bluetooth wireless technology in BlackBerry wireless applications –Describe JSR-82 Java ® APIs for Bluetooth © 2009 Research In Motion Limited APIapplication programming interface

© 2009 Research In Motion Limited Introduction to developing Bluetooth applications for mobile devices

Bluetooth wireless technology –With Bluetooth technology, users can make effortless, instant connections between: Mobile phones Desktop computers Notebook computers © 2009 Research In Motion Limited

Bluetooth wireless technology –Bluetooth uses radio transmission –Transfers both voice and data in real-time –Ensures protection from interference and security of data © 2009 Research In Motion Limited

Bluetooth wireless technology –Bluetooth specification has two power levels defined: Lower power level that covers the shorter personal proximity range within a room Higher power level that can cover a medium range, such as within a home –Supports both point-to-point and point-to-multipoint connections © 2009 Research In Motion Limited

Bluetooth wireless technology –Bluetooth technology is a nonsecure channel –If implemented incorrectly, it can introduce security vulnerabilities into an organization’s network © 2009 Research In Motion Limited

BlackBerry Enterprise Solution security –Encrypts data at all points between the BlackBerry smartphone and the BlackBerry ® Enterprise Server –Only the BlackBerry Enterprise Server and the BlackBerry smartphone can access data sent between them © 2009 Research In Motion Limited

Bluetooth profiles © 2009 Research In Motion Limited

Bluetooth profiles –Specify how applications between devices connect and are interoperable –Provide use-case scenarios and information about how to configure applications © 2009 Research In Motion Limited

Bluetooth profiles Bluetooth profiles that BlackBerry smartphones support –A2DP –AVRCP –HFP –HSP –SPP –SIM Access Profile © 2009 Research In Motion Limited

Bluetooth wireless technology security –Bluetooth enabled devices are at risk for attack when: Bluetooth wireless transceiver is turned on Bluetooth enabled device is set to use discoverable (visible) mode Bluetooth enabled device is physically located within range of a user with malicious intent © 2009 Research In Motion Limited

Bluetooth wireless technology security Risks of using Bluetooth technology on wireless devices –Bluetooth enabled devices have the following vulnerabilities: Users with malicious intent can obtain confidential data without consent A previously trusted (or paired) source removed from the Trusted list can access the memory contents of some Bluetooth enabled devices © 2009 Research In Motion Limited

Bluetooth wireless technology security Risks of using Bluetooth technology on wireless devices –Bluetooth enabled devices have the following vulnerabilities: Users with malicious intent can gain access to higher-level commands and to voice, data, and messaging channels –Security threats can be user or device based © 2009 Research In Motion Limited

Bluetooth wireless technology security Bluejacking –User-based threat –Users with malicious intent send text messages anonymously to Bluetooth enabled devices –Bluetooth enabled device must be set to use discoverable mode and are physically located within 10 meters of the attacking devices © 2009 Research In Motion Limited

Bluetooth wireless technology security Bluesnarfing –Device-based threat that occurs when device manufacturers implement the specification for Bluetooth technology incorrectly –Can also access device information without knowledge or consent © 2009 Research In Motion Limited

Bluetooth wireless technology security Bluebugging –Device-based threat that occurs when manufacturers implement security mechanisms for Bluetooth technology improperly –Also occurs when users with malicious intent access phone commands © 2009 Research In Motion Limited

Bluetooth wireless technology security Managing Bluetooth enabled BlackBerry smartphones –With BlackBerry Enterprise Server version 4.0 or later, you can set IT policy rules that are designed to control the behavior of Bluetooth enabled BlackBerry smartphones © 2009 Research In Motion Limited ITinteractive technology

Bluetooth wireless technology security –Bluetooth technology security measures on BlackBerry smartphones: Support only seven of the available Bluetooth profiles Limited support for the Bluetooth SPP Discoverable mode option on BlackBerry smartphones is turned off by default © 2009 Research In Motion Limited SPPSerial Port Profile

Bluetooth wireless technology security –Bluetooth technology security measures on BlackBerry smartphones: Set the Limit Discoverable Time IT policy rule to True to allow discoverable mode for two minutes only Use the Disable Bluetooth IT policy rule to control the Bluetooth wireless transceiver Users must request connections © 2009 Research In Motion Limited

Bluetooth wireless technology security –Bluetooth technology security measures on BlackBerry smartphones: Specify whether or not to use a passkey to encrypt data Request a combination key for authentication Prompt the users each time that other Bluetooth enabled devices try to connect to them © 2009 Research In Motion Limited

Bluetooth wireless technology security –Bluetooth technology security measures on BlackBerry smartphones: Set the Disable Desktop Connectivity IT policy rule to True to prevent connections between the BlackBerry smartphone and the BlackBerry ® Desktop Manager Set the Disable Wireless Bypass IT policy rule to True to use a serial port to exchange information with the BlackBerry Enterprise Server © 2009 Research In Motion Limited

Bluetooth wireless technology security Using IT policy to manage Bluetooth technology on BlackBerry smartphones –IT policy rules that control the use of Bluetooth wireless technology are available in BlackBerry Enterprise Server version 4.0 and later –All Bluetooth enabled BlackBerry smartphones can be managed simultaneously or individually © 2009 Research In Motion Limited

Using JSR-82 © 2009 Research In Motion Limited

Using JSR-82 –JSR-82 is a standard defined by the Java Community Process for providing a standard to develop Bluetooth applications in Java –JSR-82 API hides the complexity of the Bluetooth protocol stack by exposing a simple set of Java APIs © 2009 Research In Motion Limited JSRJava Specification Request

Using JSR-82 –The JSR-82 API provides you with the options to do the following: Manage the local Bluetooth device settings Discover other Bluetooth devices in the neighborhood Search for Bluetooth devices on the discovered Bluetooth smartphone Connect to any of those Bluetooth services and communicate with them © 2009 Research In Motion Limited

Using JSR-82 –The JSR-82 API provides you with the options to do the following: Register a Bluetooth service on a BlackBerry smartphone so that other Bluetooth devices can connect to it Manage and control the communication connections Provide security to all of the preceding options © 2009 Research In Motion Limited

Summary © 2009 Research In Motion Limited

Summary –Bluetooth wireless technology provides fast, portable connection service –Wireless technology is considered to be nonsecure –You must protect against vulnerabilities when creating applications –Bluetooth profiles determine how applications on BlackBerry smartphones and on Bluetooth enabled devices connect and are interoperable © 2009 Research In Motion Limited

Summary –IT policy rules prevent nonsecure actions and require certain secure behaviors on the BlackBerry smartphones –Follow the JSR-82 standard to develop secure applications © 2009 Research In Motion Limited

Legal Disclaimer The following trademarks and/or registered trademarks of Research In Motion are referred to in this presentation: –BlackBerry® The following BlackBerry products are referred to in this presentation: –BlackBerry® Enterprise Solution –BlackBerry® Enterprise Server © 2009 Research In Motion Limited

Legal Disclaimer © 2009 Research In Motion Limited. All rights reserved. BlackBerry®, RIM®, Research In Motion®, SurePress™ SureType® and related trademarks, names and logos are the property of Research In Motion Limited and are registered and/or used in the U.S. and countries around the world. All other trademarks are the property of their respective owners. This documentation is provided "AS IS" and without condition, endorsement, guarantee, representation or warranty, or liability of any kind by Research In Motion Limited and its affiliated companies, all of which are expressly disclaimed to the maximum extent permitted by applicable law in your jurisdiction.