Mobile Security

Mobile Web Service Security

ABSTRACT

Web services are a new technology that gained much attention from service providers that provide web-based applications. Web services are so popular, because they are, as XML (eXtensible Markup Language) based services, very flexible, easy to deploy, fast to process and can be used for automated process as well as for user-oriented systems. The discussion on the deployment of web services is always connected to the security of this technology. For mobile web services this problem becomes even more imminent, since mobile clients do not have the security capabilities of a PC-based web service client. The threats to mobile web services and deployment of possible protection technologies will be discussed. The concept of a security gateway will be introduced in the context of a mobile web service security concept. This security gateway shall offer security support for mobile clients.

A Case Study in the Security of Network-enabled Devices

ABSTRACT

It is becoming increasingly common for appliances and other electronic devices to be network-enabled for usability and automation purposes. There have been fears that malicious users can control such devices remotely. Since the installation base of such network-enabled household devices is still relatively small, we examine the types of vulnerabilities that another such appliance has, the network-enabled printer, which is commonly found in the education and business sector. In this paper we analyze the source of the vulnerabilities and present detailed threat scenarios. In addition, we examine four organizations in Australia and Europe. Based on the results of the case study, we draw conclusions on the effects of an information warfare attack using network-enabled devices as the medium.

Mobile Devices and the Military: Useful Tool or Significant Threat?

ABSTRACT

Smart mobile devices are becoming more prevalent in the military, not only for personal use, but as a battlefield tool. This paper discusses the introduction of smart mobile phones into a military environment, and the possible benefits and risks thereof. The paper will also investigate what these devices mean for information warfare. Throughout the paper, specific examples will be provided of military application of mobile devices, and the threats they pose.

Journal of Information Warfare

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

Keywords

A

AI
APT

C

C2
C2S
CDX
CIA
CIP
CPS

D

DNS
DoD
DoS

I

IA
ICS

M

P

PDA

S

SOA

X

XRY

Quill Logo

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

SUBSCRIBE NOW

Get in touch

Registered Agent and Mailing Address

  • Journal of Information Warfare
  •  ArmisteadTEC
  • Dr Leigh Armistead, President
  • 1624 Wakefield Drive
  • Virginia Beach, VA 23455

 757.510.4574

 JIW@ArmisteadTec.com