Professional Documents
Culture Documents
Jagdish Chichria
Zensar Technologies Ltd., Pune
jagdish.chichria@zensar.com
[1]Abstract
With the introduction of the mobile computing, the mobile computing has bought
nearly every aspect of desktop computing in users pocket. Mobile computing
involves mobile communication, mobile hardware, and mobile software.
Common personal use of mobile involves convenient to speak on the go, texting,
direct person availability, while at work, it enables and helps in improvising
employee productivity and availability by embracing mobile computing devices.
Releasing this fact, it also trails the security issues which have become
increasingly important in mobile computing.
[2]Introduction
Mobile computing, also popularly known as Wireless Computing, is coupled with
available infrastructure of distributed systems and thus, making it possible to
see it as expanding distributed system computing. Although, mobile computing
is still currently dealing with some sort of common problems viz. remote
disconnections, limited support bandwidth & interface variability, and most
importantly, heterogeneous network, but there are certain issues which should
be resolved at first before mobile computing are realized in place Security
just because wireless connection is so easy to access and sometimes, open to
threats, the security can be compromised.
Devices in scope include
[3]Problem statement
There is observation of increasing trend in usage of mobile devices, as a part of
communication tool to achieve efficiency for corporates and business houses
and to manage the personal life. With this technological shift, lot more data is
shared over mobile network. The ignorance of protecting this sensitive
information over network can mislead to steal, manipulate and/or destroy
information. The object of Security is to protect valuable or sensitive
methodologies, and policies have to be tested before going live. Tools such as
HeatMapper, Kismet, Airsnort are some of popular AP testing tools.
[8]References
[1] http://www.mobileinfo.com
[2] Security Issues in a Mobile Computing Paradigm by Mavridis I., Pangalos G.
[3] A framework for Mobile Computations by Jan Vitek and Giuseppe Castagna
[4] http://www.webopedia.com/TERM/W/WPA2.html