22-01-2016, 04:19 PM
ABSTRACT:
• Mobile computing is human–computer interaction by which a computer is expected to be transported during normal usage.
• The mobile computing comprises of authentication, Device Management ,app store,security.
• The evil 8: threats to mobile computing
• The solution to overcome the several security issues such as authentication, Device Management ,app store,security.
Mobile Computing Definition
Mobile computing is a very broad term which can be used to define any means of using a computer while outside of the corporate office. This could include working from home or on the road at an airport or hotel. The means to perform mobile computing could include kiosks used to remotely connect to the corporate office, home computers, laptops, tablets or smartphones. Specialized or integrated devices could also be considered as mobile computing devices. For the purposes of this guidance, we’ve limited our scope of mobile devices to smartphones and tablets. The decision was based in part on the current market demand and widespread use of these types of devices. The consumer-centric nature of these devices was also a major factor as these devices are widely used by consumers and are quickly being introduced into corporate environments.
Components of Mobile Computing
Mobile computing is comprised of several different components. While similar to components of other technologies, when dealing with mobile technology, many of these components take on a more critical role in terms of making decisions on how to manage these devices.
.
Authentication – Authentication is another concept that is not new or unique to mobile computing, but how it is handled in regards to mobile can be quite different from previous technologies. The focus with mobile devices is not necessarily to protect just the device, but to also protect the data stored on and accessed by the device. With this in mind, authentication takes on a different role.
This document outlines several scenarios for authentication as well as several methods of authentication that can work for different components of mobile computing.
App Stores – The management and distribution of applications has traditionally been the role of IT. Licensing, centralized management and controlled distribution have helped ensure uniformity across systems. Mobile devices take a different approach to applications, and, like many aspects of mobile computing, put the end user in control. This document covers the different types of app stores and how each can be utilized as part of a complete mobile solution.
Device Management – Mobile devices are designed for consumers, meaning they are designed to be managed by the end user. While this is convenient as a consumer device, it does not lend itself to a sustainable model for enterprises to adopt mobile devices across their entire user population. Mobile device management (MDM) is an important component of any successful enterprise deployment of mobile devices. Central management of mobile devices allows IT and security departments to ensure a level of uniformity and compliance with corporate policies. In many industries, central management also helps companies meet their regulatory commitments when dealing with mobile devices.
This document covers the various aspects of MDM that should be considered by enterprises when looking at a solution.
Security – While security affects all areas of mobile computing, it is still necessary to call it out separately. Mobile devices have quickly become the preferred method of people accessing email and other services when they are not in the office.
The Characteristics of Mobile Computing
There are several characteristics to mobile devices and mobile computing. Many of these are shared with other technologies but have unique significance when it comes to mobile computing.
Portability – As the name “mobile” implies, the devices have to be able to easily move to different locations, while remaining functional.
• Connectivity – The ease of being able to connect to the Internet and receive or transmit data is an essential component to mobile computing. Connectivity through mobile carriers over a 3G- or 4G-type network, as well as WiFi capabilities, are basic requirements for mobile devices.
• Interactivity – This could almost go without saying, but like most other computing technologies, the ability for a mobile device is critical. The interactivity becomes more significant with mobile devices, as they typically have less computing power than other types of technology.
• Individuality – Individuality may sometimes be overlooked, but it is a basic component of the concept of mobile computing. Mobile devices, including smartphones and tablets, are designed for individuals and have become a sort of extension to people in many aspects of their lives. From this perspective, how individuals interact with mobile devices remains unique.
In July 2012, the Cloud Security Alliance and the Mobile Working Group surveyed 210 security practitioners from 26 countries. Respondents were approximately 80% “experts in the field of information security,” which includes security admins, consultants and cloud architects. Twenty percent of respondents held these roles at cloud service providers. The survey asked users to rank mobile top threats in order of both their concern and likelihood of a threat: occurring this year, next year, or not likely to happen. After considering over 40 different top threats to the mobile landscape, the top candidates were dubbed “The Evil 8.”