Tuesday, 26 April 2016

MOBILE AWERNESS AND SECURITY

What is Mobile?

A Mobile Phone is a wireless handheld device that allows users to make calls and send text, among other features. The earliest   generation of mobile phones could only make and receive calls. Today’s mobile phones, however, are packed with many additional
features, such as Web browsers, games, cameras, video players and even navigational systems. A mobile phone may also be known as a cellular phone or simply cell phone.


Uses of Mobile : 


What is Mobile Security? 

   Mobile security is the protection of smart phones, tablets,   laptops    and other portable computing devices, and the networks they connect to, from threats and vulnerabilities associated with wireless computing. Mobile security is also known as wireless security.





 Mobile Security concerns :




1. Device loss :

If an employee leaves a tablet or smart phone in a taxi cab or at a restaurant, for example, sensitive data, such as customer information or corporate intellectual property, can be put at risk.

2. Application Security :

One problem is mobile apps that request too many privileges, which allows them to access various data sources on the device.

 3. Device data leakage :

Nearly all of the chief concerns identified in the mobile security survey, from data loss and theft to malicious applications and mobile malware, are sources of data leakage. While most corporate access privileges on mobile devices remain limited to calendar items and email, new mobile business applications can tap into a variety of sources, if the enterprise accepts the risks.


 4. Malware attacks :

the vast majority of mobile malware to be SMS Trojans, designed to charge device owners premium text messages. Another concern is malicious or Trojan -infected applications that are designed to look like they perform normally, but secretly upload sensitive data to a remote server.


 5. Device theft :

Smartphone theft is a common problem for owners of highly coveted smart phones such as the iPhone or high-end Android devices. The danger of corporate data, such as account credentials and access to email, falling into the hands of a tech-savvy thief.

 

 Different types of Mobile Security :
 
 1. Network access control
 2. Virtual Private Network
 3. Organization Device
 4. Password Protection  







1. Network access control :
 
Network access control involves the use of a protocol or defined set of rules for user access to a network. Users access a network based on a defined set of security policies that are enforced by an organization. The policies use a protocol to define the device access as well as what the end user can do with the mobile device on the network.


 2. Virtual Private Network :

Virtual private networks are networks that provide encryption and security applications that ensure only authorized users can access the network. A virtual private network is accessed through a browser and Internet connection and does not require additional software installation on the devices of the end users. Users access and share data securely through the encryption and security applications that are stored on the virtual private network.


 3. Organization Device  :

The number of workers that use their own handheld devices to connect to the organization network is of growing concern when it comes to security risks. As a result, most organizations are issuing their own devices for the workers to use remotely to access the company network. Although this security method is more costly to implement, the cost of security breaches to sensitive and confidential data outweigh the cost of device implementation.


4. Password Protection  :

More organizations are password protecting their mobile devices for added security. This is especially important for PDAs because they are capable of holding more data than a cellular phone. The problem with password protection is monitoring workers to ensure that they are abiding by the password protection process and not using shortcuts like programs that automatically log you into the device or program.


Different types of Mobile Screen locks :
   
1. Slide to Unlock :

 

This lock screen is not secure by any means, and only asks that the user of the phone grab the circle with a lock inside and slide it outside of a larger circle to unlock the phone. There are no passwords or patterns, it’s simply a way to keep your phone from turning itself on and then accessing all sorts of info in your pocket or purse without your knowing.







2. Face Unlock :

  



With Face Unlock setup, you wake your phone and then set point your front facing camera at your face. If it recognizes you, it will unlock almost immediately. If not, it will ask that you complete your backup PIN or Pattern unlock.








 3. Pattern, PIN and Password Unlock :

  
 Pattern, PIN and Password unlocks are exactly as they sound – you either create a pattern, a numeric PIN, or an alpha-numeric password that needs to be entered in order to unlock your phone. These are likely the most secure of them all. If you don’t know the pattern, PIN, or password, you are not allowed to access the phone.





Safer ways to use Mobile :

Children should only use cell phones next to their heads for emergencies. Children’s skulls are thinner than adults’ and their brains are still developing. Hence, radiation from cell phones penetrates more deeply into their brains and is likely to cause more damage.
 
While talking on your cell phone, try to keep the cell phone away from your body as much as possible. The amplitude of the electromagnetic field (radiation) is one fourth the strength at a distance of two inches and fifty times lower at three feet. Whenever possible, use the speaker-phone mode or a wired headset.
 
Avoid using your cell phone when the signal is weak or when moving at high speed, such as in a car or train, as this automatically increases power to a maximum as the phone repeatedly attempts to connect to a new relay antenna.
 
If you must carry your cell phone on you, make sure that the keypad is positioned toward your body and the back is positioned toward the outside so that the transmitted electromagnetic fields move away from you rather than through you.
 
 
 

Wednesday, 23 September 2015

Different Types of Wireless Mediums for Data Transfer and Communication

Introduction

Wireless communication is among technology’s biggest contributions to mankind. Wireless communication involves the transmission of information over a distance without help of wires, cables or any other forms of electrical conductors. The transmitted distance can be anywhere between a few meters (for example, a television’s remote control) and thousands of kilometers (for example, radio communication)some of the devices used for wireless communication are cordless telephones, mobiles, GPS units, wireless computer parts, and satellite television.

Types of Wireless Communication:-

1. Infrared (IR) wireless communication - Is a wireless transmission media that sends signals using infrared light waves. Infrared transmission requires a line of sight transmission, that is the sender and receiver must be aligned so that nothing obstructs the path of infrared light wave. IR wireless is used for short and medium-range communications and security control.  For IR communication to work, the systems mostly operate in line-of-sight mode which means that there must be no obstruction between the transmitter (source) and receiver (destination).
  


2. Broadcast Radio - Basically an audio broadcasting service, radio broadcasts sound through the air as radio waves. It uses a transmitter to transmit radio waves to a receiving antenna. To broadcast common programming, stations are linked to the radio networks. The broadcast occurs either in syndication or simulcast (simultaneous broadcast) or both. Radio broadcasting can also be done via cable FM, the internet and satellites. A radio broadcast sends data over long distances (across countries) at up to 2 megabits per second (AM/FM Radio).



3. Microwave Radio - Microwave transmission involves the transfer of voice and data through the atmosphere as super high-frequency radio waves called microwaves. Microwave transmission is mainly used to transmit messages between ground-based stations and satellite communications systems. Microwave transmission mainly uses radio waves whose wavelengths are conveniently measured in small units such as centimeters. Microwaves belong to the radio spectrum ranges of roughly 1.0 gigahertz (GHz) to 30 GHz. 

4. Communications Satellites - A communication satellite is an artificial satellite used specifically as a communication transmitter/receiver in orbit. It behaves like a radio relay station above the earth to receive, amplify, and redirect analog and digital signals carried on a specific radio frequency. Data is passed through a satellite using a transponder which is a signal path. Most satellites have between 24 to 72 transponders, with a single transponder capable of transmitting and receiving 155 million bits of information per second. This huge capability makes communication satellites an ideal medium for transmitting and receiving all kinds of content, including audios and videos.
 
Applications of Wireless Communication:-
  • Television Remote Control – Modern televisions use wireless remote control. Currently radio waves are also used.
  • Wi-Fi – This is a wireless local area network that establishes internet connection with the portable computers.
  • Cellular Telephone – Radio waves are used to facilitate the operator to make phone calls from any place on the earth. CDMA, GSM, and 3G are examples of the advancement made by wireless communication in the domain.
  • Computer Interface Devices– Computer hardware manufacturers had realized that having so many wires to communicate between devices would confuse the consumer. So they switched to wireless technology to facilitate their consumers, thus making it easy to mediate between a computer and other peripherals including mouse and keyboard. Earlier, such units required bulky, highly limited transceivers but recent generations of computer peripherals use compact and high-quality wireless devices such as Bluetooth for communication.