Mobile Data Security Ppt

Embed Size (px)

Citation preview

MOBILE DATA SECURITYwww.tricksworld.net.tc

INTRODUCTION Device types and access locations continues to increase,

the ability to manage and control data security has become mandatory An organization best protect sensitive information stored on mobile devices (laptops, notebooks, desktops, PDAs,

smart phones, or removable media) These data security is using an employes,affiliates and even customers Data at rest security solutions are based on older encryption technologies

Work in todays sophisticated environments, so as a result, they:1. Complicate existing processes within the IT department 2. Create support challenges for the Helpdesk 3. Expose data during routine IT recovery, repair and maintenance 4. Impede end-user acceptance of security technology 5. Cannot meet a number of emerging key data security requirements

FOUR REQUIREMENTS FOR AN EFFECTIVE MOBILE DATA SOLUTION1. First, make sure your security solution enables you to constantly identify and control new device usage. 2. Next, make sure it can automatically and consistently enforce security policy and data protection. 3. Then, consider the importance of ongoing security administration ensure that your security solution uses a single console to manage all device types. 4. Finally, make sure you can quickly and reliably support your end users when things go wrong. The solution should be able to reset passwords, recover encrypted data,etc.

THE MOBILE DATA SECURITY LIFE CYCLE

Use a single console to manage all device types:Provide a single management console for mobile security administration, control, audit Academic seminar on mobile data security, and reporting with full platform support across mobile and external storage device types to control and automatically enforce and update security policies across all mobile end pointsInherit roles (groups) and users from existing LDAP directories (such as Microsoft Active Directory), eliminating the need to re-enter and separately maintain this information

Provide separate administrative roles (from help desk to security admin) to control administrator privileges. Deliver detailed mobile end point reporting and auditing information

IMPLEMENTING SECURITY PROCEDURES THERE IS FIVE COMMON PROBLMS ENCOUNTEDWITH MOBILE DATA ARE Interception of data transmission

Authentication of users Rogue access to data Lost devices Protecting existing security investments

SOLVING MOBILE DATA SECURITY PROBLEMSProtecting data transmission:1. Confidentiality 2. Integrity 3. Authentication

COMMUNICATION ARCHITECTURE

DIGITAL CERIFICATES1.Identity information, such as the name and the address of the certificate owner2. Public key 3. Expiry date 4. One or more digital signatures, to prevent modification of the certificate

PROTECTING AGAINST UN AUTHORIZED USERS1.Only the chosen may enter

2.Rights and privileges

PROTECTING AGAINST ROGUE ACCESS TO DATA1.Preventing rogue access to data

2. The enemy with in

PROTECTING DATA ON LOST DEVICESPersistent data needs persistent protection

PROTECTING EXISTING SECURITY INVESTMENTThe e-mail of the species

ConclusionSecurity is about minimizing risk, not eliminating it. This means identifying the weakest links in our system and then designing an appropriate solution that takes into account the associated risks and costs to protect the mobile data.

Thank You For Attending