Overview
Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore mobile computing security challenges and solutions in this Black Hat conference talk. Delve into topics such as intermittently connected clients, conference computer centers, and various authentication methods including passphrases and biometrics. Learn about potential threats like data theft, RF interception, and wireless networking vulnerabilities. Discover strategies for better authentication, security awareness, and information security. Gain insights into ICC hardrick compromise, software tampering, vectoring, VPNs, and peer-to-peer networks. Understand how combining seemingly useless information can pose risks and explore the importance of security measures in HR databases and mobile environments.
Syllabus
Introduction
In intermittently connected clients
In conference computer centers
Passphrases
Biometrics
ICCs
HR Database
ICC
Hardrick Compromise
Data Theft
RF Interception
Wireless Networking
Im on the inside
Combining useless information
Software tampering
Vectoring
VPNs
PeertoPeer
Better Authentication
Security Awareness
Information Security
Taught by
Black Hat