+ All Categories
Home > Documents > 310KM Lab 4 Part 3 Tutorial Group:2 Student Name:Chan Nga Lok Fan Ka Yan Lo Yuen Ki Tsui Sui Wa.

310KM Lab 4 Part 3 Tutorial Group:2 Student Name:Chan Nga Lok Fan Ka Yan Lo Yuen Ki Tsui Sui Wa.

Date post: 18-Dec-2015
Category:
Upload: hilda-mathews
View: 221 times
Download: 0 times
Share this document with a friend
Popular Tags:
30
310KM Lab 4 Part 3 Tutorial Group: 2 Student Name: Chan Nga Lok Fan Ka Yan Lo Yuen Ki Tsui Sui Wa
Transcript
Page 1: 310KM Lab 4 Part 3 Tutorial Group:2 Student Name:Chan Nga Lok Fan Ka Yan Lo Yuen Ki Tsui Sui Wa.

310KM Lab 4 Part 3

Tutorial Group: 2

Student Name: Chan Nga LokFan Ka YanLo Yuen KiTsui Sui Wa

Page 2: 310KM Lab 4 Part 3 Tutorial Group:2 Student Name:Chan Nga Lok Fan Ka Yan Lo Yuen Ki Tsui Sui Wa.

iPhone OS

Page 3: 310KM Lab 4 Part 3 Tutorial Group:2 Student Name:Chan Nga Lok Fan Ka Yan Lo Yuen Ki Tsui Sui Wa.

Authentication of iPhone OS

Authentication methodsPassword (MSCHAPv2)RSA SecureIDCRYPTOCardx.509 Digital CertificatesShared secret

Page 4: 310KM Lab 4 Part 3 Tutorial Group:2 Student Name:Chan Nga Lok Fan Ka Yan Lo Yuen Ki Tsui Sui Wa.

Authentication of iPhone OS

802.1x authentication protocolsEAP-TLSEAP-TTLSEAP-FASTEAP-SIMPEAP v0, v1LEAP

Page 5: 310KM Lab 4 Part 3 Tutorial Group:2 Student Name:Chan Nga Lok Fan Ka Yan Lo Yuen Ki Tsui Sui Wa.

Authentication of iPhone OS

For Wireless Network WPA2 Enterprise

Page 6: 310KM Lab 4 Part 3 Tutorial Group:2 Student Name:Chan Nga Lok Fan Ka Yan Lo Yuen Ki Tsui Sui Wa.

Encryption of iPhone OS

Hardware encryptionAES 256 bit encoding

Internet encryptionSSL v3TLS v1

Data encryption128-bit AES encryption

Page 7: 310KM Lab 4 Part 3 Tutorial Group:2 Student Name:Chan Nga Lok Fan Ka Yan Lo Yuen Ki Tsui Sui Wa.

Strengths of iPhone OS

Objective-C, simple language to learn and use

Huge amount of apps Accessible by everyone (e.g.

VoiceOver) Multi-Touch interface

Page 8: 310KM Lab 4 Part 3 Tutorial Group:2 Student Name:Chan Nga Lok Fan Ka Yan Lo Yuen Ki Tsui Sui Wa.

Weaknesses of iPhone OS

NOT support Flash

Safari NOT support Java

Only one carrier

Deleted data vulnerable to hacker

Page 9: 310KM Lab 4 Part 3 Tutorial Group:2 Student Name:Chan Nga Lok Fan Ka Yan Lo Yuen Ki Tsui Sui Wa.

BlackBerry OS

Page 10: 310KM Lab 4 Part 3 Tutorial Group:2 Student Name:Chan Nga Lok Fan Ka Yan Lo Yuen Ki Tsui Sui Wa.

Authentication of BlackBerry OS

BlackBerry devices are content servers directly

Most of the data are in the BlackBerry server but not device

BlackBerry MDS Connection Service authenticates to content servers on behalf of BlackBerry devices

Data will not leakage easily

Page 11: 310KM Lab 4 Part 3 Tutorial Group:2 Student Name:Chan Nga Lok Fan Ka Yan Lo Yuen Ki Tsui Sui Wa.

Encryption of BlackBerry OS

Data and message will encrypt by using Enterprise Server Express before sent

AES / Triple Des data encryption method are used in the transmission process

Decryption will be done after arrive terminal device

Page 12: 310KM Lab 4 Part 3 Tutorial Group:2 Student Name:Chan Nga Lok Fan Ka Yan Lo Yuen Ki Tsui Sui Wa.

Strengths of BlackBerry OS

Safety and convenience mail communication

classification of the five programs navigation bar are useful and better then old interface

WebKit browser engine improve the browsing efficiency

with more social networking tools, allowing you to combine email, Facebook and Twitter updates all in one place

Delete SurePress function to simply the usage

Page 13: 310KM Lab 4 Part 3 Tutorial Group:2 Student Name:Chan Nga Lok Fan Ka Yan Lo Yuen Ki Tsui Sui Wa.

Weaknesses of BlackBerry OS

Number of Apps are still far behind user needs(BlackBerry: over 8000; Android: 70000; iPhone: 220000)

New OS have no outstanding function compare to other OS

Still do not support Flash

Page 14: 310KM Lab 4 Part 3 Tutorial Group:2 Student Name:Chan Nga Lok Fan Ka Yan Lo Yuen Ki Tsui Sui Wa.

Android OS

Page 15: 310KM Lab 4 Part 3 Tutorial Group:2 Student Name:Chan Nga Lok Fan Ka Yan Lo Yuen Ki Tsui Sui Wa.

Authentication & Encryption in Android OS

Most Android applications use self-signed certificates still does not support hardware-based encryption Open-source

Weakness Easier for hacker to take data off a Micro SD card Hacker can understand the underlying

architecture and source code Cybercriminals will be rushing to take advantage

Page 16: 310KM Lab 4 Part 3 Tutorial Group:2 Student Name:Chan Nga Lok Fan Ka Yan Lo Yuen Ki Tsui Sui Wa.

Authentication & Encryption in Android OS

Strengths Developing enterprise encryption solutions for

data Enforcing standard security policies User administration for predefined Active

Directory and/or LDAP groups Remote application installation

remote lock remote wipe advanced password rules

More secure faster than a close OS

Page 17: 310KM Lab 4 Part 3 Tutorial Group:2 Student Name:Chan Nga Lok Fan Ka Yan Lo Yuen Ki Tsui Sui Wa.

Strengths of Android

Lies in the future

Page 18: 310KM Lab 4 Part 3 Tutorial Group:2 Student Name:Chan Nga Lok Fan Ka Yan Lo Yuen Ki Tsui Sui Wa.

Strengths of Android OS

Roadmap of Android OS cost of innovation is borne largely by

Google

Versatility

Gathered up a group of some like minded partners

Page 19: 310KM Lab 4 Part 3 Tutorial Group:2 Student Name:Chan Nga Lok Fan Ka Yan Lo Yuen Ki Tsui Sui Wa.

Weaknesses of Android OS

Apps don’t look as sexy as the iPhone ones

Inability to download apps to your micro SD card

Competing against one another for shelf-space instead of the iPhone

Page 20: 310KM Lab 4 Part 3 Tutorial Group:2 Student Name:Chan Nga Lok Fan Ka Yan Lo Yuen Ki Tsui Sui Wa.

Window Mobile OS

Page 21: 310KM Lab 4 Part 3 Tutorial Group:2 Student Name:Chan Nga Lok Fan Ka Yan Lo Yuen Ki Tsui Sui Wa.

Authentication of Window Mobile

Windows Mobile 5.0uses ActiveSync desktop to connect

to the corporate CA to receive the required user certificate and associated key

Windows Mobile 6 implementing Transport Layer

Security (TLS) certificate-based authentication

Page 22: 310KM Lab 4 Part 3 Tutorial Group:2 Student Name:Chan Nga Lok Fan Ka Yan Lo Yuen Ki Tsui Sui Wa.

Encryption of Window Mobile

Windows Mobile 6.1 supports AES 128 Encryption for On Device Encryption.There is no way to export the

Encryption KeyThe Encryption Key Changes on Hard

ResetDevice encryption can only be

enabled via a security policy there is no way a user can enable this feature in Windows Mobile.

Page 23: 310KM Lab 4 Part 3 Tutorial Group:2 Student Name:Chan Nga Lok Fan Ka Yan Lo Yuen Ki Tsui Sui Wa.

Encryption of Window Mobile

Windows Mobile 6.0 onward supports AES 128 Encryption for files written to the SD card.There is no way to export the

Encryption KeyThe Encryption Key Changes on

Hard Resett

Page 24: 310KM Lab 4 Part 3 Tutorial Group:2 Student Name:Chan Nga Lok Fan Ka Yan Lo Yuen Ki Tsui Sui Wa.

Strengths of Window Mobile

Available apps: bringing apps into one central location

User interface: turn into a user customizable dream

interface Computer desktop integration:

integrate with both Exchange Servers and with Outlook environments

Page 25: 310KM Lab 4 Part 3 Tutorial Group:2 Student Name:Chan Nga Lok Fan Ka Yan Lo Yuen Ki Tsui Sui Wa.

Weaknesses of Window Mobile

There's no copy and paste functionality.

The OS doesn't support multitasking.

There's no Flash support.

Page 26: 310KM Lab 4 Part 3 Tutorial Group:2 Student Name:Chan Nga Lok Fan Ka Yan Lo Yuen Ki Tsui Sui Wa.

The chosen platform

Page 27: 310KM Lab 4 Part 3 Tutorial Group:2 Student Name:Chan Nga Lok Fan Ka Yan Lo Yuen Ki Tsui Sui Wa.

Reasons

Safety and convenience mail communication management of logistic need fast and secure

WebKit browser engine improve the browsing efficiency convenience to check the stock

With more social networking tools well communication

Page 28: 310KM Lab 4 Part 3 Tutorial Group:2 Student Name:Chan Nga Lok Fan Ka Yan Lo Yuen Ki Tsui Sui Wa.

Recommendations

Invite more programmers to create more applications

Concentrate to develop in an unique function

Develop new technology to support more medias, such as Flash

Page 29: 310KM Lab 4 Part 3 Tutorial Group:2 Student Name:Chan Nga Lok Fan Ka Yan Lo Yuen Ki Tsui Sui Wa.

References

http://www.hiphongkong.com/content/smart_phone_wars_iphone_vs_android_vs_blackberry

http://www.telecoms.com/20036/something-for-everyone/

http://apcmag.com/inside_googles_mobile_phone_new_details_of_android.htm

http://www.wired.com/gadgetlab/2010/05/android-google-io-walkup/

http://www.pcworld.com/article/196727/first_look_android_22_froyo_with_flash_player_101.html

http://www.gomonews.com/eastern-promises-uk-finally-gets-android-mobile-device-from-lg/

Page 30: 310KM Lab 4 Part 3 Tutorial Group:2 Student Name:Chan Nga Lok Fan Ka Yan Lo Yuen Ki Tsui Sui Wa.

References

http://gigaom.com/mobile/windows-mobile-vs-android-winmo-is-better-than-you-think/

http://www.digitalversus.com/windows-phone-7-impressions-strengths-weaknesses-article-1125.html

http://www.ringhk.com/report2.php?id=3205 http://thecellphonejunkie.com/2010/10/20/att-

blackberry-torch-9800-review/ http://www.informationweek.com/news/mobility/

security/showArticle.jhtml?articleID=218600687 Evaluating the iPhone as a Mobile Platform for

People- Centric Sensing Application( by Emiliano Miluzzo en al)


Recommended