Без темы
<<  CCH Federal Taxation Comprehensive Topics Central Line-Associated Bloodstream Infections (CLABSI) in Non-Intensive Care Unit (non-ICU) Settings Toolkit  >>
Phone OS by Market Share
Phone OS by Market Share
Phone OS Market Share – US, UK, China
Phone OS Market Share – US, UK, China
Phone OS Market Share – US, UK, China
Phone OS Market Share – US, UK, China
Phone OS Market Share – US, UK, China
Phone OS Market Share – US, UK, China
3G – Implementation
3G – Implementation
F8 – Confidentiality Algorithm
F8 – Confidentiality Algorithm
Cellular Network Security
Cellular Network Security
Картинки из презентации «Cellular Network Security» к уроку английского языка на тему «Без темы»

Автор: ryan-watts. Чтобы познакомиться с картинкой полного размера, нажмите на её эскиз. Чтобы можно было использовать все картинки для урока английского языка, скачайте бесплатно презентацию «Cellular Network Security.ppt» со всеми картинками в zip-архиве размером 935 КБ.

Cellular Network Security

содержание презентации «Cellular Network Security.ppt»
Сл Текст Сл Текст
1Cellular Network Security. Secure 14Access Security Utilizes secret keys and
Systems Administration Spring 2011. Ryan secret key ciphers to maintain
Stepanek. confidentiality Uses a temporary
2A brief history of cellular networks. International Mobile User Identity to
Cellular networks have been deployed for protect the user’s identity. Challenge
the last three decades 1G networks had Response System Used when Authenticating
maxspeeds of about 9.6 kbs [1] As network Occurs when user first connects to
technology evolved, two standards emerged: network, when the network receives a
CDMA and GSM Modern cellular networks service request, when a location update is
operate in the third and fourth sent, on attach/detatch request, etc..[1].
generation, reaching theoretical speeds up 153G-Integrity and Confidentiality.
to 100 Mbit/s. Signaling communications between mobile
3Challenges of Cellular Networks. Open station and network F9 algorithm used to
Access Wireless – No physical connection calculate 32-bit MAC-I for data integrity
necessary! Bandwidth Limitations – then compared to a calculated XMAC-I F8
Everyone has to share the network. System used to keep data confidential, utilizes a
Complexity – The larger the implementation cipher key that comes from the mobile
of the system the more difficult it is to device; output is then XORed with the
maintain security. Confidentiality – original data stream Both F8 and F9 rely
Private data needs to be encrypted. on KASUMI cipher Based on feistel
Integrity – Must minimize data loss; more structure to create 64bit data blocks and
services being sent through the network. a 128 bit key.
Authentication With Other Networks – 16F8 – Confidentiality Algorithm.
Companies need to play nice with each 173G-Internet Security. Wireless
other. Application Protocol Protocol that handles
4Security Issue for Cellular Networks. wireless devices connecting to the web
Operating systems on mobile devices – Independent of underlying OS WAP2 – puts
Android, Windows, iPhone Web services – devices into direct communication with
Potential for abuse through the addition servers Uses layers similar to standard
of new services; DOS. Location Detection – networks IPv6 and IPv4 3G allows for
Keep the location of the user private! circuit switched and packet switched
Spyware; malware – Phones and network may network nodes 4G is packet switched nodes
be vulnerable. only; completely IPv6 compatible.
5Phone OS by Market Share. 18
6Phone OS Market Share – US, UK, China. 19Liability Quantity and nature of data
7I-Security. Mobile OS – left open to Potential harm from data Lawsuits Profits
viruses and malware Users can jailbreak Bandwidth is not free Capability of
and run their own code History of being devices vs. popularity of devices Risk for
slow to patch SMS virus – over two months every network expansion. Cellular Network
to patch! Spreading the virus required Security – Factors to Consider.
only the victims phone number Spread 20Sources. [1] “Security in Wireless
through memory corruption in iPhone[6] Cellular Networks” Gardezi, Ali.
Potentially detrimental to host network http://docs.google.com/viewer?a=v&q=ca
Dangerously popular – In December 2009 he:mFeuQOB24gwJ:www1.cse.wustl.edu/~jain/c
AT&T was forced to halt iPhone sales e574-06/ftp/cellular_security.pdf+cellular
in New York[5] Can you hear me now? network+security&hl=en&gl=us&p
Network load became too great for existing d=bl&srcid=ADGEESgk1O3TVCFitfU0KCDfZp2
infrastructure. IogPvw0bjkw767GFdWlAOyWm866YcuCt8IEn2uag61
8Blackberries. Very good encryption WAW0S32eIhFbaoMgQiJh_WJi5QYE2RIwkizPeTRzms
Causes conflicts with governments on the cBNMtESgBQNA9NmF5VgqtrQBe0&sig=AHIEtbR
grounds of national security i.e. India 83Y3fhGxdHQa47sZCueMwq3jsA [2] “Exploiting
2009[7] Relies on security through Vulnerabilities and Security Mechanisms in
obscurity Vulnerable through third party Internet Based SMS Capable Cellular
apps i.e. the Webkit browser was used at Networks” Azim, Akramul.
this year’s Pwn2Own hacking expo.[8] http://docs.google.com/viewer?a=v&q=ca
Blackberry Enterprise Server(BES) Commonly he:AmTvXrmYVNoJ:citeseerx.ist.psu.edu/view
used in business and government, oc/download%3Fdoi%3D10.
compromising the server could allow access Drep1%26type%3Dpdf+cellular+network+securi
to phone information Fairly secure if y&hl=en&gl=us&pid=bl&srcid
configured correctly(EAL 4+)[10]. ADGEESiJC2Zr-k8fOWOH70HSEDwahX_x1pJXZOS2An
9Android. Open source Incredibly HNcBqh0Qm3xcBlkqiVgOW0spQM0aqzoMxYkuThzhKi
threatening to network profit/security CKxOa8nc8slQ_qDM1a5OQ_zO0qnBL3Y_9zylwEMLPY
i.e. free WiFi tethering Rooting Allows 8ORC5mXftkM&sig=AHIEtbQjQIcq5LnEbumpqW
greater control over the phone Creates a gCCN3u0uXVA.
natural conflict between the service 21Sources - Countinued. [3] “CDMA vs.
provider and customer Also increases GSM – Which One is the BestYou?”
vulnerability to viruses i.e. custom ROMs http://www.cellutips.com/gsm-vs-cdma-which
will not receive updates from the service one-is-the-best-for-you/ [4] “GSM: Global
provider Companies now actively trying to System for Mobile Communications”
hinder rooting i.e. Motorola[8]. http://www.3gamericas.org/index.cfm?fuseac
10GSM vs CDMA. GSM More than 3.8 billion ion=page&sectionid=242 [5] “AT&T
people worldwide Far more common outside apparently resumes online iPhone sales in
of North America More than 89 percent of New York City”
market share[4] More than more than 212 http://articles.cnn.com/2009-12-28/tech/ip
countries and territories[3] Interferes one.sales.nyc_1_iphone-sales-online-sales-
with some electronics CDMA Transmits data t-t-service?_s=PM:TECH [6] “First iPhone
signal modulated with pseudorandom code Virus Found Using SMS Testing”
Generally allows for larger transmission http://ironmill.wordpress.com/2009/07/30/i
cells Allows users to share frequencies. hone-virus/ [7] “BlackBerry encryption
113G – Network Components. Radio Access 'too secure': National security vs.
Network Towers Radio Network Controllers consumer privacy”
Core Network Packet Switched Network http://www.zdnet.com/blog/igeneration/blac
Circuit Switched Network SGSN – Handles berry-encryption-too-secure-national-secur
Access Control and Route Management GGSN – ty-vs-consumer-privacy/5732 [8]
Gateway to the Internet. “BlackBerry security breached at Pwn2Own
123G – Implementation. 2011”
13Attacks on Cellular Neworks. DOS/DDOS http://crackberry.com/blackberry-security-
– Probably the most common. iPhones reached-pwn2own-2011 [9] “Are the Days of
Services and bandwidth usage seems to be Rooting Android Phones Coming to an End?”
increasing faster than network http://www.droid-life.com/2011/04/04/are-t
infrastrucure More achievable now through e-days-of-rooting-android-phones-coming-to
infecting phones Jamming Highly localized, an-end/ [10] “Approvals and
similar in effect to DOS Eavesdropping Man Certifications”
in the Middle attacks Session hijacking. http://us.blackberry.com/ataglance/securit
143G - Defensive Measures. Network /certifications.jsp.
Cellular Network Security.ppt
cсылка на страницу

Cellular Network Security

другие презентации на тему «Cellular Network Security»

«Английские числительные» - Древние греки. Изменения. Слова. Число «семь». Один оставшийся. Everything about English and Russian numerals. Счёт сотнями. Пифагор. Число. Обещанного три года ждут. Принципы образования количественных числительных. Числа в пословицах и поговорках.

«Британский парламент» - Who controls the British Parliament. Thank you very much for your help. Акты об объединении. Британский парламент. My name is Dennis. My name is Karina. New letter. Парламент Соединённого Королевства Великобритании. Mrs. Ririchio. British Parliament.

«Ассоциация английского» - «Светская музыка США 19 века». «Золотой век Бродвейских мюзиклов». «Инновации в преподавании английского языка. Приложение к газете « Первое сентября» № за март 2010 года. 8 преподавателей среднеспециальных образовательных учреждений. Калининградское отделение НОПАЯз (Kaliningrad Association of the Teachers of English).

«St. Valentines day» - 2. What is the love story behind St. 8. What fruit or vegetable is often called a love-apple? In what other organ did love reside? New York Manchester Verona. Valentines Day? Valentine's day quiz. 7. When did Valentine's cards become popular in the UK? 9. When was February 14 set aside to honor St. He left the military to get married.

«Вопросы на английском» - Американские фильмы. Ask what subjects the following people are studying. Юриспруденция. Новая книга. Practice the names of subjects. Кирилл учится в аспирантуре. Костя учится в университете. Я люблю. Я люблю иностранные языки. Сима говорит о тебе. Голоса Book 1, Unit 4. Литература. Анна учится в университете.

«My school» - Let’s discuss. Level 7. “Weigh” your positive opinions about school and negative ones. Let’s Travel and Play. Иинтернет-сайты. Everybody goes to school. I like my school. We are doing just what we are able… Level 6. Questionnaire. English in Use. Level 1. You should reach the top to answer the question.

Без темы

661 презентация

Английский язык

29 тем