Free Essay

Improving User Authentication on Mobile Devices:

In:

Submitted By Quay88
Words 3240
Pages 13
Improving user authentication on mobile devices:
A Touchscreen Graphical Password
Summary By: Quaniesha Hillian
December 12, 2013

Abstract
We analyze three biometric verification modalities – voice, face and motion – and in addition secret word passage, on a portable gadget, to investigate the relative requests on client time, exertion, blunder and errand interruption. Our research center study furnished perceptions of client movements, techniques, and responses to the validation strategies. Face and voice biometrics conditions were speedier than watchword passage. Talking a Pin was the speediest for biometric specimen entrance, yet fleeting memory review was better in the face check condition. None of the confirmation conditions were recognized exceptionally usable. In conditions that consolidated two biometric entrance routines, the opportunity to get the biometric examples was shorter than if obtained independently yet they were extremely disliked and had high memory assignment blunder rates. These quantitative effects exhibit cognitive and engine contrasts between biometric verification modalities, and brief strategy choices in selecting confirmation. Typing text passwords is challenging when using touchscreens on mobile devices and this is becoming more problematic as mobile usage increases. They designed a new graphical password scheme called Touchscreen Multi-layered Drawing specifically for use with touchscreens. They conducted an exploratory user study of three existing graphical passwords on smart phones and tablets with 31 users. From this, they set the design goals for TMD to include addressing input accuracy issues without having to memorize images, while maintaining an appropriately secure password space. Design features include warp cells which allow TMD users to continuously draw their passwords across multiple layers in order to create more complex passwords than normally possible on a small screen.
Introduction
Versatile units are quickly turning into a key figuring stage, converting how individuals access business and particular data. Access to business information from versatile mechanisms requires secure verification, yet customary secret word plans dependent upon a mix of alphanumeric and images are bulky and disagreeable, heading clients to abstain from gaining entrance to business information on their individual apparatuses by and large. The rich set of data sensors on versatile units, incorporating Polaroid, mouthpieces, touch screens, and GPS, empower advanced multi-media cooperation. Biometric validation strategies utilizing these sensors could offer a characteristic elective to secret word plots, since the sensors are commonplace and as of now utilized for a mixed bag of portable tasks. User thwarted expectation with secret word built verification with respect to versatile mechanisms exhibits that an elevated amount of convenience must be realized for a versatile confirmation strategy to be acknowledged. As biometric distinguished calculations proceed to enhance, the client experience will be an inexorably discriminating element in the prosperity of such techniques.in this paper, we investigate verification strategies on portable gadgets from the clients' perspective. We study three biometric confirmation modalities -voice, face and motion, and syntheses of voice with face and signal. A common 8-character secret key condition is incorporated as a baseline. This study is the first to measure client activity times for verification utilizing distinctive biometrics on a versatile unit. It furnishes knowledge into client execution when utilizing these systems under ideal condition. They also compared the usability of TMD to Draw A Secret on a tablet computer and a smart phone with 90 users. Results show that TMD improves memorability, addresses the input accuracy issues, and is preferred as a replacement for text passwords on mobile devices. These services often ask users to authenticate using text passwords; this requires typing on mobile devices. The question arises: Given the physical constraints of mobile devices, is there an alternative type of authentication that can be easily deployed, improve usability, and maintain security? A potential alternative is to explore the use of graphical passwords. The study analyzed: 1.the time taken to give a verification test (watchword, biometric, or two biometrics); 2.error rates in furnishing a specimen of suitable quality for dissection by confirmation calculations; 3.the effect of the client movements needed for confirmation on execution in a memory review errand; and 4.user responses to the validation routines. To take into consideration examination between verification strategies, the voice and signal conditions utilize the same 8-digit validation token. We uncover that talking was the quickest biometric verification system; however taking a photo upheld better execution in the memory review errand. Speaker confirmation was acknowledged less usable than watchword, face and signal (written work a 8-digit Pin). Mix conditions – concurrently entering two biometric examples – were extremely disagreeable. Disappointment rates were not altogether distinctive around single conditions; yet joining techniques expedited high laps.
Evaluation
The multiplication of cell phones, for example, those dependent upon Apple, Android, Microsoft and Blackberry advances, is quickly changing the way of intuitive processing. Much of this is determined by the incomprehensible number of advanced sensors inserted inside these gadgets, incorporating Gps, touch screens, Polaroids and amplifiers. Thus, people groups' desires around convenience of versatile gadgets are evolving. Straightforward motions (e.g. Android screen lock design), graphical passwords, and biometric confirmation are starting to develop as elective versatile verification systems; however passwords and Pins remain the most well-known techniques utilized today. Corporate utilization of portable units is every now and again directing the utilization of secret word quality strategies, determined from desktop secret key approaches, for mechanism screen open. A commonplace organization secret word approach requires a mix of alphabetic and numeric or image characters. Bio et al measured the opportunity to sort a 8-character, blended case alphanumeric secret word on desktops and portable telephones. On portable gadgets with delicate consoles, section of consistent passwords regularly requires the client to switch between diverse console layouts. They discovered that while members wrote the secret key at 17wpm on a desktop Pc, they just attained a mean of 6wpm on their own telephones. Versatile mechanism clients are intensely conscious of this extra exertion. Their members considered secret key writing on a cellular telephone so cumbersome that they maintained a strategic distance from business information access on their telephones in light of the fact that it might have obliged a corporate-consistent unit open watchword. Indeed in desktop situations, clients frequently select low quality passwords. The observed exertion of entering passwords on versatile apparatuses will energize further secret key disentanglement, for instance setting non-alphabetic characters just at the starting or end of the secret word. Review supports, for example, recording passwords and physically connecting them to gadgets posture extra security hazards for secret key verification in a portable setting. Cooperation with portable units has a tendency to be concise and interference driven. Thus, versatile apparatuses have been storing the security certifications in the mechanism to make it simpler for clients to verify. The effect is that versatile units have viably come to be confirmation tokens. Given that portable apparatuses are regularly obtained, and recognized to be all the more as often as possible lost or stolen, clients' close to home and business assets are at more excellent danger of being lost or compromise. A graphical password is a secret that is entered or displayed in the form of drawings, icons or graphics. First, it provides an evaluation of exemplar schemes from the three main categories of graphical passwords on both tablet computers and smart phones. The initial exploratory study with 31 users was conducted to identify problems encountered when using graphical password schemes on mobile devices. Based on their findings, they propose a new graphical password scheme designed for use with touchscreens; they call this scheme Touchscreen Multilayered Drawing or TMD.
The Study
TMD is a user-drawn graphical password scheme using a grid of large detached cells intended to address the identified issues with input accuracy. They also used multiple layers of grids to encourage password complexity.The point when entering data on portable mechanisms, verification is an intrusion in the client's essential errand stream, and a disturbance to working memory. The more amazing the requests on working memory from the validation handle, the more terrific the danger of overlooking parts of the undertaking close by. Undertakings performed on portable mechanisms, and specifically those performed in the connection of a business movement, include multistep strategies. In light of the short nature of the errands performed on these portable gadgets, in this study we raise the inquiry of what amount of an effect validation challenges have on clients' working memory and consequently on dependable errand fulfillment. Former studies demonstrate that there is an effect, especially just before errand culmination. Part of the present study is to evaluate the review affect because of validation modality, or consolidation of modalities, on a memory review errand without review signals. Working memory is the mental process by which data is briefly archived and controled in the execution of complex cognitive assignments. The limit of working memory is constrained, and fluctuates between people. Models of working memory depicting a multi-part framework incorporating a phonological circle and visuo-spatial scratch cushion were presented in the early 1970s and have decades of observational backing. The 'phonological circle' saves and practices verbal and other sound-related data, while the 'visuo-spatial scratch cushion' controls visual pictures. Data archived in working memory blurs, or "rots" over the long haul. Subvocal (or even vocal) enunciation is a regularly utilized memory procedure, in which a singular over and again subvocally verbalizes and hears a thing with a specific end goal to practice it and uphold its actuation in working memory. Verbal validation systems could meddle with the steps.
Three separate manifestations of client movement for biometric verification, watchword entrance, and two fusions were inspected in six exploratory conditions portrayed underneath. All voice and signal conditions utilized the same validation express, '35793579', giving a noteworthy steady esteem crosswise over both modalities, and a sound test long enough to be satisfactory for a computerized speaker confirmation innovation. A rehashed 4-digit grouping was utilized to build memorability while as of now utilizing a mixed bag of motions and discourse sounds. Secret key entrance was incorporated as a kind of perspective focus. This paper utilizes the terms 'client movement' and 'initiating movement' to allude to the activities taken by the client in furnishing a verification test (biometric or watchword). As validation calculations enhance, these client activities will be an essential determinant of engineering acknowledgement. This study expects a zero false dismissal rate (Frr), the perfect situation for a honest to goodness client. The six test conditions were as takes after: 1. Secret word: Enter an alphanumeric watchword utilizing the inherent on-screen console. In the soul of ordinary corporate watchword arrangements, the simple to recollect 8character secret word securit3 was utilized. 2. Voice: The client must talk the secret key phrase "three five seven nine three five seven nine". 3. Face: The client must take a photo of their face utilizing the front-confronting Polaroid. 4. Motion: The client must compose "35793579" on the screen with their finger. 5. Face+voice: The client must say "three five seven nine three five seven nine" while concurrently covering up their face and taking a photo. 6. Gesture+voice: The client must say "three five seven nine three five seven nine" while concurrently composing the digits "35793579".
Schemes
The overall goal is to design and implement a new graphical password scheme optimized for mobile devices with touchscreens. To have a better understanding of how touchscreens affect graphical passwords, they tested an existing scheme from each of the three different categories. Table 1 summarizes the three test schemes selected and Figure 2 shows their user interfaces. They used two multi-touch devices to assess whether screen size impacts the usability of the schemes. The password schemes were implemented using JavaScript and Scalable Vector Graphics technology and displayed using the built-in Safari browser on both test devices. A 20 bit password space with additional login rules is considered sufficient defense against web attackers for most applications. As show in Table 1, they implemented minimum password length restrictions to ensure that the schemes complied with their recommendations.

Conclusion Table 2: System Usability Scale summary Condition | SUS score | SUS response percentile (approx.) | SUS grade | Fatigue | Password Voice Face Gesture Face+Voice Gesture+Voice | 78% 66% 75% 77% 46% 50% | 80th 40th 76th 78th 8th 13th | CDCCFF | 2.5 3.0 2.2 2.4 3.7 3.8 | Table 1: Biometric performance summary Condition | Failure to Enroll (FTE) | Failure to Acquire (FTA) | User action time per error-free | attempt | % of participants | % of attempts | (median sec) | Password | 0.0 | 4.2 | 7.46 | Voice | 3.4 | 0.5 | 5.15 | Face | 6.9 | 3.1 | 5.55 | Gesture | 0.0 | 0.0 | 8.10 | Face+Voice | 10.3 | 21.3 | 7.63 | Gesture+Voice | 3.4 | 13.6 | 9.91 |
The results showed they descriptively and statistically compared different data to identify usability issues and user preferences when using graphical passwords on mobile devices. They mainly focus on determining how screen size affects performance by comparing differences between devices on creation time, login time, login success rate, and password length for each scheme. For the creation time, login time, and password length, they used mixed-design ANOVAs to look for overall differences and tests to determine where the difference occurred; Fisher's Exact tests were used for the login success rate. DAS passwords can be set up most quickly while the other schemes take significantly longer. Creation Time Figure 7 shows the password creation times. The password creation time is measured from the time when the Create button is pressed until the password has been confirmed and sent to the database for matching. Participants in all groups could create a password within a minute. The average password length of TMD is 18 cells for the tablet and 17 cells for the smart phone. DAS passwords had an average length of 16 blocks for both devices. As opposed to earlier work that analyzed secret key writing time on a portable gadget [7], this study introduced verification inside an assignment that requested transient memory review. Validation "disappointment" because of a low quality example, expedited a steep drop in assignment triumph, from 74% to 47%, affirming the test of the errand and the disruptive nature of verification. Maybe in light of this cost of disappointment, members earnestly utilized memory review techniques to support their undertaking execution. Face verification, the main condition that included no secret key or Pin, underpinned the most noteworthy memory assignment performance. Utilizing the same verification speedy within all different conditions, no critical contrast was discovered between voice and signal modalities. Mix modalities processed altogether poorer execution.

Members used altogether more on the trial screen that introduced the memory undertaking in the Voice condition, contrasted with Gesture or
Face. This may be demonstrative of extra exertion put resources into remembrance of the qualities when in conditions that include discourse. These outcomes underscore the significance of precisely picking validation focuses that slightest meddle with client errand stream. Further work may as well analyze the effect of utilizing various types of spoken/gestural material, for example, spoken phrases, or conceptual motions, and client chose vs. framework chose things. This might differentiate clients' responses to the technique for verification from the substance of the confirmation arouse. In spite of the fact that framework produced prompts might expand the cognitive load on the client. One probability might be to permit clients to consolidate incited discourse with whatever possible discourse of their picking. Members could, for instance, have decided to say something like "526mg 35793579 526mg", guaranteeing liveness while permitting them to verbalize any data in working memory. This may really help with their assignment, instead of thwart it. In connections where the undertaking is known, prompts ought to be composed so as not to meddle with the assignment.
The Design
In the design of TMD, they incorporated the concept of password depth, i.e., the number of layers used in a password. The password depth is 0 at the initial state and incremented when users passed through a warp cell. On both devices, the average password depths are over 1 which indicated that the users were actually using this feature when creating the passwords even though they were not explicitly encouraged to do so in our instructions.

Conclusion
User authentication is a key issue that must be addressed for successful integration of mobile devices into end-users' daily lives. First, it presents an evaluation of three existing graphical password schemes on tablet computers and smart phones. The second contribution is a new password scheme which combines the advantages of the three existing schemes while addressing the usability problems that were uncovered. TMD uses layers to increase the password space so the length of the password is bounded by the device memory or system configuration but not the screen size. User testing of TMD shows that it has superior performance to DAS, the closest existing scheme, on a number of measures.

References
1.Aviv, A. J., Gibson, K., Mossop, E., Blaze, M., and Smith, J. M. Smudge attacks on smartphone touch screens. In USENIX Conference on Offensive Technologies (WOOT) (2010).
2.Bao, P., Pierce, J., Whittaker, S., and Zhai, S. Smart phone use by non-mobile business users. In ACM MobileHCI (2011).
3.Biddle, R., Chiasson, S., and Van Oorschot, P. Graphical passwords: Learning from the first twelve years. ACM Computing Survey 44, 4 (Sept. 2012), 19:1--19:41.
4.Chiasson, S., Forget, A., Biddle, R., and van Oorschot, P. C. Influencing users towards better passwords: Persuasive Cued Click-Points. In British HCI Annual Conference (BCS-HCI) (2008).
5.Dunphy, P., Heiner, A. P., and Asokan, N. A closer look at recognition-based graphical passwords on mobile devices. In ACM Symposium on Usable Privacy and Security (SOUPS) (2010).
6.Dunphy, P., and Yan, J. Do background images improve "Draw a Secret" graphical passwords? In ACM Computer and Communications Security (CCS) (2007).
7.Florencio, D., Herley, C., and Coskun, B. Do strong web passwords accomplish anything? In USENIX Workshop on Hot Topics in Security (HOTSEC) (2007), 1--6.
8.Henze, N., Rukzio, E., and Boll, S. 100,000,000 taps: analysis and improvement of touch performance in the large. In ACM MobileHCI (2011).
9.Hlywa, M., Biddle, R., and Patrick, A. S. Facing the facts about image type in recognition-based graphical passwords. In Annual Computer Security Applications Conference (ACSAC) (2011).
10.Jermyn, I., Mayer, A., Monrose, F., Reiter, M. K., and Rubin, A. The design and analysis of graphical passwords. In USENIX Security Symposium (1999).
11.Lee, S., and Zhai, S. The performance of touch screen soft buttons. In Proceedings of the 27th international conference on Human factors in computing systems, CHI '09, ACM (New York, NY, USA, 2009), 309--318.
12.Passfaces Corporation. The science behind Passfaces. www.passfaces.com/published/The%20Science%20Behind%20Passfaces.pdf. June 2012.
13.Sae-Bae, N., Ahmed, K., Isbister, K., and Memon, N. Biometric-rich gestures: a novel approach to authentication on multi-touch devices. In ACM CHI (2012).
14.Schaub, F., Deyhle, R., and Weber, M. Password entry usability and shoulder surfing susceptibility on different smartphone platforms. In ACM Conference on Mobile and Ubiquitous Multimedia (MUM) (2012).
15.Tao, H., and Adams, C. Pass-Go: A proposal to improve the usability of graphical passwords. International Journal of Network Security 7, 2 (2008).
16.van Oorschot, P. C., and Thorpe, J. On predictive models and user-drawn graphical passwords. ACM Transactions on Information System Security 10, 4 (2008

Similar Documents

Premium Essay

Mobile Bi

...MOBILE BUSINESS INTELIGENCE Table of Contents: Abstract…………………………………………………………………………………………3 Keywords……………………………………………………………………………………...3 Purpose………………………………………………………………………………………….4 Introduction……………………………………………………………………………………..4 Definitions………………………………………………………………………………………6 Thesis Statement………………………………………………………………………………..6 Literature Review……………………………………………………………………………….7 Research Design/Methodology…………………………………………………………………13 Performance of Mobile BI ……………………………………………………………………..15 Benefits of Mobile Business Intelligence……………………………………………………….17 Hypothesis………………………………………………………………………………………18 Summary…………………………………………………………………………………………19 References……………………………………………………………………………………….20 ABSTRACT Mobile Business Intelligence has become hottest, emerging and fast growing trends in today’s life. The whole world is shifting from wired connection to wireless connection with smartphones. In Mobile Business Intelligence we can learn, how organizations are responding more rapidly to market changes and customer needs and how they are improving the customer satisfaction by advancing of time to information for detracting business decisions. This paper is intended to assess the current status and future plans that organizations have to deploy mobile enterprise applications. And I am going to explain the role of Mobile Business Intelligence in solving many issues of various organizations. This paper argues the mobile web services presented to customers do not match the user’s...

Words: 5085 - Pages: 21

Premium Essay

Mobile Bi

...MOBILE BUSINESS INTELLIGENCE ABSTRACT Mobile Business Intelligence has become hottest, emerging and fast growing trends in today’s life. The whole world is shifting from wired connection to wireless connection with smartphones. In Mobile Business Intelligence we can learn, how organizations are responding more rapidly to market changes and customer needs and how they are improving the customer satisfaction by advancing of time to information for detracting business decisions. This paper is intended to assess the current status and future plans that organizations have to deploy mobile enterprise applications. And I am going to explain the role of Mobile Business Intelligence in solving many issues of various organizations. This paper argues the mobile web services presented to customers do not match the user’s expectation due to a lack of interactivity between mobile and web. I am going to analyze the problems facing by customers by using Mobile BI. This paper identifies and analyzes the reports of the study of critical publications, articles; researchers had research about this topic and going to explain the role of Mobile BI in expanding the mobile technology in market. Through the development later I will explain what will be the benefits of organizations by using Mobile BI. Some measures and calculations of various organizations and enterprises will come in existence for gaining knowledge of usage of Mobile BI. Keywords: Mobile Business Intelligence, Organizations,...

Words: 5045 - Pages: 21

Premium Essay

Mobile Bi

...MOBILE BUSINESS INTELLIGENCE ABSTRACT Mobile Business Intelligence has become hottest, emerging and fast growing trends in today’s life. The whole world is shifting from wired connection to wireless connection with smartphones. In Mobile Business Intelligence we can learn, how organizations are responding more rapidly to market changes and customer needs and how they are improving the customer satisfaction by advancing of time to information for detracting business decisions. This paper is intended to assess the current status and future plans that organizations have to deploy mobile enterprise applications. And I am going to explain the role of Mobile Business Intelligence in solving many issues of various organizations. This paper argues the mobile web services presented to customers do not match the user’s expectation due to a lack of interactivity between mobile and web. I am going to analyze the problems facing by customers by using Mobile BI. This paper identifies and analyzes the reports of the study of critical publications, articles; researchers had research about this topic and going to explain the role of Mobile BI in expanding the mobile technology in market. Through the development later I will explain what will be the benefits of organizations by using Mobile BI. Some measures and calculations of various organizations and enterprises will come in existence for gaining knowledge of usage of Mobile BI. Keywords: Mobile Business Intelligence, Organizations,...

Words: 5045 - Pages: 21

Free Essay

What Is Wi-Max

...Alvin William DeMore Introduction An explosion of mobile, wearable and traditional computing devices across the world, and their interconnections, has made computer security an area of paramount importance. Security is required for the computing host, applications running on it and the data being processed or exchanged between different applications or different hosts. In the security context, an application can be thought of as any executing thread or process, a host contains all such processes, and data is any information asset that can be accessed by an interactive user (Price, 2008, p. 170). A comprehensive definition of information security (IS) was given by the Committee on National Security Systems (CNSS): it is the protection of the critical elements of information, including usage, storage and transmission through systems and hardware components (Whitman & Mattord, 2012, p. 8). According to this model, IS has many aspects, such as physical protection of assets, protection against passive or active attacks, access control, risk minimization and assessment of threats and vulnerabilities (p. 11). Computer security is indeed a vast subject, and out of this I picked the specific subject of latest Wi-fi innovations. The reason is that wireless networking is being used more and more to connect various mobile devices and appliances, and I wish to research into this fast changing field. One of the new broadband wireless technologies...

Words: 1770 - Pages: 8

Free Essay

Issc340

...Wireless Security T 01/15/2015 ISSC340 American Public University System Eric Yocam When it comes to dealing with wireless security, it happens to be a problem for everyone. The rise in devices being made during the last decade has put a strain on the amount of data being requested by users. The statistics show that 64 percent of Americans who have internet service providers that impose a broadband cap, have a meter for the cap that is presented. Recent studies have shown that five out of seven people’s meters don’t count your bits correctly. This allows for the chance of assuming what data is being used and being overcharged for what is not actually used. Other statistics show that the laptops that were purchased in 2005 and later were equipped with wireless connectivity. This created an issue with wireless laptops connected to the corporate network, it presents a situation where a hacker could sit in the parking lot and receive information through laptops and other devices, or break in using the wireless card-equipped with this wireless connectivity option. In order to test the strength of most wired and wireless networks the intrusion detection system was implemented. This is a software application that monitors the network activity for malicious activity or privacy violations. The way this works, is that the incidents get reported to a management station. The two different types of intrusion detection system are (NIDS) network based and (HIDS) Host...

Words: 3051 - Pages: 13

Free Essay

The Need for a Strategic Approach to Enterprise Mobility

...cloud services, analytics, and mobility are enabling users and buyers to localize and personalize specific needs to do a variety of tasks, whether for professional or personal purposes. While the combination of these capabilities is radically altering the means by which enterprises need to do business, the move to a mobile-enabled world is creating tremendous opportunities for enterprises to leverage mobility as a means of driving high performance and ensuring competitive advantage. Some of the key factors that are driving enterprises to develop mobile strategies are as follows:  Rapidly expanding use of mobile devices. The rapid adoption of "smart" mobile devices by both consumers and employees, coupled with the increase in bring your own device (BYOD) in the work environment, is placing significant challenges on enterprises to meet a broader set of requirements. In particular, enterprises face tremendous pressure to support a widening array of application functions (e.g., sales, customer care, ERP, marketing), technology platforms (e.g., native OS, Web OS, mobile enterprise application platform [MEAP], cloud), and devices (e.g., smartphones, smart tablets, smart vehicles).  Expanding integration of "mobile" machine-to-machine (M2M) capabilities. The use of M2M capabilities increasingly involves what are essentially mobile devices. Just consider telematics, including vehicle to vehicle (V2V) and fleet management, as well as mobile telehealth applications involving medication and...

Words: 6837 - Pages: 28

Free Essay

Keylogging

...TRANSACTIONS ON MOBILE COMPUTING, VOL. 1, NO. 8, AUGUST 2014 1 Keylogging-resistant Visual Authentication Protocols DaeHun Nyang, Member, IEEE, Aziz Mohaisen, Member, IEEE, Jeonil Kang, Member, IEEE, Abstract—The design of secure authentication protocols is quite challenging, considering that various kinds of root kits reside in PCs (Personal Computers) to observe user’s behavior and to make PCs untrusted devices. Involving human in authentication protocols, while promising, is not easy because of their limited capability of computation and memorization. Therefore, relying on users to enhance security necessarily degrades the usability. On the other hand, relaxing assumptions and rigorous security design to improve the user experience can lead to security breaches that can harm the users’ trust. In this paper, we demonstrate how careful visualization design can enhance not only the security but also the usability of authentication. To that end, we propose two visual authentication protocols: one is a one-time-password protocol, and the other is a password-based authentication protocol. Through rigorous analysis, we verify that our protocols are immune to many of the challenging authentication attacks applicable in the literature. Furthermore, using an extensive case study on a prototype of our protocols, we highlight the potential of our approach for real-world deployment: we were able to achieve a high level of usability while satisfying stringent security requirements. Index...

Words: 12707 - Pages: 51

Premium Essay

Adada

...Business Intelligence Easy White Paper Mobile Business Intelligence and Analytics Mobile Business Intelligence & Analytics Contents Overview ...................................................................................................................................................... 3 What is Mobile Business Intelligence?......................................................................................................... 4 Who is it for? ................................................................................................................................................ 5 What are the external factors driving Mobile Business Intelligence? ........................................................... 6 What are the internal drivers for Mobile Business Intelligence? .................................................................. 7 What benefits are sought? ........................................................................................................................... 8 What organizational factors are required? ................................................................................................... 9 What technology has to underpin a Mobile Business Intelligence initiative? ............................................. 10 Security is paramount ................................................................................................................................ 11 Yellowfin’s Mobile Business Intelligence platform..........

Words: 4299 - Pages: 18

Premium Essay

Main Paper

...Special Publication 800-48 Wireless Network Security Tom Karygiannis Les Owens 802.11, Bluetooth and Handheld Devices NIST Special Publication 800-48 Wireless Network Security 802.11, Bluetooth and Handheld Devices Recommendations of the National Institute of Standards and Technology Tom Karygiannis and Les Owens C O M P U T E R S E C U R I T Y Computer Security Division Information Technology Laboratory National Institute of Standards and Technology Gaithersburg, MD 20899-8930 November 2002 U.S. Department of Commerce Donald L. Evans, Secretary Technology Administration Phillip J. Bond, Under Secretary for Technology National Institute of Standards and Technology Arden L. Bement, Jr., Director W IRELESS NETWORK SECURITY Note to Readers This document is a publication of the National Institute of Standards and Technology (NIST) and is not subject to U.S. copyright. Certain commercial products are described in this document as examples only. Inclusion or exclusion of any product does not imply endorsement or non-endorsement by NIST or any agency of the U.S. Government. Inclusion of a product name does not imply that the product is the best or only product suitable for the specified purpose. Acknowledgments The authors wish to express their sincere thanks to numerous members of government, industry, and academia who have commented on this document. First, the authors wish to express their thanks to the staff at Booz Allen Hamilton...

Words: 52755 - Pages: 212

Free Essay

Hjdfjjsfj

...I. Introduction: Wireless Local Area Network (WLAN) is the linking of two or more computers without using wires. WLAN makes use of the spread spectrum technology based on radio waves to enable communication between two devices in a limited area. Wireless local area networks (WLANs) based on the Wi-Fi (wireless fidelity) standards are one of today's fastest growing technologies in businesses, schools, and homes, for good reasons. They provide mobile access to the Internet and to enterprise networks so users can remain connected away from their desks. These networks can be up and running quickly when there is no available wired Ethernet infrastructure. They are reported to reduce setting up costs by 15%. But, with these benefits come the security concerns. WLANs have very little security. An attacker can listen to you, take control of your laptops/desktops and forge him to be you. He can cancel your orders, make changes into your databases, or empty your credit cards. a. The 802.11 Wireless LAN Standard: In 1997, the IEEE ratified the 802.11 Wireless LAN standards, establishing a global standard for implementing and deploying Wireless LANS. The throughput for 802.11 is 2Mbps, which was well below the IEEE 802.3 Ethernet counterpart Late in 1999, the IEEE ratified the 802.11b standard extension, which raised the throughput to 11 Mbps, making this extension more comparable to the wired equivalent. The 802.11b also supports...

Words: 2926 - Pages: 12

Free Essay

Identifying Potential Malicious Attacks, Threats and Vulnerabilities

...“Unfortunately, there are inherent risks to computer usage — hackers, viruses, worms, spyware, malware, unethical use of stolen passwords and credentials, unauthorized data removal by employees with USB flash drives, or servers crashing and bringing productivity to a halt” ("Cybersecurity," 2013) . The CGF network is a typical office network composed of an external firewall with an external DMZ with public use servers, and internal firewall protecting the corporate network. The internal CGF network includes Microsoft Windows OS workstations and enterprise servers supporting: web, exchange, file, AD and FTP servers, additionally there are 100 workstations consisting of desktops and laptops, VOIP telephones and a wireless access point for corporate users. The overall corporate network architecture follows best industry practices by using a...

Words: 1563 - Pages: 7

Premium Essay

Biometric Security in the Workplace

...number of biometric technologies each with their own share of strengths and weaknesses. The process used in the verification and identification of people using fingerprint, retina-based, iris-based, hand geometry, and facial recognition biometrics are examined in this paper. The advantages and disadvantages of each of these methods are also explored. The future of biometrics is also considered given the current developments in the field.   Organizations are constantly looking for a more secure authentication method for their users to gain access to e-commerce and other security applications. Biometrics continues to gain more and more attention. What is biometrics the right decision for your corporation? If you choose to use biometrics, which is the biometric solution for your corporation, there is no such thing as any one best type of biometrics. Different applications necessitate the use of different biometrics. In order to select the right biometric for your solution as a user you will need to investigate a myriad of vendor products while keeping an eye on future development and technology. Never before have there been more various and more varied options. Vendors have a wide variety of products to select from. Some are new to the market but even these can be considerably better and greatly improve your company security stance. The focus of biometrics is to measure and individuals physical and behavioral characteristics and to recognize and authenticate their identity...

Words: 3807 - Pages: 16

Premium Essay

Mobile Cloud Computing

...CHAPTER 1 : INTRODUCTION Mobile devices allow users to run powerful applications that take advantage of the growing availability of built-in sensing and better data exchange capabilities of mobile devices. As a result, mobile applications seamlessly integrate with real-time data streams and Web 2.0 applications, such as mashups, open collaboration, social networking and mobile commerce. The mobile execution platform is being used for more and more tasks, e.g., for playing games; capturing, editing, annotating and uploading video; handling finances; managing personal health, micro payments, ticket purchase, interacting with ubiquitous computing infrastructures. Even mobile device hardware and mobile networks continue to evolve and to improve, mobile devices will always be resource-poor, less secure, with unstable connectivity, and with less energy since they are powered by battery. Mobile devices can be seen as entry points and interface of cloud online services. Mobile devices (e.g., smartphone, tablet pcs, etc.) are increasingly becoming an essential part of human life as the most effective and convenient communication tools not bounded by time and place. Mobile users accumulate rich experience of various services from mobile applications (e.g., iPhone apps, Google apps, etc.), which run on the devices and/or on remote servers via wireless networks. The rapid progress of mobile computing (MC) becomes a powerful trend in the development of IT technology as well as commerce...

Words: 5635 - Pages: 23

Premium Essay

Evolution of Mobile Banking

...Evolution of Mobile Banking Universal Banking Solution System Integration Consulting Business Process Outsourcing Banks are constantly on the search for solutions which will help reduce their cost of operations and improve customer experience. In this continuous journey, the banking industry has seen several technology trends being adopted and several innovations delivered. Innovations in banking delivery channels dates back to the introduction of ATMs as a self-service delivery channel. The ATMs heralded a new era of banking as the concept of self-service was introduced for the first time. ATMs also marked the entry of anytime banking as customers could now access money from their bank accounts at a time of their convenience. The wave of selfservice continued and the advent of Internet banking introduced the concept of anywhere banking as customers could now access their bank accounts from the comforts of their home or office. The new wave of technology-led delivery channels had caught up with the traditional branch banking and the customer experience from these new delivery channels had set new standards. However, banks noticed a trend customers mainly visiting ATMs for simple balance inquiry of mini statement transactions. This trend began to add to the cost pressures on the ATM channel. Internet banking was facing its own battle as security issues loomed large and customers restricted usage of Internet banking to their home and office computers...

Words: 2416 - Pages: 10

Free Essay

Mobile Computing in the Health Industry

...Mobile Computing in the Health Industry Michael Murillo CIS500 – Strayer University Professor Eve Yeates August 19, 2012 Introduction Over the years, the growth of the information technology industry has pioneered new developments in the field of mobile computing technology. Mobile computing devices has brought about change in several organizations around the world including the banking and financial industries. One of the industries that mobile computing has had the biggest impact is the healthcare industry. Health care providers and clinicians alike are constantly finding new and inventive ways to take advantage of the mobile computing technology to increase revenues, and to improve quality of service in terms of patient care and response. However, the use and implementation of mobile computing technology within the healthcare industry has not come without its source of problems. Laptop computers were bulky and the carts designed to tote these devices around the facility were very difficult to manage. According to the Healthcare Information and Management Systems Society (HIMSS), “those solutions frequently failed in real-world healthcare environments, largely due to inconvenience.” The introduction of mobile computing technology in its infancy stage brought about cellphones and PDA’s which proved to be inconvenient as well. Now we come to the age of tablets and smartphones which has improved mobile computing technology for the healthcare industry immensely. Mobile...

Words: 1082 - Pages: 5