1 / 12

Protection of personal mobile computer devices

Protection of personal mobile computer devices. Information Security Isaac Fernandes, mci12009 Sofia Nunes, mci12014. Introduction.

avel
Download Presentation

Protection of personal mobile computer devices

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Protection of personal mobile computer devices Information Security Isaac Fernandes, mci12009 Sofia Nunes, mci12014

  2. Introduction • In this work, we intend to present which are the available means of protection and security of personal mobile computer devices, especially  against theft and unauthorized use. • Aspects covered: • General security concepts • General measures of protection for personal devices • Applications for data protection • Mechanisms of anti-theft protection

  3. Personal mobile computer devices

  4. General Security Concepts • The Information Security ensures the preservation of certain properties of the information contained in the different ways in which this can be revealed. • There are basic principles that need to be secured for protection, such as: • Availability • Confidentiality • Integrity • Authenticity • The loss of any of these characteristics is a threat to information security.

  5. General measures of protection for personal devices • There are simple steps that are within reach for all users of personal devices in order to increasing safety: • Access control mechanisms such as passwords and firewalls; • Creating backup copies; • Software updates;

  6. Applications for data protection • Data Encryption The encryption of a message is thus to modify its character, by mathematical operations in order to place the characters in transit clear-cut, and the receiver apply for other mathematical operations can understand. SymmetricAlgorithms Asymmetric Algorithms

  7. Applications for data protection • Data encryption applications • TrueCrypt • Camouflage • Conceal • AxCrypt • Encryptonclick

  8. Mechanisms of anti-theft protection • The theft of a laptop computer is currently seeing a huge problem when we consider the amount of personal information located in one device • Security problems, are constantly present in the everyday of a user of information technologies. • One solution, to be taken into account, is to guard the safety of sensitive data and encrypt them, requiring a password or a "keyfile" to access such information

  9. Mechanisms of anti-theft protection • PhysicalMechanisms -Security cable for laptops with anti-theft lock with safety key - Anti-theft cable with combination and alarm

  10. Mechanisms of anti-theft protection • PhysicalMechanisms Safety device for usb flash drive Biometric Readers - authentication through fingerprint

  11. Mechanisms of anti-theft protection Remotelocking / Locationsystems • Nonstop Laptop Guardian • Safe4cam SNAKING

  12. Conclusions…

More Related