Mobile Computing Security: Issues & Requirements

Начать. Это бесплатно
или регистрация c помощью Вашего email-адреса
Mobile Computing Security: Issues & Requirements создатель Mind Map: Mobile Computing Security: Issues & Requirements

1. Characteristics & Features

1.1. Characteristics

1.1.1. 1) Wireless Network Computing

1.1.2. 2) Small Size

1.1.3. 3) The mobile nature of using

1.1.4. 4) Power sources used

1.1.5. 5) Functions which are particular and needed to mobile users

1.2. Features

1.2.1. 1) The portable that enables easy to carry it

1.2.2. 2) Attractive user interface which is characterized it

1.2.3. 3) Wireless that enables to easy access Internet

1.2.4. 4) The transmission of voice and typical data,and so on

2. Wireless Security Issues & Examples

2.1. Explanation

2.1.1. Intercepted of their radio signals by hacker and non- management of its network entirely by user

2.1.2. most of wireless networks are dependent on other private networks

2.1.3. User has less control of security issues of mobile computing

2.2. Security Issues Examples

2.2.1. 1)Denial of Services(DOS) attacks

2.2.1.1. Buffer overflow attacks

2.2.1.1.1. The concept is to send more traffic to a network address than the programmers have built the system to handle

2.2.1.2. ICMP Flood

2.2.1.2.1. Leverages misconfigured network devices by sending spoofed packets that ping every computer on the targeted network,instead of just one specific machine

2.2.2. 2)Eavesdropping

2.2.2.1. A theft of information as it transmitted over a network by a computer,smartphone,or another connected device

2.2.2.2. The attack takes advantages of unsecured network communications to acces data as it is being sent or received by its user

2.2.3. 3) Traffic Analysis

2.2.3.1. The ciphertext length usually reveals the plaintext length from which an attacker can get valuable information

2.2.3.2. Attacker can tap into fibers and obtain this information

2.2.4. 4) Spoofing

2.2.4.1. Masquerading-uses a fake identity ,such as networks identity,to gain unauthorized access to personal computer information

2.2.4.2. Trojan horse attacks -

2.2.4.2.1. A type of malicious code or software that looks legitimate but can take control of your computer

2.2.5. 5) Session Interception & Messages Modification

2.2.5.1. cause our assets to become unusable or unavailable for our use,on a temporary or permanent basis

2.2.5.2. involve tampering with our assest,Such attacks might primilary be considered an integrity attack but could also represent an availability attack