Seminar Topics & Project Ideas On Computer Science Electronics Electrical Mechanical Engineering Civil MBA Medicine Nursing Science Physics Mathematics Chemistry ppt pdf doc presentation downloads and Abstract

Full Version: Cell Phone Security
You're currently viewing a stripped down version of our content. View the full version with proper formatting.
Cell Phone Security


[attachment=29072]

Introduction



Cell phones communicate through the air by
radio waves with a base station.
Cell phones depend on areas, or cells, each with
its own base station which can use the same
frequencies as the other cells.
The base station connects to the operator's
backbone network and the wider public
telephone network as well as the networks of
other mobile phone operators.


Functions


Cell phones have all the basic functions of land
line phones.
Cell phones also support other services such as:
Short Message Service (SMS) for text
messaging, packet switching for access to the
Internet and Multimedia Messaging (MMS) for
sending and receiving photos.
There are PDA (personal digital assistant)/phone
hybrids known as smartphones that have
Microsoft Office applications and can access data
from the corporate office.


M-Commerce


M-Commerce stands for Mobile Commerce, or
transactions conducted from a cell phone, or
mobile device.
The SIM (Subscriber Identification Module or
Subscriber Identity Module) card - a.k.a. "smart
card" - holds all of a subscriber's personal
information and phone settings.
The practice of swiping an ATM card or a credit
card at the supermarket is already established.
Putting that same technology into a cell phone's SIM card is the next logical step.


Methods of Security


Passwords - stronger if more permutations and changed frequently.
Physical cards or keys
PINs - Personal Identification Numbers
Biometrics - fingerprint sensors in the wireless market are becoming more widely accepted.