Cybersecurity Chapter-1 3
Cybersecurity Chapter-1 3
Wireless Devices
Learning Objectives
After reading this chapter, you will be able to:
.Understand the security challenges presented Understand the organizational security impli-
by mobile devices and information systems cations with electronic gadgets and learn what
3.1 Introduction
mobile hand-held devices) which
the rising importance of electronic gadgets (i.e.,
-
niniai
Laptop with
wireless
access Mobile Handheld
A
Desktop PC
Wireless/
Smartphone
with wireless
access
A OAD
digital assistant
PDA Personal
Mobile device
A-Wireless device
O -
Handheld device
Mobile computing is "taking a computer and all necessary files and software out into the field." Many types
are as follows:
of mobile computers have been introduced since 1990s.They
moved from one place to
1. Portable computer: It is a general-purpose computer that can be easily
some "setting-up" and an AC
another, but cannot be used while in transit, usually because requires
it
power source.
notebook and has features of a touch-
2. Tablet PC: It lacks a keyboard, is shaped like a slate or a paper
screen with a stylus and handwriting recognition software. Tablets may not be best suited for appli-
for but otherwise capable of carrying out most
cations requiring a physical keyboard typing, are
connect to a wireless or cellular network, and can have software installed on them; this includes networked
PDAs and Smartphones. In this chapter the term "hand-held" is used as an all-embracingterm.
Wireless Devices 87
Cybercrime: Mobile and
Computing Era
3.4 Credit Card Frauds in Mobile and Wireless
mobile commerce
coming up with mobile computing
-
Security control
module
with optional
PIN offset data Acquiring bank
Card issuing bank
Dont's
Store your card number and PINS in your cell.
There is a system available from an Australian company "Alacrity" called closed-loop environment tar
wireless (CLEW). Figure 3.5 shows the flow of events with CLEW which is a registered trademark of Alacri
used here only to demonstrate the flow in this environment.
As shown in Figure 3.5, the basic flow is as follows:
1. Merchant sends a transaction to bank;
2. the bank transmits the request to the authorized cardholder [not short message service (SMS)|
3. the cardholder approves or rejects (password protected);
the bank/merchant is notified;
5. the credit card transaction is completed.
3.4.1 Types and Techniques of Credit Card Frauds
Traditional Techniques
he traditional and the first type of credit card fraud is paper-based fraud-application fraud, wher
nal uses
stolen or fake documents such as utility bills and bank statements
Dersonal
NEW EC security
control module
Merchant Bank
Users Beware!
Box 3.3 Potential Wireless
it is not for all
Although wireless processing is a very good system for many Companies, however,
drawbacks fo wireless processing that many potential wireless
mobile businesses. There are some
venture into wireless processing. They are as follows:
Users should be aware of before they