and welcome to the next episode off cybersecurity. Architectural fundamentals
today will cover mobile and data center security.
We would go true. What? It's mobile security. What other threats and what to look out for in designing a system with mobile
and look at data center security. If you have to design a system in Dagestan,
we'll start with mobile security.
So what? It's mobile security. It's concerned with mobile devices, which is mainly smartphones and tablets. But increasingly, it's gonna cover wearable device, especially if you're designing systems for telemedicine.
This space, we shall cover some of the common issues one off. The biggest problem is
there's too many variations off mobile devices
be the OS, the architecture, the chipset or even a vendor's implementation off standards,
although in the enterprise space we do see convergence off some of these like IOS and Android Enterprise.
But there are still many different variants in the end right space, for example.
Almost every manufacturer is putting a spin on the U I, which
could affect the performance. Odd security off some applications.
Now the major concern is the explosion off APS available. Everybody is adopting a mobile first strategy
and even payments. Mobile APS are quickly replacing critic carts, and so on
the other very big challenge.
It's the mixing of personal and business environment.
Very few people would like to carry multiple devices. And with the rise of B Y o. D. In the enterprise, this is increasingly becoming important factor to consider
because this is such a comment and important space.
There are a lot of work done on building mobile tread models,
recalling the earlier, more audio on track modeling.
You can see many off. These treads are the same, but with a focus off the track vector coming in from a mobile device.
Our encourage you to visit the euro L. Sean below to get a clearer picture and study the treads.
improve your mobile security tread modeling,
picking a few off the treads I'll go to in detail.
There is an increase in malware, especially on the android platform,
and it has been shown that many anti virus to not really work. So we have to be very careful off. What is the information process on the mobile?
A spot off a multi factor authentication strategy, the mobile is increasingly being used as the second factor, criminals are increasingly targeting this suspect off the mobile as part off identity theft attack.
Do pay attention to how you secure all. Authenticate the mobile as a second factor. If you are designing it,
the next big threat is, if properly, this could be says simple as intercepting some off the communication from the device off
as seen in some attacks, compromising the accessibility feature of a phone, converting a speech to text and sending some information out via data channel.
You pay attention to what accessibly tea service in the mobile can access your application.
What are the common tools and techniques used in mobile defense?
Firstly, mobile device management is extremely useful.
But if you do have access to the whole device,
using a mobile application management strategy is also a good alternative. At least you can protect the data off the application,
the use of sand boxing or continue realization. It's also an important part off cyber defense on the mobile.
This prevents data leak age in and out often application,
there should be some method to self destructive data. For example,
if the password is guest too many times are you detect a brute force attack. There should be a mechanism to at least delete the data or encrypted.
There is a lot more to mobile security,
and at the end of the session there is a link to some reading material you can download and learn more about this
moving on to the next topic off data set of security.
This covers the physical aspect of security
and also environmental threat defense, and we need to look beyond access control.
It's not just about the access to the data center, but how would you manage the data center toe? Ensure security
to highlight some of the common
threats in a data center?
It could be physical attacks like cable tapping to eavesdrop.
communication out teach
fire and humidities are also big threats to a data center.
Unauthorized access. It's a big problem, and it's usually perform true. Some form off social engineering.
It is important to focus on the physical guards.
Our people have access to make them aware off soldier engineering techniques to get credentials.
Let's talk a little bit about some of the tools and techniques you can utilize to help your data center security for the environmental treads we need to look at. How would you rate locations to build a data center?
Which location to use if you're deciding on a data center?
What at a public utility support in that area?
What type of fire suppression systems who use and the temperature and humidity off that area
For physical access, we need to make sure that multiple access gates the use of men traps multi factor authentication to excess. It could be biometrics and password, fingerprint and the pin number, for example,
and employees the use of a likes off operation where nobody physically access that data center and only manage it from remote jump stations
and not forgetting the physical infrastructure. We need to have secure walls, which cannot be bunch true and cages for systems. That whole sensitive data
and the use of recorded stations with cameras also help deter and also the ability to audit access the systems.
There are other aspects off their centre security that you have to be aware off, for example, firm where patching or our firmware off the utility service that are managing a data centers.
These are not really covered on the cyber security, but they need to be taken care off and to ensure that these tests are done in a secure fashion.
So in this session we have discussed mobile security, the different threats and defenses you have to think about
and also recovered data center security and the things to consider if you are asked to look at the security off systems on premise
as mentioned Aaliya,
here are two good guides to read more about the topic.
There is a list guideline for managing the security of mobile devices in the Enterprise, and there's a nice aka Journal article that talks about that Secure Data Center model. Please take the time to read this
to get deeper understanding off the topic
and the next episode,
I will cover two more areas in advance and the price security areas.
One is I ot security, which is increasingly becoming more popular
and also the manage security service considerations when designing a system.
So if you have the time, please join me in the next session. Thank you