1 / 8

Mobile Device Security

Mobile Device Security. Drew Hayes Christ Liechty November 27, 2007. Overview. Mobile device security background PDA security Laptop security. Background. Major problem: ease of use vs. complete security Software security Physical security. PDA Security.

ewalter
Download Presentation

Mobile Device Security

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Mobile Device Security Drew Hayes Christ Liechty November 27, 2007

  2. Overview • Mobile device security background • PDA security • Laptop security

  3. Background • Major problem: ease of use vs. complete security • Software security • Physical security

  4. PDA Security • 40% of users say they don’t have any security in place • Viruses for mobile devices • Vulnerabilities • Securing your mobile device • Possible future of security: transient authentication

  5. Laptop Security • Why is it important to educate and enforce security procedures on laptops? • Ease of profitability from theft • Company’s Reputations

  6. Laptop Security • How can a company become more secure with its mobile devices? • Start with policy • Know where the data lives • Encrypt data on mobile devices • Use standard security controls on mobile devices • Keep administrator’s passwords out of the user’s hands

  7. Laptop Security • How can a company make sure employee’s follow security policies? • Responsibility is key in this situation, setting examples of employee’s that don’t follow the rules is a must. A “slap on the wrist” won’t do in today’s business world.

  8. References • “2006: The Year of the laptop … stolen that is” http://infosecblog.antonaylward.com/2007/01/01/2006-the-year-of-the-laptop-stolen-that-is/ • “An Overview of Mobile Device Security” http://www.viruslist.com/en/analysis?pubid=170773606 • “Does Your Wi-Fi Hotspot Have an Evil Twin?” http://www.pcworld.com/article/id,120054-page,1/article.html • “Get a Grip on Handheld Security” http://www.esecurityplanet.com/best_practices/article.php/3681976 • “Mobile Device Security in Six Simple Steps” http://searchsecurity.techtarget.com/tip/0,289483,sid14_gci1238860,00.html • “Mobile Device Security Using Transient Authentication” IEEE Transactions on Mobile Security • “Next Wave in Security: Protecting Smart Phones, PDAs” http://www.eweek.com/article2/0,1759,2093092,00.asp?kc=EWRSS03129TX1K0000614 • “Sprint sees mobile device security neglect” http://www.computerworld.com/mobiletopics/mobile/story/0,10801,101265,00.html

More Related