Loading presentation...

Present Remotely

Send the link below via email or IM


Present to your audience

Start remote presentation

  • Invited audience members will follow you as you navigate and present
  • People invited to a presentation do not need a Prezi account
  • This link expires 10 minutes after you close the presentation
  • A maximum of 30 users can follow your presentation
  • Learn more about this feature in our knowledge base article

Do you really want to delete this prezi?

Neither you, nor the coeditors you shared it with will be able to recover it again.


Mobile Government Security

No description

Faham Usman

on 22 May 2014

Comments (0)

Please log in to add your comment.

Report abuse

Transcript of Mobile Government Security

Information Security
Mobile Government Security
Awareness Campaign
Salim is your Cyber Security Advisor.
Aims at promoting, building and ensuring a safer & secure cyber environment and culture in the UAE.
About aeCERT
One of the initiatives of the UAE Telecommunications Regulatory Authority.
aeCERT is the United Arab Emirates Computer Emergency Response Team.
About aeCERT
MyID and Security
Available Government Apps
Government Services online
Threats to Mobile Security
Use Mobile Services Safely
SSL encryption
Salim (aeCERT)
For more information
The UAE is ahead of most governments in using mobile phone apps for government services.
The UAE uses the best-in-breed security tools and procedures.
No system is 100% secure. There will always be new bugs and new malware.
Understand security issues and avoid infecting your phone by watching what you install.
Understand the threats to mobile phone security.
Understand the privacy rights of individuals and responsibility of government.

Buy parking tickets
Pay government fees and utility bills
Communicate with government, ask questions

“ADSIC's mission is to enable the modernization
of government services through
information technology.”
“Freedom of communication by post, telegraph or other means of communication and the secrecy thereof shall be guaranteed in accordance with the law".----UAE Constitution

End to End Encryption

Location Privacy

Device Trust (Malware, Virus etc.)

Other Applications

Device Labeling

Password Protection

Source: http://www.telecompaper.com/news/uae-mgovernment-initiative-launches-tsm--994218

Acts as a trusted and neutral third-party/broker which establishes business agreements and technical controls between service providers, mobile operators and banks

Not many mobile phone apps have been developed by many Government e.g. US Government

The Federal Law No. (2) of 2006 on

The Prevention of Information Technology Crimes
Article (8)

Anyone who intentionally and unlawfully eavesdrops, or receives or intercepts communication transmitted across the Internet or an information technology device shall be liable to imprisonment and a fine or either.

Application security standards focus on the secure development and deployment of applications.
helps stop

Your identity ID
(in the computer)

Your identity card
(physical device)

Private data on UAE registered users in
MyID database.
Apps use SDK to access private data.

No direct
access from apps
The Abu Dhabi IT A&S Framework
UAE m-Government
TRA mGovernment Training Programme
TRA mGovernment Training Programme
Dubai Smart Government
UAE Government Supports Electronic Transactions
UAE mGovernment Apps
UAE Ministry of Education App
UAE Ministry of Interior App
UAE Ministry of Foreign Affairs App
Dubai Smart Government Apps
Strong Authentication: Emirates ID
UAE Government Cloud
UAE Computing Partners
Dubai Government Services Integration
TSM – Trusted Service Manager
UAE mGovernment Initiative launches TSM
The Abu Dhabi IT Architecture & Standards Framework
SSL Encryption of e-Government Services
Best Practices
Mobile Application Sandboxing
Mobile Applications Security
Secure Application Checklist
Securing Mobile Devices
Mobile Security Tools
Application Security Standards
Data Protection against Loss and Alteration
Hacking is a Crime in the UAE
Use m-Government Apps Securely
Pay attention to
how many people have
downloaded it or liked it.

Mobile Phone Hacking Threats
(listening in) as
data sent over internet
Incident: How to Steal a Thumbprint and Unlock Phone
Mobile Phone Threats to Privacy
End User Reasonability
Privacy Rights of UAE Persons
Abu Dhabi System and Information Centre
What Other Countries are Doing?
Full transcript