Spelling suggestions: "subject:"device managemement"" "subject:"device managementment""
1 |
BYOD - Risks, Solutions and GuidelinesAsparuhov, Lachezar January 2015 (has links)
During the past few years the use of mobile devices became extremely popular not only for personal use but also for working. When personal mobile devices are used as working assets the enterprises should search for some suitable ways to protect their data and network from the unmanaged mobile devices. On the other hand, it is widely believed that employees are more productive when they work from their own devices. This arise three questions: what risks these devices are bringing to the organizations, how to protect the company data and network while allowing the employees to work from their devices, and how adapted the real world is to the Bring Your Own Device trend. To answer these questions and the sub-questions deriving from them, an extensive literature study and a survey approach are used. The results from the study show that even though there are many risks for the companies, brought by the use of personal mobile devices, there exist adequate solutions to mitigate these risks. However, the results from the survey approach show that the companies are not very adapted to this trend yet and there exist a need for better understanding of the problem.
|
2 |
Návrh metodiky pro zavedení systému správy mobilních zařízení v prostředí BYOD / Design of methodology for implementation of mobile device management in a BYOD environmentAndraščík, Jan January 2012 (has links)
This master thesis is focused on topic of using mobile devices in work environment of enterprises, specifically on using mobile devices owned by employees. The thesis is divided into two parts. First part of the thesis describes benefits and risks of using mobile devices in enterprises while allowing usage of mobile devices owned by employees and compares individual mobile platforms in terms of security. Also there is a comparison of individual mobile devices management solutions in terms of security in this part of the thesis. Second part of the thesis is focused on methodology of mobile devices implementation in enterprises and their security. Methodology describes activities required for implementation of mobile devices in enterprises. At the end of this part there are security recommendations which are suitable to apply to mobile devices in enterprises.
|
3 |
Device Discovery in Device Management Systems for Cellular NetworksSpizewski, Bartlomiej January 2007 (has links)
As mobile phones get increasingly complicated the demands for an effective firmware update service increase. A proposed solution is Firmware Over The Air (FOTA) and the Open Mobile Alliance’s Device Management where mobile phones can be updated and managed via the mobile phone network. However, before these operations can be carried out, all FOTA capable mobile phones that should be served must be discovered and registered with a distributor of updates. The information provided must be sufficient to uniquely identify devices, initiate a Device Management session, and determine if a firmware update is needed. This thesis addresses the problems that a solution in automatically collecting this information. Several solutions are presented and their suitability evaluated on the basis of defined and analyzed requirements. The solutions most thoroughly examined are various manual solutions, retrieval of information from core network nodes, and utilizing the Short Message Service (SMS) or Unstructured Supplementary Service Data (USSD). A phone application has been implemented according to the requirements from the Chinese network operator China Mobile Communications Corporation (CMCC). It is a part of a solution in which the information is delivered via a SMS session. The design and development phase of the application is described, accompanied by a brief description of the Symbian OS and the working environment (tools, devices, etc.) needed to implement this solution. This work took place at the Sony Ericsson office in Beijing, China. The application implemented is robust and it is impossible to avoid registration, furthermore the user can not be exposed to acknowledgement messages. It has been made possible on the cost of decreased phone performance (a few kB of memory) since the application runs all the time. Malfunctioning phone or network may hinder registration. / Mobiltelefoner blir ständigt mer komplicerade vilket medför att efterfrågan av en effektiv lösning för uppdateringar av mjukvaran i mobiltelefonerna ökar. Lösningen är Firmware Over The Air (FOTA) och Device Management; mobiltelefonerna uppdateras och sköts via mobiltelefonnätverket. Men innan förfaranden kan exekveras måste alla mobiltelefoner med FOTA som ska omfattas av tjänsten upptäckas och registreras hos den som distribuerar uppdateringarna. Den information som måste levereras måste vara tillräcklig för att kunna identifiera mobiltelefonen, genomföra en Device Management session och avgöra om en uppdatering av mjukvaran är nödvändig. Detta examensarbete behandlar de problem som en lösning i vilken information tillhandahålls möter. Ett flertal lösningar presenteras och deras lämplighet utvärderas på basis av definierade och analyserade krav. De mest ingående undersökta lösningarna är olika manuella lösningar, insamling av information från noderna av kärnnätverket samt utnyttjande av SMS eller USSD. En telefonapplikation har implementeras enligt krav från den kinesiska operatören CMCC. Applikationen är en del av en lösning i vilken informationen levereras via en SMS-session. Applikationens design och utvecklingsfasen är beskriven, samt en översiktlig beskrivning av Symbian operativsystem och utvecklingsmiljön (verktyg, mobiltelefoner, etc.) som behövdes för att implementera lösningen. Detta arbete genomfördes på Sony Ericssons kontor i Beijing, Kina.
|
4 |
Methods and tools for network reconnaissance of IoT devicesGvozdenović, Stefan 18 January 2024 (has links)
The Internet of Things (IoT) impacts nearly all aspects surrounding our daily life, including housing, transportation, healthcare, and manufacturing. IoT devices communicate through a variety of communication protocols, such as Bluetooth Low Energy (BLE), Zigbee, Z-Wave, and LoRa. These protocols serve essential purposes in both commercial industrial and personal domains, encompassing wearables and intelligent buildings.
The organic and decentralized development of IoT protocols under the auspices of different organizations has resulted in a fragmented and heterogeneous IoT ecosystem. In many cases, IoT devices do not have an IP address. Furthermore, some protocols, such as LoRa and Z-Wave, are proprietary in nature and incompatible with standard protocols.
This heterogeneity and fragmentation of the IoT introduce challenges in assessing the security posture of IoT devices. To address this problem, this thesis proposes a novel methodology that transcends specific protocols and supports network and security monitoring of IoT devices at scale. This methodology leverages the capabilities of software-defined radio (SDR) technology to implement IoT protocols in software.
We first investigate the problem of IoT network reconnaissance, that is the discovery and characterization of all the IoT devices in one’s organization. We focus on four popular protocols, namely Zigbee, BLE, Z-Wave, and LoRa. We introduce and analyze new algorithms to improve the performance and speed-up the discovery of IoT devices. These algorithms leverage the ability of SDRs to transmit and receive signals across multiple channels in parallel.
We implement these algorithms in the form of an SDR tool, called IoT-Scan, the first universal IoT scanner middleware. We thoroughly evaluate the delay and energy performance of IoT-Scan. Notably, using multi-channel scanning, we demonstrate a reduction of 70% in the discovery times of Bluetooth and Zigbee devices in the 2.4GHz band and of LoRa and Z-Wave devices in the 900MHz band, versus single-channel scanning.
Second, we investigate a new type of denial-of-service attacks on IoT cards, called Truncate-after-Preamble (TaP) attacks. We employ SDRs to assess the security posture of off-the-shelf Zigbee and Wi-Fi cards to TaP attacks. We show that all the Zigbee devices are vulnerable to TaP attacks, while the Wi-Fi devices are vulnerable to the attack to a varying degree. Remarkably, TaP attacks demand energy consumption five orders of magnitude lower than what is required by a continuous jamming mechanism. We propose several countermeasures to mitigate the attacks.
Third, we devise an innovative approach for the purpose of identifying and creating unique profiles for IoT devices. This approach leverages SDRs to create malformed packets at the physical layer (e.g., truncated or overlapping packets). Experiments demonstrate the ability of this approach to perform fine-grained timing experiments (at the microsecond level), craft multi-packet transmissions/collisions, and derive device-specific reception curves.
In summary, the results of this thesis validate the feasibility of our proposed SDR-based methodology in addressing fundamental security challenges caused by the heterogeneity of the IoT. This methodology is future-proof and can accommodate new protocols and protocol upgrades.
|
5 |
La médiation d'interaction entre les équipements domestiques basés sur l'alignement d'ontologies et la génération du codeEl kaed, Charbel 13 January 2012 (has links) (PDF)
Les protocoles plug-and-play couplés avec les architectures logicielles rendent nos maisons ubiquitaires. Les équipements domestiques qui supportent ces protocoles peuvent être détectés automatiquement, configurés et invoqués pour une tâche donnée. Actuellement, plusieurs protocoles coexistent dans la maison, mais les interactions entre les dispositifs ne peuvent pas être mises en action à moins que les appareils supportent le même protocole. En plus, les applications qui orchestrent ces dispositifs doivent connaître à l'avance les noms des services et dispositifs. Or, chaque protocole définit un profil standard par type d'appareil. Par conséquent, deux appareils ayant le même type et les mêmes fonctions mais qui supportent un protocole différent publient des interfaces qui sont souvent sémantiquement équivalentes mais syntaxiquement différentes. Ceci limite alors les applications à interagir avec un service similaire. Dans ce travail, nous présentons une méthode qui se base sur l'alignement d'ontologie et la génération automatique de mandataire pour parvenir à une adaptation dynamique de services.
|
6 |
Využití mobilních aplikací v podniku / The use of mobile applications in the enterpriseFilipčík, Jan January 2012 (has links)
The main objective of diploma thesis is to describe and analyze the issue of mobile devices and mobile applications, focusing on their usage in the information system of enterprise in terms of deployment rules for security, mobile device management and enterprise operation in implementing mobile policy in to business. The diploma deals with aspects related to the deployment of mobile enterprise policy in terms of choosing the right operator, a suitable mobile platform, mobile device management and applications to ensure optimal information security in company. The aim is compare Czech operators and most frequent mobile operating platforms in terms of business needs and determine the most appropriate mobile operator and mobile operating system suitable for the implementation of mobile policy in to business. Another goal is analyze and describe the method of mobile device management and applications, and to ensure their safety and universally describe the main advantages and disadvantages of deploying mobile policy in to business. The practical part is focused on the public inquiry to identify and analyze the current situation of enterprises in implementing mobile policies in the Czech Republic. Survey results are analyzed, described and summarized in the recommendations and alternative solutions for Czech companies for next years.
|
7 |
Bezpečnosť a správa mobilných zariadení v podnikovom IT / Security and management of mobile devices in the enterprise ITRusiňák, Peter January 2011 (has links)
The diploma thesis deals with the management and security of mobile devices in the enterprise IT. The aim of the work is to familiarize the reader with the issue of enterprise mobility. As enterprise mobility covers a vast area and an important aspect of greatly efficient and secure use of any company's mobile devices is their mobile strategy, the work focuses on the process of creating a mobile security strategy and providing guidelines for its successful implementation. The integration of smart phones into a corporate infrastructure is a complex act. It is necessary to take into account the many safety demands and requirements for interoperability. The issue of mobile enterprise device management and security is very broad. Another part of the work describes various mobile platforms in terms of their suitability for use in the enterprise IT. Operating systems are analyzed in detail from several different points of view. The work provides insight into the market of operating systems and explains the basic security threats to which these systems are exposed and recommends ways of protection against unwanted effects. The final part of the thesis deals with design solutions management and security of mobile devices in the company. On the basis of the requirements set suggests a solution that encompasses deployment of Mobile Device Management device management and security proposes rules for the extension of security policy on mobile device management.
|
8 |
Design and Implementation of the Heterogeneous Computing Device Management ArchitectureSchultek, Brian Robert January 2014 (has links)
No description available.
|
9 |
A Reporting System for a Device Management ApplicationSvensson, Marcus January 2009 (has links)
<p>Device Management Applications are applications which are used to manage software on devices such as mobile phones. OMSI Forum provides such an application which is used to update the software on a phone. Software updates can be done at device management stations placed in stores or other service locations. Whenever a phone's software is updated, information about the update process is stored in a log. These logs can then be analyzed to generate statistics about updates such as the number of successful or failed updates or which faults that are common.</p><p>This master thesis project solves the problem of manually collecting and compiling logs from several stores by making this process automatic. Rather than collecting logs manually, each device management station sends its logs to a centralized server which stores all collected logs in a database. This makes it possible to generate charts and statistics in a simple manner from a web application. This solution makes the analysis more e ective, allowing users to concentrate on analyzing data by removing the work task of collecting logs.</p>
|
10 |
Home Devices Mediation using ontology alignment and code generation techniques / La médiation d'interaction entre les équipements domestiques basés sur l'alignement d'ontologies et la génération du codeEl Kaed, Charbel 13 January 2012 (has links)
Les protocoles plug-and-play couplés avec les architectures logicielles rendent nos maisons ubiquitaires. Les équipements domestiques qui supportent ces protocoles peuvent être détectés automatiquement, configurés et invoqués pour une tâche donnée. Actuellement, plusieurs protocoles coexistent dans la maison, mais les interactions entre les dispositifs ne peuvent pas être mises en action à moins que les appareils supportent le même protocole. En plus, les applications qui orchestrent ces dispositifs doivent connaître à l'avance les noms des services et dispositifs. Or, chaque protocole définit un profil standard par type d'appareil. Par conséquent, deux appareils ayant le même type et les mêmes fonctions mais qui supportent un protocole différent publient des interfaces qui sont souvent sémantiquement équivalentes mais syntaxiquement différentes. Ceci limite alors les applications à interagir avec un service similaire. Dans ce travail, nous présentons une méthode qui se base sur l'alignement d'ontologie et la génération automatique de mandataire pour parvenir à une adaptation dynamique de services. / Ubiquitous systems imagined by Mark Weiser are emerging thanks to the development of embedded systems and plug-n-play protocols like the Universal Plug aNd Play (UPnP), the Intelligent Grouping and Resource Sharing (IGRS), the Device Pro le for Web Services (DPWS) and Apple Bonjour. Such protocols follow the service oriented architecture (SOA) paradigm and allow an automatic device and service discovery in a home network. Once devices are connected to the local network, applications deployed for example on a smart phone, a PC or a home gateway, discover the plug-n-play devices and act as control points. The aim of such applications is to orchestrate the interactions between the devices such as lights, TVs and printers, and their corresponding hosted services to accomplish a specific human daily task like printing a document or dimming a light. Devices supporting a plug-n-play protocol announce their hosted services each in its own description format and data content. Even similar devices supporting the same services represent their capabilities in a different representation format and content. Such heterogeneity along with the protocols layers diversity, prevent applications to use any available equivalent device on the network to accomplish a specific task. For instance, a UPnP printing application cannot interacts with an available DPWS printer on the network to print a document. Designing applications to support multiple protocols is time consuming since developers must implement the interaction with each device pro le and its own data description. Additionally, the deployed application must use multiple protocols stacks to interact with the device. More over, application vendors and telecoms operators need to orchestrate devices through a common application layer, independently from the protocol layers and the device description. To accomplish interoperability between plug-n-play devices and applications, we propose a generic approach which consists in automatically generating proxies based on an ontology alignment. The alignment contains the correspondences between two equivalent devices descriptions. Such correspondences actually represent the proxy behaviour which is used to provide interoperability between an application and a plug and play device. For instance, the generated proxy will announce itself on the network as a UPnP standard printer and will control the DPWS printer. Consequently, the UPnP printing application will interact transparently with the generated proxy which adapts and transfers the invocations to the real DPWS printer. We implemented a prototype as a proof of concept that we evaluated on several real UPnP and DPWS equivalent devices.
|
Page generated in 0.0771 seconds