310KM Lab 4 Part 3 Tutorial Group:2 Student Name:Chan Nga Lok Fan Ka Yan Lo Yuen Ki Tsui Sui Wa.
-
Upload
hilda-mathews -
Category
Documents
-
view
220 -
download
0
Transcript of 310KM Lab 4 Part 3 Tutorial Group:2 Student Name:Chan Nga Lok Fan Ka Yan Lo Yuen Ki Tsui Sui Wa.
![Page 1: 310KM Lab 4 Part 3 Tutorial Group:2 Student Name:Chan Nga Lok Fan Ka Yan Lo Yuen Ki Tsui Sui Wa.](https://reader030.fdocuments.in/reader030/viewer/2022033101/56649d215503460f949f644b/html5/thumbnails/1.jpg)
310KM Lab 4 Part 3
Tutorial Group: 2
Student Name: Chan Nga LokFan Ka YanLo Yuen KiTsui Sui Wa
![Page 2: 310KM Lab 4 Part 3 Tutorial Group:2 Student Name:Chan Nga Lok Fan Ka Yan Lo Yuen Ki Tsui Sui Wa.](https://reader030.fdocuments.in/reader030/viewer/2022033101/56649d215503460f949f644b/html5/thumbnails/2.jpg)
iPhone OS
![Page 3: 310KM Lab 4 Part 3 Tutorial Group:2 Student Name:Chan Nga Lok Fan Ka Yan Lo Yuen Ki Tsui Sui Wa.](https://reader030.fdocuments.in/reader030/viewer/2022033101/56649d215503460f949f644b/html5/thumbnails/3.jpg)
Authentication of iPhone OS
Authentication methodsPassword (MSCHAPv2)RSA SecureIDCRYPTOCardx.509 Digital CertificatesShared secret
![Page 4: 310KM Lab 4 Part 3 Tutorial Group:2 Student Name:Chan Nga Lok Fan Ka Yan Lo Yuen Ki Tsui Sui Wa.](https://reader030.fdocuments.in/reader030/viewer/2022033101/56649d215503460f949f644b/html5/thumbnails/4.jpg)
Authentication of iPhone OS
802.1x authentication protocolsEAP-TLSEAP-TTLSEAP-FASTEAP-SIMPEAP v0, v1LEAP
![Page 5: 310KM Lab 4 Part 3 Tutorial Group:2 Student Name:Chan Nga Lok Fan Ka Yan Lo Yuen Ki Tsui Sui Wa.](https://reader030.fdocuments.in/reader030/viewer/2022033101/56649d215503460f949f644b/html5/thumbnails/5.jpg)
Authentication of iPhone OS
For Wireless Network WPA2 Enterprise
![Page 6: 310KM Lab 4 Part 3 Tutorial Group:2 Student Name:Chan Nga Lok Fan Ka Yan Lo Yuen Ki Tsui Sui Wa.](https://reader030.fdocuments.in/reader030/viewer/2022033101/56649d215503460f949f644b/html5/thumbnails/6.jpg)
Encryption of iPhone OS
Hardware encryptionAES 256 bit encoding
Internet encryptionSSL v3TLS v1
Data encryption128-bit AES encryption
![Page 7: 310KM Lab 4 Part 3 Tutorial Group:2 Student Name:Chan Nga Lok Fan Ka Yan Lo Yuen Ki Tsui Sui Wa.](https://reader030.fdocuments.in/reader030/viewer/2022033101/56649d215503460f949f644b/html5/thumbnails/7.jpg)
Strengths of iPhone OS
Objective-C, simple language to learn and use
Huge amount of apps Accessible by everyone (e.g.
VoiceOver) Multi-Touch interface
![Page 8: 310KM Lab 4 Part 3 Tutorial Group:2 Student Name:Chan Nga Lok Fan Ka Yan Lo Yuen Ki Tsui Sui Wa.](https://reader030.fdocuments.in/reader030/viewer/2022033101/56649d215503460f949f644b/html5/thumbnails/8.jpg)
Weaknesses of iPhone OS
NOT support Flash
Safari NOT support Java
Only one carrier
Deleted data vulnerable to hacker
![Page 9: 310KM Lab 4 Part 3 Tutorial Group:2 Student Name:Chan Nga Lok Fan Ka Yan Lo Yuen Ki Tsui Sui Wa.](https://reader030.fdocuments.in/reader030/viewer/2022033101/56649d215503460f949f644b/html5/thumbnails/9.jpg)
BlackBerry OS
![Page 10: 310KM Lab 4 Part 3 Tutorial Group:2 Student Name:Chan Nga Lok Fan Ka Yan Lo Yuen Ki Tsui Sui Wa.](https://reader030.fdocuments.in/reader030/viewer/2022033101/56649d215503460f949f644b/html5/thumbnails/10.jpg)
Authentication of BlackBerry OS
BlackBerry devices are content servers directly
Most of the data are in the BlackBerry server but not device
BlackBerry MDS Connection Service authenticates to content servers on behalf of BlackBerry devices
Data will not leakage easily
![Page 11: 310KM Lab 4 Part 3 Tutorial Group:2 Student Name:Chan Nga Lok Fan Ka Yan Lo Yuen Ki Tsui Sui Wa.](https://reader030.fdocuments.in/reader030/viewer/2022033101/56649d215503460f949f644b/html5/thumbnails/11.jpg)
Encryption of BlackBerry OS
Data and message will encrypt by using Enterprise Server Express before sent
AES / Triple Des data encryption method are used in the transmission process
Decryption will be done after arrive terminal device
![Page 12: 310KM Lab 4 Part 3 Tutorial Group:2 Student Name:Chan Nga Lok Fan Ka Yan Lo Yuen Ki Tsui Sui Wa.](https://reader030.fdocuments.in/reader030/viewer/2022033101/56649d215503460f949f644b/html5/thumbnails/12.jpg)
Strengths of BlackBerry OS
Safety and convenience mail communication
classification of the five programs navigation bar are useful and better then old interface
WebKit browser engine improve the browsing efficiency
with more social networking tools, allowing you to combine email, Facebook and Twitter updates all in one place
Delete SurePress function to simply the usage
![Page 13: 310KM Lab 4 Part 3 Tutorial Group:2 Student Name:Chan Nga Lok Fan Ka Yan Lo Yuen Ki Tsui Sui Wa.](https://reader030.fdocuments.in/reader030/viewer/2022033101/56649d215503460f949f644b/html5/thumbnails/13.jpg)
Weaknesses of BlackBerry OS
Number of Apps are still far behind user needs(BlackBerry: over 8000; Android: 70000; iPhone: 220000)
New OS have no outstanding function compare to other OS
Still do not support Flash
![Page 14: 310KM Lab 4 Part 3 Tutorial Group:2 Student Name:Chan Nga Lok Fan Ka Yan Lo Yuen Ki Tsui Sui Wa.](https://reader030.fdocuments.in/reader030/viewer/2022033101/56649d215503460f949f644b/html5/thumbnails/14.jpg)
Android OS
![Page 15: 310KM Lab 4 Part 3 Tutorial Group:2 Student Name:Chan Nga Lok Fan Ka Yan Lo Yuen Ki Tsui Sui Wa.](https://reader030.fdocuments.in/reader030/viewer/2022033101/56649d215503460f949f644b/html5/thumbnails/15.jpg)
Authentication & Encryption in Android OS
Most Android applications use self-signed certificates still does not support hardware-based encryption Open-source
Weakness Easier for hacker to take data off a Micro SD card Hacker can understand the underlying
architecture and source code Cybercriminals will be rushing to take advantage
![Page 16: 310KM Lab 4 Part 3 Tutorial Group:2 Student Name:Chan Nga Lok Fan Ka Yan Lo Yuen Ki Tsui Sui Wa.](https://reader030.fdocuments.in/reader030/viewer/2022033101/56649d215503460f949f644b/html5/thumbnails/16.jpg)
Authentication & Encryption in Android OS
Strengths Developing enterprise encryption solutions for
data Enforcing standard security policies User administration for predefined Active
Directory and/or LDAP groups Remote application installation
remote lock remote wipe advanced password rules
More secure faster than a close OS
![Page 17: 310KM Lab 4 Part 3 Tutorial Group:2 Student Name:Chan Nga Lok Fan Ka Yan Lo Yuen Ki Tsui Sui Wa.](https://reader030.fdocuments.in/reader030/viewer/2022033101/56649d215503460f949f644b/html5/thumbnails/17.jpg)
Strengths of Android
Lies in the future
![Page 18: 310KM Lab 4 Part 3 Tutorial Group:2 Student Name:Chan Nga Lok Fan Ka Yan Lo Yuen Ki Tsui Sui Wa.](https://reader030.fdocuments.in/reader030/viewer/2022033101/56649d215503460f949f644b/html5/thumbnails/18.jpg)
Strengths of Android OS
Roadmap of Android OS cost of innovation is borne largely by
Versatility
Gathered up a group of some like minded partners
![Page 19: 310KM Lab 4 Part 3 Tutorial Group:2 Student Name:Chan Nga Lok Fan Ka Yan Lo Yuen Ki Tsui Sui Wa.](https://reader030.fdocuments.in/reader030/viewer/2022033101/56649d215503460f949f644b/html5/thumbnails/19.jpg)
Weaknesses of Android OS
Apps don’t look as sexy as the iPhone ones
Inability to download apps to your micro SD card
Competing against one another for shelf-space instead of the iPhone
![Page 20: 310KM Lab 4 Part 3 Tutorial Group:2 Student Name:Chan Nga Lok Fan Ka Yan Lo Yuen Ki Tsui Sui Wa.](https://reader030.fdocuments.in/reader030/viewer/2022033101/56649d215503460f949f644b/html5/thumbnails/20.jpg)
Window Mobile OS
![Page 21: 310KM Lab 4 Part 3 Tutorial Group:2 Student Name:Chan Nga Lok Fan Ka Yan Lo Yuen Ki Tsui Sui Wa.](https://reader030.fdocuments.in/reader030/viewer/2022033101/56649d215503460f949f644b/html5/thumbnails/21.jpg)
Authentication of Window Mobile
Windows Mobile 5.0uses ActiveSync desktop to connect
to the corporate CA to receive the required user certificate and associated key
Windows Mobile 6 implementing Transport Layer
Security (TLS) certificate-based authentication
![Page 22: 310KM Lab 4 Part 3 Tutorial Group:2 Student Name:Chan Nga Lok Fan Ka Yan Lo Yuen Ki Tsui Sui Wa.](https://reader030.fdocuments.in/reader030/viewer/2022033101/56649d215503460f949f644b/html5/thumbnails/22.jpg)
Encryption of Window Mobile
Windows Mobile 6.1 supports AES 128 Encryption for On Device Encryption.There is no way to export the
Encryption KeyThe Encryption Key Changes on Hard
ResetDevice encryption can only be
enabled via a security policy there is no way a user can enable this feature in Windows Mobile.
![Page 23: 310KM Lab 4 Part 3 Tutorial Group:2 Student Name:Chan Nga Lok Fan Ka Yan Lo Yuen Ki Tsui Sui Wa.](https://reader030.fdocuments.in/reader030/viewer/2022033101/56649d215503460f949f644b/html5/thumbnails/23.jpg)
Encryption of Window Mobile
Windows Mobile 6.0 onward supports AES 128 Encryption for files written to the SD card.There is no way to export the
Encryption KeyThe Encryption Key Changes on
Hard Resett
![Page 24: 310KM Lab 4 Part 3 Tutorial Group:2 Student Name:Chan Nga Lok Fan Ka Yan Lo Yuen Ki Tsui Sui Wa.](https://reader030.fdocuments.in/reader030/viewer/2022033101/56649d215503460f949f644b/html5/thumbnails/24.jpg)
Strengths of Window Mobile
Available apps: bringing apps into one central location
User interface: turn into a user customizable dream
interface Computer desktop integration:
integrate with both Exchange Servers and with Outlook environments
![Page 25: 310KM Lab 4 Part 3 Tutorial Group:2 Student Name:Chan Nga Lok Fan Ka Yan Lo Yuen Ki Tsui Sui Wa.](https://reader030.fdocuments.in/reader030/viewer/2022033101/56649d215503460f949f644b/html5/thumbnails/25.jpg)
Weaknesses of Window Mobile
There's no copy and paste functionality.
The OS doesn't support multitasking.
There's no Flash support.
![Page 26: 310KM Lab 4 Part 3 Tutorial Group:2 Student Name:Chan Nga Lok Fan Ka Yan Lo Yuen Ki Tsui Sui Wa.](https://reader030.fdocuments.in/reader030/viewer/2022033101/56649d215503460f949f644b/html5/thumbnails/26.jpg)
The chosen platform
![Page 27: 310KM Lab 4 Part 3 Tutorial Group:2 Student Name:Chan Nga Lok Fan Ka Yan Lo Yuen Ki Tsui Sui Wa.](https://reader030.fdocuments.in/reader030/viewer/2022033101/56649d215503460f949f644b/html5/thumbnails/27.jpg)
Reasons
Safety and convenience mail communication management of logistic need fast and secure
WebKit browser engine improve the browsing efficiency convenience to check the stock
With more social networking tools well communication
![Page 28: 310KM Lab 4 Part 3 Tutorial Group:2 Student Name:Chan Nga Lok Fan Ka Yan Lo Yuen Ki Tsui Sui Wa.](https://reader030.fdocuments.in/reader030/viewer/2022033101/56649d215503460f949f644b/html5/thumbnails/28.jpg)
Recommendations
Invite more programmers to create more applications
Concentrate to develop in an unique function
Develop new technology to support more medias, such as Flash
![Page 29: 310KM Lab 4 Part 3 Tutorial Group:2 Student Name:Chan Nga Lok Fan Ka Yan Lo Yuen Ki Tsui Sui Wa.](https://reader030.fdocuments.in/reader030/viewer/2022033101/56649d215503460f949f644b/html5/thumbnails/29.jpg)
References
http://www.hiphongkong.com/content/smart_phone_wars_iphone_vs_android_vs_blackberry
http://www.telecoms.com/20036/something-for-everyone/
http://apcmag.com/inside_googles_mobile_phone_new_details_of_android.htm
http://www.wired.com/gadgetlab/2010/05/android-google-io-walkup/
http://www.pcworld.com/article/196727/first_look_android_22_froyo_with_flash_player_101.html
http://www.gomonews.com/eastern-promises-uk-finally-gets-android-mobile-device-from-lg/
![Page 30: 310KM Lab 4 Part 3 Tutorial Group:2 Student Name:Chan Nga Lok Fan Ka Yan Lo Yuen Ki Tsui Sui Wa.](https://reader030.fdocuments.in/reader030/viewer/2022033101/56649d215503460f949f644b/html5/thumbnails/30.jpg)
References
http://gigaom.com/mobile/windows-mobile-vs-android-winmo-is-better-than-you-think/
http://www.digitalversus.com/windows-phone-7-impressions-strengths-weaknesses-article-1125.html
http://www.ringhk.com/report2.php?id=3205 http://thecellphonejunkie.com/2010/10/20/att-
blackberry-torch-9800-review/ http://www.informationweek.com/news/mobility/
security/showArticle.jhtml?articleID=218600687 Evaluating the iPhone as a Mobile Platform for
People- Centric Sensing Application( by Emiliano Miluzzo en al)