Smart University Home Programs > Defeating the New Mobile Security Threats
Mobility and Wireless
1 Day
Training
 
Defeating the New Mobile Security Threats
Presentation
Mobile communication is an exciting channel for providing trustworthy applications and personalised services to over 2 billion end-users, any time, any place, anywhere. Companies and individuals working in this field should be aware of the various methods and tools for developing applications, however to maintain trust and security they also need knowledge of the underlying mobile technologies and their security mechanisms. For example, the underlying infrastructure may constrain security and performance and affect architectural choices such as off-line and on-line functionality. Ensuring that the applications are secure and help resist fraud is often poorly handled by developers and so the range of potential attacks should be appreciated as well as the implementation measures to defeat them.

Training's objectives
The objective is to initially familiarise the audience with the options for developing and testing real-world applications. This will then be expanded to consider the implementation of secure/trustworthy applications in the mobile context. The learning objectives will be illustrated and strengthened by means of example case studies, drawn from extensive industry experience.

Who should attend?
The module is suitable for attendees with some technical background and IT awareness, but will not rely on prior knowledge of mobile application development or security.
The content is aimed at engineers/developers and security experts, however it should also appeal to managers wishing to get an overview of the development activities.
Target sectors: Mobile network operators, third party application/service providers (e.g. banks, transport, content providers, advertisers, ISPs, government etc.), application/service developers, equipment manufacturers, consultancies, engineers, security experts.


Key topics
Mobile, communication, application, service, technology, development, security.


Program

9.30 - 11.00 am
Security Mechanisms in mobile communications
- SIM/USIM
- WEP/WPA
- Security Elements in NFC phones
- Mobile Security APIs

11.15 - 12.45 am
Attacks and countermeasure techniques
- Classes of attack
- Practical examples
- Countermeasures

2.15 pm - 3.45 pm
Secure Mobile Application Development/Test and example(s)
- Tools/methods for mobile phone platforms
- Tools/methods for SIM/SEs
- Handset application (client/server)
- SIM application
- Example application(s)

4.00 - 5.30 pm
Exploring case studies
- Introducing case study requirements
- Team work to design solutions against requirements
- Team presentations of solutions
- Discussion/feedback


 

Module designed and coordinated by Keith Mayes, Director of the ISG-Smart Card Centre, UK
 
WHERE AND WHEN?
 
no dates for the moment
 
RATES
 
From €200 (excl. vat)

  To register
 
PROCEEDINGS
 

Enter the password in the field below and click on the button to validate.

  

Password lost? more
   
Sponsor