Unit - 2 Short Notes
Unit - 2 Short Notes
1. What do you understand by Mobile and Wireless Devices? Explain the proliferation (Growth) of Mobile and Wireless
Devices.
Computing tools help us process and share information. "Wireless" means connecting devices without physical wires.
Wireless computing allows devices like phones and laptops to share data without cables, using networks like Wi-Fi. Devices
can send/receive pictures, videos, or documents without wires, and they can communicate directly without relying on a
central network. Wireless computing is common in daily life, especially with phones and gadgets.
Definition of Mobile and Wireless:
Mobile devices are ones you can use while moving around, like laptops and phones, not for fixed things at home. Wireless
means doing things without physical wires, like sending messages between phones. Devices connect without being
physically linked by wires.
Mobile Devices:
Smartphones, tablets, and E-readers are considered mobile. They can make phone calls, take pictures or videos, and
communicate through text messaging, email, and calls. They may synchronize data with remote locations. If a device can
only store data without processing or transmitting it, it's a portable storage device, not a mobile device.
Challenges with Mobile Devices:
Figuring out what happened on mobile devices is challenging due to anti-forensic techniques that hide information.
Encryption and device types affect the difficulty for forensic experts to analyze mobile data.
Computers vs. Mobile Devices:
Computers and laptops, along with mobile devices, are high-priority targets for communication interception. Covert
communication through computers is more convenient due to larger monitors and full-size keyboards.
Wireless Communication:
Wireless communication involves transmitting voice and data via radio waves without physical connections. It's used by
both mobile and fixed-location users and must consider constraints like limited resources and intermittent connectivity.
Wireless Applications:
Applications tailored to device characteristics are classified as mobile or wireless. Examples include wireless local area
networks (WLANs) for desktops and satellite access in remote areas. Some mobile applications may not operate wirelessly
but can benefit from it when available.
Proliferation of Mobile and Wireless Devices:
The proliferation or growth of mobile and wireless devices refers to the rapid expansion and increasing prevalence of these
devices in various aspects of daily life.
More people are using phones and gadgets because they're useful and trendy.
Technology improvements make devices faster and more helpful.
Phones and gadgets are changing how we live, work, and learn.
Challenges include privacy and security concerns.
Despite challenges, devices are connecting us and making life better.
Key Factors Driving Growth:
Better technology, like faster processors and more storage, makes devices attractive.
5G connectivity ensures fast internet for streaming and communication.
Variety of devices cater to different needs.
Smartphones are everywhere and serve various functions.
Many apps for socializing, working, and entertainment make devices useful.
Mobiles are crucial for remote work, enabling productivity anywhere.
Affordable smartphones and data plans make devices accessible.
Integration with IoT and wearables expands uses.
High demand for easy access to information, entertainment, and services.
Education and work rely on mobiles for learning and productivity.
Wireless computing
Wireless computing, also known as wireless communication, lets devices share data without needing cables. It uses signals
like radio waves or infrared to send information. Wireless computing has made communication and connectivity easier,
allowing us to access information and services from anywhere using different devices.
1. Wireless Technologies:
Wi-Fi: Connects devices to the internet without wires.
Bluetooth: Links devices nearby, like phones and headphones.
Cellular Networks (3G, 4G, 5G): Gives internet access on phones over long distances.
NFC (Near Field Communication): Lets devices close together share info, like for payments.
IR (Infrared): Sends data between devices, like TV remotes.
2. Wireless Device Types:
Smartphones and Tablets: Use various wireless tech for internet and communication.
Laptops and Notebooks: Connect wirelessly to the internet and other devices.
Wearables: Like smartwatches and fitness trackers, they communicate with phones and other gadgets.
IoT Devices: Smart home gadgets and sensors talk to each other wirelessly.
Wireless Routers: Create Wi-Fi networks for multiple devices to go online.
3. Wireless Security:
It's important to keep data safe from unauthorized access.
Methods like encryption and authentication help secure wireless communication.
4. Wireless Standards:
Organizations like IEEE set rules for wireless communication, like Wi-Fi and Bluetooth.
5. Wireless Charging:
New tech lets devices charge without cables using charging pads.
6. Mesh Networking:
Devices work together to relay data, creating strong and flexible networks, handy for IoT gadgets and
home automation.
7. Mobile Hotspots:
Portable gadgets provide internet access by making Wi-Fi networks using cellular data.
4. What do you understand by Credit Card frauds in mobile and wireless computing era? Discuss different types of Credit
Card Fraud.
In today's digital world, our electronic devices are crucial for staying connected even when we're not in the office.
However, this reliance also brings challenges, especially in keeping our devices safe from cybercrime.
One major issue is credit card fraud, particularly in mobile banking (M-Banking) and mobile commerce (M-
Commerce). Attackers try to steal credit card information to make unauthorized purchases or take money from
accounts. This is becoming more common due to the widespread use of powerful and affordable mobile devices.
Improved wireless technology is a key factor driving these changes, making it easier for people to make credit card
transactions using their phones. While this can benefit businesses, there's also a growing concern about credit
card fraud.
Companies can help with identity theft, but there's a need for better tools to monitor accounts and prevent risky
transactions. It's important for individuals to stay vigilant and take steps to protect their financial information in
this mobile and wireless computing era.
As shown in Fig., the basic flow is as
follows:
1. The merchant sends the
transaction details to the bank.
2. The bank forwards the request to
the authorized cardholder.
3. The cardholder decides whether
to approve or reject the
transaction (usually with a
password).
4. The bank or merchant receives
notification of the decision.
5. If approved, the credit card
transaction is completed.
Credit card fraud involves actions that harm the security of credit or debit card transactions.
1. Taking Someone Else's Card Info: Using, selling, or buying another person's card details without permission.
2. Using Your Own Card Illegally: Using your expired, revoked, or insufficient funds card knowingly.
3. Selling Stuff with a Stolen Card: Selling goods/services knowing the card used was obtained illegally.
4. Theft in Different Ways:
a. Trash Theft: Going through thrown-away bills to make unauthorized purchases.
b. Cyber Theft: Stealing card numbers through website breaches.
c. Employee Theft: Dishonest employees secretly using or copying card info.
To prevent fraud:
1. Avoid giving account numbers over the phone unless initiated by you.
2. Carry cards separately from your wallet.
3. Monitor transactions closely.
4. Don't sign blank receipts.
5. Keep receipts for comparison.
6. Review bills promptly.
7. Report suspicious charges.
8. Inform card issuer of address/travel changes.
9. Don't write account numbers on envelopes.
10. Stay vigilant in protecting personal information to reduce theft or fraud risks.
1. Data Protection:
Mobile devices often store sensitive information such as personal data, financial details, and login credentials. If
not properly protected, this data can be vulnerable to unauthorized access or theft.
Challenge: Ensuring data encryption, strong authentication measures (like PINs, passwords, or biometrics), and
secure storage to prevent data breaches in case of loss or theft.
2. Malware and Vulnerabilities:
Mobile operating systems and apps can be targeted by malware, viruses, and other malicious software.
Additionally, vulnerabilities in the device's software or firmware can be exploited by attackers.
Challenge: Implementing robust security measures, such as regular software updates, antivirus software, and app
vetting, to detect and mitigate malware threats and vulnerabilities.
3. Unauthorized Access:
Mobile devices may be accessed by unauthorized individuals, either physically (e.g., theft or loss) or remotely
(e.g., hacking or social engineering attacks). Once accessed, sensitive data can be compromised or unauthorized
actions can be taken.
Challenge: Implementing strong authentication methods, remote wipe capabilities, and device tracking to
prevent unauthorized access and protect data in case of device loss or theft.
4. Network Security Risks:
Mobile devices often connect to various networks, including public Wi-Fi hotspots, which may not be secure. This
exposes the device to risks such as man-in-the-middle attacks, Wi-Fi eavesdropping, and rogue network access
points.
Challenge: Educating users about the risks of connecting to unsecured networks, using virtual private networks
(VPNs) for secure connections, and implementing network security protocols to protect against attacks.
5. Phishing and Social Engineering:
Mobile users may be targeted by phishing emails, text messages, or social engineering scams designed to trick
them into revealing sensitive information or downloading malware.
Challenge: Raising awareness among users about common phishing tactics, providing security training, and
implementing email and web filtering solutions to detect and block phishing attempts.
6. App Security:
Mobile apps may pose security risks, including insecure data storage, inadequate encryption, and excessive
permissions requests. Malicious or compromised apps can compromise the security of the device and user data.
Challenge: Implementing app vetting processes, enforcing security best practices for app development, and
regularly monitoring and updating apps to address security vulnerabilities.
6. What is Registry? Explain the registry settings for mobile devices to prevent from cyber crime.
Registry
The registry is a central database in Windows operating systems that stores configuration settings and options for
the operating system and installed applications.
It contains information about hardware devices, user preferences, system settings, and software configurations.
The registry is hierarchical, organized into keys and values, similar to a file system's folders and files.
Registry settings for mobile devices play a crucial role in preventing cybercrime by enhancing security and
establishing trusted configurations.
Registry settings and Group Policy are essential for securing mobile devices and ensuring trusted configurations, especially
with tools like Microsoft Active Sync. Here’s how registry setting can help:
7. What is Authentication Service security? Explain various types of Authentication Protocols used for authentication
service security.
Authentication Service security
Authentication service security refers to the measures and protocols used to ensure the integrity, confidentiality,
and availability of authentication services, which are responsible for verifying the identity of users or entities
attempting to access a system or resource.
These services play a crucial role in safeguarding sensitive information and preventing unauthorized access to
networks, applications, and data.
Authentication service security ensures that users are who they claim to be before granting access to a system or
resource. It involves verifying identities using various methods.
Here are some key points about authentication service security:
Definition of Authentication: Authentication is the process of confirming someone's identity to ensure they are
who they claim to be.
Importance: Authentication is crucial for both servers and clients. Servers need to verify users' identities to grant
access to data, while clients need to ensure they are communicating with the intended server.
Methods of Authentication: Authentication can be done using various methods, including passwords, biometrics
(like fingerprints or facial recognition), tokens, and more.
Types of Authentication Systems:
1. Single-Factor Authentication: Users provide a username and password. Simple but less secure.
2. Two-Factor Authentication: Users provide a second form of identification in addition to a password,
enhancing security.
3. Multi-Factor Authentication: Requires multiple forms of identification, offering even greater security.
Authentication Protocols:
1. Kerberos: Ensures secure user and service authentication over the internet.
2. LDAP (Lightweight Directory Access Protocol): Used for accessing and maintaining distributed directory
information services.
3. OAuth2: Allows third-party applications to access user data without login credentials.
4. SAML (Security Assertion Markup Language): Facilitates Single Sign-On (SSO) and securely shares
authentication and authorization information.
5. RADIUS (Remote Authentication Dial-In User Service): Centrally manages Authentication, Authorization,
and Accounting (AAA) for network access.
6. X.509 Authentication Service: Utilizes digital certificates for secure authentication and transaction
processing.
Components of X.509 Certificate:
Version number
Serial number
Signature Algorithm Identifier
Issuer name
Period of Validity
Subject Name
Subject's public key information
Extension block
Signature
Applications of X.509 Certificate: Used for document signing, web server security (TLS/SSL
certificates), email certificates, code signing, SSH keys, and digital identities.
13. Write a short note on Organizational Security Policies and Measures in Mobile Computing Era
Mobile devices are widely used in organizations today, but they also pose security risks. To address these risks, it's crucial
for organizations to have clear security policies and measures in place. Here are some key points to consider:
1. Importance of Security Policies: Security policies are essential to create a safe environment for organizational
assets and data. They help protect sensitive information stored on mobile devices, such as credit card details and
passwords.
2. Risk of Data Loss: Losing mobile devices like USB drives or laptops can lead to the exposure of valuable customer
data, which can damage the organization's reputation and lead to legal issues. It's important to discourage users
from storing important information on insecure platforms.
3. User Awareness: While enforcing security policies can be challenging, raising user awareness can make them
more effective. Clearly outlining information classification and handling policies is crucial, specifying what types
of data can be stored on mobile devices.
Guidelines for Implementing Mobile Device Security Policies:
1. Assessing Necessity: Evaluate the need for mobile devices based on organizational risks, benefits, and regulatory
requirements.
2. Security Technologies: Incorporate encryption, device passwords, and other security measures appropriate for
the organization and device types.
3. Standardization: Standardize mobile devices and security tools to prevent security gaps due to disparities.
4. Framework Development: Develop specific policies covering data syncing, firewalls, anti-malware software, and
permissible stored information.
5. Centralized Management: Manage mobile devices centrally, maintain an inventory, and regulate device usage.
6. Patching Procedures: Establish procedures for software patching and integrate them with inventory
management.
7. Device Labeling and Registration: Label and register devices for easy recovery in case of loss or theft.
8. Remote Access Disabling: Implement procedures to disable remote access for reported lost or stolen devices to
ensure data security.
9. Data Removal: Remove data from unused devices or before reassigning them to new owners to prevent
unauthorized access.
10. Education and Training: Provide education and awareness training to personnel using mobile devices to enhance
security practices.
Security Policy Importance:
Security policies are crucial documents that outline an organization's approach to maintaining data confidentiality,
integrity, and availability. They provide clear guidance on security goals and principles, helping guide the implementation
of technical controls and setting clear expectations for employees. Additionally, security policies help meet regulatory
requirements, improve organizational efficiency, and align security measures with business objectives.
Elements of an Effective Security Policy:
1. Clear Purpose and Objectives: Clearly define the mission and objectives of the security policy to ensure alignment
with organizational goals.
2. Scope and Applicability: Specify who the policy applies to and under what conditions.
3. Commitment from Management: Ensure senior management buy-in and support for the policy's implementation
and enforcement.
4. Realistic and Enforceable Policies: Design policies that are practical, enforceable, and aligned with organizational
risk appetite.
5. Clear Definitions: Define important terms clearly, especially for non-technical audiences.
6. Tailored to Risk Appetite: Customize policies to reflect the organization's risk appetite and address specific
threats.
7. Up-to-date Information: Regularly review and update policies to ensure they remain effective and relevant to
evolving threats and technologies.
Organizational Policies for Mobile Hand-Held Device Usage:
Creating specific policies for mobile device usage or integrating mobile devices into existing policies is essential for
addressing security concerns. These policies should be regularly updated to address evolving challenges and technologies.
Additionally, organizations should consider factors like user frequency, connections to networks, and compliance with
regulatory requirements when developing mobile device security policies.