This chapter we will continue our discussion on mobile device security, robust security network (RSN) and network security model. After completing this unit, you should be able to present an overview of security threats and countermeasures for mobile networks, understand the basics of standard for robust security, describe the principal elements for a network security model. | Network Security Lecture 9 Presented by: Dr. Munam Ali Shah Summary of the previous lecture We talked about different types of security attacks for wireless networks such as man-in-the middle attack, spoofing, wardrive etc. We discussed how different solution could be used to secure our wireless networks. Some of the solutions we discussed are limiting the signal of wireless network and use of encryption We also studies about mobile networks and specialized attacks that can breach the security of a wireless network. Outlines of today’s lecture We will continue our discussion on: Mobile Device Security Mobile Device Security Strategy Robust Security Network (RSN) and Network Security Model Objectives You would be able to present an overview of security threats and countermeasures for mobile networks. Understand the basics of standard for robust security Describe the principal elements for a network security model. Mobile Device Security Strategy With the threats | Network Security Lecture 9 Presented by: Dr. Munam Ali Shah Summary of the previous lecture We talked about different types of security attacks for wireless networks such as man-in-the middle attack, spoofing, wardrive etc. We discussed how different solution could be used to secure our wireless networks. Some of the solutions we discussed are limiting the signal of wireless network and use of encryption We also studies about mobile networks and specialized attacks that can breach the security of a wireless network. Outlines of today’s lecture We will continue our discussion on: Mobile Device Security Mobile Device Security Strategy Robust Security Network (RSN) and Network Security Model Objectives You would be able to present an overview of security threats and countermeasures for mobile networks. Understand the basics of standard for robust security Describe the principal elements for a network security model. Mobile Device Security Strategy With the threats for mobile networks discussed in Lecture 8, Let us now see the main elements of a mobile device security strategy. They fall into three categories: device security client/server traffic security barrier security 1. Device Security Different organizations supply mobile devices for employee use and preconfigure those devices to ensure company security policy. Some organizations adopt bring-your-own-device (BYOD) policy that allows personal devices to access company’s resources For BYOD policy, the IT staff should: Inspect each device before allowing networks access Establish configuration guidelines, ., rooted or jail-broken devices should not be permitted The device must not be allowed to store company’s contacts on mobile Device Security (cont.) Following security controls should be configured on the mobile devices Enable auto-lock Enable SSL (secure socket layer) Enable password or PIN protection Avoid using auto-complete features that remember passwords Enable remote wipe Make .