Loading presentation...

Present Remotely

Send the link below via email or IM

Copy

Present to your audience

Start remote presentation

  • Invited audience members will follow you as you navigate and present
  • People invited to a presentation do not need a Prezi account
  • This link expires 10 minutes after you close the presentation
  • A maximum of 30 users can follow your presentation
  • Learn more about this feature in our knowledge base article

Do you really want to delete this prezi?

Neither you, nor the coeditors you shared it with will be able to recover it again.

DeleteCancel

Secure mGov Mobile Applications

No description
by

Faham Usman

on 23 May 2014

Comments (0)

Please log in to add your comment.

Report abuse

Transcript of Secure mGov Mobile Applications

Information Security
Secure mGov Mobile Applications
Awareness Campaign
Agenda
Salim is your Cyber Security Advisor.
Aims at promoting, building and ensuring a safer & secure cyber environment and culture in the UAE.
About aeCERT
One of the initiatives of the UAE Telecommunications Regulatory Authority.
aeCERT is the United Arab Emirates Computer Emergency Response Team.
About aeCERT
What is Mobile Government?
Benefits
Challenges
Security Threats
Resolving Security Threats
Conclusion
Contact
aeCERT
Salim (aeCERT)
@salim_aecert
For more information
www.aecert.ae
info@aecert.ae
Questions
Conclusion
Resolving
Security Threats
mGov Security Threats
Who Benefits from mGov?
Electronic Government (e-Gov)
Securing:
Content
Securing Applications
Securing:
All Wireless Networks
Securing:
Application Development
Side Bar:
Is Your Source Code Safe?
Passive Attacks
Solutions to the Issues:
Inaccessibility
mGov Applications
mGov Applications
Emerging mGovernment
Applications
Mobile Government (mGov)
Securing:
Natural Disaster
Securing:
Server Topology
Securing:
Wireless Sensor Networks
Securing:
Application Review
Solutions to the Issues:
Mobile Mindset
Remove the
Anonymity
Education
Administration
Legal
Solutions to the Issues:
Cost
Anytime
Anywhere
That need access
Citizens (mG2C)
Businesses (mG2B)
Government Employees (mG2E)
Government Agencies (mG2G)

Everyone
Mobile Government

mGov Applications
mGov Applications
mGovernment
Securing:
Terrorism Threats
Securing:
User Privacy
Securing:
Access
Securing:
Cyber Threats
Securing:
Internal Networks
Securing:
Mobile Devices
Mobile Devices
Know the Differences
Securing:
Applications
Securing:
Applications
Inaccessibility
Accessibility

Advantage
Rural Businesses
SMBS
Businesses mGov Particularly Aid

Needs Weather Information to Operate

Market Updates

Picture the Business
Needs to be Warned

Needs Health Information

Picture a Citizen
Summary
Securing:
Cloud Services
Secure Application Development
After Completion
Securing:
Application Summary
Secure Application Checklist
Abuse Cases
Picture the Government
Accessibility
Summary
Securing:
Terrorism Threats
Securing:
Datacenters
Securing:
Datacenters
Securing:
DNS
Securing:
Application Summary
Securing:
Applications
Personal Privacy
Security Threats
Movies
Games
Pranks
Mobile Mindset
Mobile Mindset
Security
Mindset
(Prejudices)
Legal
Data
Overload
Inaccessibility
Cost
mGov Challenges
Use mGovernment Apps Securely
Privacy & Security
Summary
Summary
Securing:
Datacenters
Securing:
Datacenters
Securing:
Mobile Devices
Unproductive
News
Shopping
Mobile Mindset
Cost
Government Agencies

Businesses

Employees

Citizens
mGov Benefits Everyone

Increased Productivity

Added Convenience
More Efficiency
Greater Reach
Access from any device
mGov Solutions are more Effective
than eGov
Compatibility & Legal Issues
Infrastructure Development
mGov : Benefits
Conventional Government (c-Gov)
Securing:
Mobile Devices
Securing:
Mobile Devices
Securing:
Application Review
Securing: Applications
Sources of Security Threats
Solutions to the Issues:
Information Overload
Duplicate Cost Example
Cost
Until mGov can completely replace older methods
Needs to Create a Report
Needs Training Materials in the Field

Picture The Employee
Government Service Access in Remote Areas

Witness Testimonies
Evidence

Ministry of Health Application
Road and Transport Authority Application

mG2C Real World Examples

mGov : Benefits
Dubai Government Services
Integration
Secure Applications are not Secure Without Support for the Life of the Application
Secure
Support for Applications
Agency Privacy Threats
Unauthorized Access
Information Overload
Inter-Agency Informatio Sharing

Inter-Agency Forest Fire Fighting
Dubai Police Application
mG2G Real World Examples
Payment Infrastructures
mGov : Motivation
Secure Topology
Securing:
Application Maintenance
Remote Access for Remote Efficiency
GPS systems to optimize vehicle distributions

Dubai mPay Application

mG2E Real World Examples
Accessible International Sales

Accessible Government Programs

Dubai Economic Department Application

mG2B Real World Examples

The Abu Dhabi IT Architecture
& Standards Framework
Securing:
Application Review
Securing:
Applications
Access from any computer (anywhere service)
24 hour availability (anytime service)
Mobile Phone Hacking Threats
Securing:
Wireless Access Points
Securing: Applications
Overview of Government
01
Services
mGov Impacts
Strategies & Cases of mGov
UAE Government Cloud
Small, Efficient, Transparent Government
Electronic Government (e-Gov)
Terrorism Threats to mGov
mGov : Challenges
Mobile DevicesKnow the Differences
mGov Goals
Comparison of Government Types
mGovernment Success Factors

Content Quality
System Quality
Trust
Support
Mobility
Personalization
e-Government

Mobilized
eGov Benefits that mGov Mimics
Efficiency (very fast, think long queues)
Cost savings (saves money)
Convenience (easy)
Larger Reach (internet and computers have already reached where physical access is difficult)

02
Costs
03
Accessibility
04
Human Resource
Management
Windows, Apple and Google handle security differently
Security APIs / Platform
Why Network Security?
WAP/WSN Security Threats
Active Attacks
Security Threats:Communication
Mobile Device Threats
Cyber Threats
Content Threats
Database Threats
Access Control Threats
Access Control Threat Types
Privacy Threats
Windows, Apple and Google handle security differently

Even the Most Secure Applications Aren’t
Secure Without :
Full transcript