Главная
Study mode:
on
1
Introduction
2
In intermittently connected clients
3
In conference computer centers
4
Passphrases
5
Biometrics
6
ICCs
7
HR Database
8
ICC
9
Hardrick Compromise
10
Data Theft
11
RF Interception
12
Wireless Networking
13
Im on the inside
14
Combining useless information
15
Software tampering
16
Vectoring
17
VPNs
18
PeertoPeer
19
Better Authentication
20
Security Awareness
21
Information Security
Description:
Explore mobile computing security challenges and solutions in this Black Hat conference talk. Delve into topics such as intermittently connected clients, conference computer centers, and various authentication methods including passphrases and biometrics. Learn about potential threats like data theft, RF interception, and wireless networking vulnerabilities. Discover strategies for better authentication, security awareness, and information security. Gain insights into ICC hardrick compromise, software tampering, vectoring, VPNs, and peer-to-peer networks. Understand how combining seemingly useless information can pose risks and explore the importance of security measures in HR databases and mobile environments.

Mobile Computing Security

Black Hat
Add to list
0:00 / 0:00