Information technology and social security is a rapidly growing field that take online security more seriously. Social media offers many types of business advantages to organizations and companies, but also has well known security risks. Every people needs accurate and true information in any fields in this world.
Without the smart phones or device use policy, it is difficult to communicate the organization’s posture on the use of such device. This is a key for first step and usually involves IT and business. Securely manage any devices,application and data. Deploy your any corporate policies on mobile devices. Comply with regular laws. It is projected that iOS and Android will be the leading operating system for smart phone from 2011 on.Once it is known how the smart phones will be used an designing the supporting IT Architecture is the logical next step. Once the IT Architecture design and use policy is defined, then the security policy needs to be documented to determine how the smart phones will be secured to protect organization’s crown jewels.
Understand the smart device security features:
Verify that the password policy is meeting industry standards
Review the encryption requirements and how encryption is deployed
What procedure is in place for reporting of lost devices
Is there a requirement for port control on a devices ?
What is the device are monitored and tracked
What audit and monitoring features are turned on ?
What reports are being generated ?
There are mobile security challenge but also there are solution too
Endpoint management is a required components but not the only solution you will need
There are no one size fits all mobile solution
The mobile landscape continue to evolve – be flexible and embrace change
Plan Implement Manage methodology provides comprehensive approach to organization to secure and manage the smart phones or devices.
10 Steps of Implementation Methodology
Step 1 Plan : Usage Policy
Step 2 Plan : IT Architecture
Step 3 Plan : Security Policy
Step 4 Implement : IT Architecture
Step 5 Implement : Enable E-mail, Contact and calendar
Step 6 Implement : Enable Application Deployment
Step 7 Implement : Enable Network Connection
Step 8 : Regulatory Compliance Governance
Step 9 : Reports and Dashboard
Step 10 : Monitor and Audit
Top 5 Enterprise Mobile Security Concerns
Device data leakage
Primary Concern When Using Mobiles Apps
Privacy = 38%
Security = 26%
Sharing = 14%
Identity = 19%
None = 3%
Top 5 Commonly Used Apps
Social networking =92%
Messaging and chat = 75%
E- commerce = 70%
Mobile Banking =86%
Mobile Wallet = 65%
Average Smartphone Usage
How is the average person using their mobile device on a daily basis
Text Messaging =92% ->10 mins 13 secs
Taking Photos = 62% ->3 mins 30 secs
E-mailing = 86% ->12 mins 6 secs
Gaming = 65% ->16 mins 22 secs
Social networking = 66% ->26 mins 29 secs
Navigation = 50% -> 7 mins 12 secs
Watching Video =54% ->15 mins 9 secs
Research =58%-> 9 mins 22 secs
Phone calls =78% ->18 mins 6 secs
Internet = 98% ->30 mins 49 secs
Note: 96% people use their phone at home, 83% people use their phone at work and 72% people use their phone on the go
Price compare the same product online= 39%
Look up reviews on products or the store itself = 49%
Shop for the item online if they consider the wait time at the store too long =18%
Look up information on the product online right before buying it at the store = 26%
Search online for specific products = 56%
Begin their research about the product once they’re in the store = 36%
Order out of stock products elsewhere= 29%
Mobile phone are a part of our daily life engagement with our new technological world, whether through text messages, calls, e-mails or apps.
75% of smartphone users end up making a purchase where 78% in store, 57% online via a computer, 33% via a phone
72% use a smartphone while in the store
55% use a smartphone to find a retailer
50% use a smartphone to get promotions and coupons
52% use a smartphone to compare prices
48% use a smartphone to read reviews and product info
A cellular network is a radio network made up of a number of radio cells each served by at least one fixed-location transceiver known as a cell site or base station.
Geographic region subdivided in radio cells
Base station provides radio connectivity to the mobile station within cell
Handover to neighboring base station when it’s necessary
Base Station connected by some networking infrastructure
A mobile station in the cellular network service intended for use while in the motion at unspecified locations. They can be either hand-held personal units or installed on vehicles.
A base station in a mobile radio used for radio communication with the mobile stations. This station are locate at the center of a coverage region and consists of radio channels and receiver and transmitter antennas mounted on top of a tower.
How does it work
A telephone cellular or other device that can connect to a cellular network will be referred to a mobile station.
A network consists of both land and radio section. This types of network is commonly referred to as a Public land mobile network (PLMN).
Mobile Phone Networks
There is a number of different digital cellular technologies, including:
Global System for Mobile Communications=GSM
General Packet radio Service=GPRS
Code Division Multiple Access=CDMA
Enhanced Data Rates for GSM Evolution=EDGE
Digital Enhanced Cordless Telecommunication=DECT
Integrated Digital Enhanced Network=iDEN
Some common full form:
UMTS: Universal Mobile Telecommunication System
RAN: Radio Access Network
CN: Core Network
UTRAN: UMTS Terrestrial Radio Access Network
RNC: Radio Network Controller = BSC
node B: Special name of base station in 3GPP Specification= BTS
UE: User Equipment
SRNS: Serving Radio nework Subsystem = SRNS+node BS
DRNS: Drift Radio Network Subsystem = DRNC+ node BS
CRNS: Controlling Radio Network Subsystem= CRNC+node BS
Ambient Intelligence will radically change how people interact with technology and this devices will be able to locate and recognize objects and people, as well as people’s intentions. In Ambient Intelligence, people will surrounded by a multitude of interconnected embedded systems. Intelligence and Embedding is the two main key features of Ambient Intelligence vision.
Steps of ambient intelligence
Needed to provide responsiveness and adaptability
Interpret and recognize context and activity
Activity recognition, activity prediction
What is Intelligence?
The capacity to learn and solve problems, in particular :
The ability to solve novel problems
The ability to act rationally
The ability to act like humans
The Future…. Ambient Intelligence
Intelligent in Home and Building
Climate Control or automatic heating
Automatic communication redirection
Adaptive information services and help
Automatic lighting, kitchen etc
Technology disappear into the environment
Ambient Intelligence builds on three recent key technologies:
Ubiquitous Computing: It means integration of microprocessors into everyday objects like furniture, clothing, white goods, toys, even paint.
Ubiquitous Communication: It’s enables these objects to communicate with each other and the user by means of ad-hoc and wireless networking.
An Intelligent User Interface: it’s enables the inhabitants of the Aml environment to control to control and interact with the environment in a natural and personalized way.
Modern Ambient Intelligence
Before 1990, Classic Ambient Intelligence goals were to surpass human intelligence in Language, reasoning and abstract problem solving.
Some common goals are given below:
Natural language processing
Bio metric, face/fingerprint detection
Robotic and Machine Translation
Real world Modeling
A variety of technologies can be used to enable Ambient Intelligence environments such as :
Bluetooth low energy
Sensors Software agents
Many Ambient Intelligence applications relying upon wireless sensors are at the mercy of the battery life for the sensor.
Challenge is to model multiple residents in an environment.
Challenge for Ambient Intelligence researchers is to design self testing and self repairing Ambient Intelligence software.
Issues related to security and privacy for Ambient Intelligence system.
What is pervasive Computing?
Pervasive means “Existing Everywhere“, pervasive computing embodies the future of network computing enabling wireless communication between individuals and computing devices and between devices itself. This device are tiny and invisible microprocessors embedded in any type of objects like clothes, home, watches etc. It’s also known as Ubiquitous Computing.
Evolution of Pervasive Computing
One computer, Many people
PC : One computer , One person
Pervasive Computing : One person, many computers
Quantified Self technologies have opened up new avenues for big data
This does however race ethical issues for how to deal with personal data protection and privacy, which needs to be explored in greater depth.
Combined with the development of ambient intelligent technologies and Ubiquitous Computing, we now have the potential to design really compelling responsive space that can encourage healthier habits
Rising levels of physical inactivity in urban work space and office environments leads to health problems that are growing cause for concern that should be addressed in the design of these spaces
The principles found in colour theory can be used to enhance responsive ambient intelligence lighting systems, encouraging desirable behavior.