SlideShare ist ein Scribd-Unternehmen logo
1 von 17
Downloaden Sie, um offline zu lesen
danbelaprefum@gmail.com / danrichsoul@yahoo.com
Program
ABOUT UR PHONE
danbelaprefum@gmail.com / danrichsoul@yahoo.com
Program
ABOUT UR PHONE
DO U KNOW ABOUT PHONE
DO U KNOW THE USE
OF ALL APP ON UR
MOBILE PHONES
DO U KNOW ABOUT PHONE
danbelaprefum@gmail.com / danrichsoul@yahoo.com
Program
ABOUT UR PHONE
DO U KNOW ABOUT PHONE
NOTE
Network security consists of the policies and
practices adopted to prevent and monitor
unauthorized access, misuse, modification, or
denial of a computer network and network-
accessible resources. ... Networks can be private,
such as within a company, and others which might
be open to public access. There is no security for
any Phones including “i-phone”
danbelaprefum@gmail.com / danrichsoul@yahoo.com
Program
ABOUT UR PHONE
DO U KNOW ABOUT PHONE
HISTORY OF
MOBILE PHONES
covers mobile communication devices that connect wirelessly to
the public switched telephone network.
While the transmission of speech by radio has a long history, the
first devices that were wireless, mobile, and also capable of
connecting to the standard telephone network are much more
recent. The fit such devices were barely portable compared to
today's compact hand-held devices, and their use was clumsy.
Along with the process of developing a more portable technology,
and a better interconnections system, drastic changes have taken
place in both the networking of wireless communication and the
prevalence of its use, with smartphones.
danbelaprefum@gmail.com / danrichsoul@yahoo.com
Program
ABOUT UR PHONE
DO U KNOW ABOUT PHONE
GLOBAL SYSTEM
FOR MOBILE
The Global System for Mobile Communications (GSM)
is a standard developed by the European
Telecommunications Standards Institute (ETSI) to
describe the protocols for second-generation (2G)
digital cellular networks used by mobile devices such as
mobile phones and tablets. It was first deployed in Finland
in December 1991. By the mid-2010s, it became a global
standard for mobile communications achieving over 90%
market share, and operating in over 193 countries and
territories. (now in the 5G) discuss
danbelaprefum@gmail.com / danrichsoul@yahoo.com
Program
ABOUT UR PHONE
DO U KNOW ABOUT PHONE
GLOBAL SYSTEM FOR
MOBILE
ARCHITECTURE
danbelaprefum@gmail.com / danrichsoul@yahoo.com
Program
ABOUT UR PHONE
DO U KNOW ABOUT PHONE
SUBSCRIBER
IDENTITY MODULE
• Subscriber Identity Module (SIM CARD)
• A nano sim used in mobile phones
• One of the key features of GSM is the Subscriber Identity
Module, commonly known as a SIM card. The SIM is a
detachable smart card containing the user's subscription
information and phone book. This allows the user to retain
his or her information after switching handsets.
Alternatively, the user can change operators while
retaining the handset simply by changing the SIM. Some
operators will block this by allowing the phone to use only
a single SIM, or only a SIM issued by them; this practice is
known as SIM locking.
danbelaprefum@gmail.com / danrichsoul@yahoo.com
Program
ABOUT UR PHONE
DO U KNOW ABOUT PHONE
SUBSCRIBER
IDENTITY MODULE
A SIM card contains its unique serial number (ICCID),
international mobile subscriber identity (IMSI) number,
security authentication and ciphering information, temporary
information related to the local network, a list of the services
the user has access to, and two passwords: a personal
identification number (PIN) for ordinary use, and a personal
unblocking code (PUC) for PIN unlocking.
danbelaprefum@gmail.com / danrichsoul@yahoo.com
Program
ABOUT UR PHONE
DO U KNOW ABOUT PHONE
INTERNATIONAL
MOBILE EQUIPMENT
IDENTITY
IMEI is short for International Mobile Equipment Identity
and is a unique number given to every single mobile phone,
typically found behind the battery. IMEI numbers of
cellular phones connected to a GSM network are stored in
a database (EIR - Equipment Identity Register) containing
all valid mobile phone equipment.
danbelaprefum@gmail.com / danrichsoul@yahoo.com
Program
ABOUT UR PHONE
DO U KNOW ABOUT PHONE
MOBILE PHONE
SERVER
ARCHITECTURE
ATTACKS
UNSECURED WI-FI
SPOOFING
PHISHING
SPYWARE
BROKEN -
CRYPTOGRAPHY
IMPROPER SESSION -
HANDLING
PREVENTION
INSTALL FIREWALL
PASS CODE
SOFTWARE UPDATE
USE OFFICIAL APP -
STORE
danbelaprefum@gmail.com / danrichsoul@yahoo.com
Program
ABOUT UR PHONE
DO U KNOW ABOUT PHONE
WHAT MOBILE
PHONES CAN BE
USE FOR
ANY IDEA
CLOUD COMPUTING
|
LEDGE COMPUTING
|
FOG COMPUTING
danbelaprefum@gmail.com / danrichsoul@yahoo.com
Program
ABOUT UR PHONE
DO U KNOW ABOUT PHONE
MAC
ADDRESS
A media access control address (MAC address) is a unique identifier
assigned to a network interface controller (NIC) for use as a network
address in communications within a network segment. This use is
common in most IEEE 802 networking technologies, including Ethernet,
Wi-Fi, and Bluetooth. Within the Open Systems Interconnection (OSI)
network model, MAC addresses are used in the medium access control
protocol sub-layer of the data link layer. As typically represented, MAC
addresses are recognizable as six groups of two hexadecimal digits,
separated by hyphens, colons, or without a separator.
MAC addresses are primarily assigned by device manufacturers, and
are therefore often referred to as the burned-in address,
danbelaprefum@gmail.com / danrichsoul@yahoo.com
Program
ABOUT UR PHONE
DO U KNOW ABOUT PHONE
MAC
ADDRESS
danbelaprefum@gmail.com / danrichsoul@yahoo.com
Program
ABOUT UR PHONE
DO U KNOW ABOUT PHONE
IP
ADDRESS
An Internet Protocol address (IP address) is a numerical label
assigned to each device connected to a computer network that
uses the Internet Protocol for communication.An IP address
serves two main functions: host or network interface
identification and location addressing.
Internet Protocol version 4 (IPv4) defines an IP address as a 32-bit
number. However, because of the growth of the Internet and the
depletion of available IPv4 addresses, a new version of IP (IPv6),
using 128 bits for the IP address, was standardized in 1998. IPv6
deployment has been ongoing since the mid-2000s.
danbelaprefum@gmail.com / danrichsoul@yahoo.com
Program
ABOUT UR PHONE
DO U KNOW ABOUT PHONE
IP
ADDRESS
danbelaprefum@gmail.com / danrichsoul@yahoo.com
Program
ABOUT UR PHONE
DO U KNOW ABOUT PHONE
QUESTION
TIME
THANK YOU

Weitere ähnliche Inhalte

Was ist angesagt?

Sectechbiz Is A Uae Based Company
Sectechbiz Is A Uae Based CompanySectechbiz Is A Uae Based Company
Sectechbiz Is A Uae Based CompanySectechbiz
 
1G-5G technology
1G-5G technology1G-5G technology
1G-5G technologyusha2016
 
4 g & 5g...!!!
4 g & 5g...!!!4 g & 5g...!!!
4 g & 5g...!!!AK Kashyap
 
3g4g5g 130725030734-phpapp01
3g4g5g 130725030734-phpapp013g4g5g 130725030734-phpapp01
3g4g5g 130725030734-phpapp01Satnam Wadwal
 
Abdullah Al Mamun 062507056
Abdullah Al Mamun 062507056Abdullah Al Mamun 062507056
Abdullah Al Mamun 062507056mashiur
 
Appendix4 femto home_access_solution_whitepaper
Appendix4 femto home_access_solution_whitepaperAppendix4 femto home_access_solution_whitepaper
Appendix4 femto home_access_solution_whitepaperMinh Tuấn
 
ISSC456_Final_J_Intindolo
ISSC456_Final_J_IntindoloISSC456_Final_J_Intindolo
ISSC456_Final_J_IntindoloJohn Intindolo
 
2009: Voice Security And Privacy (Security Summit - Milan)
2009: Voice Security And Privacy (Security Summit - Milan)2009: Voice Security And Privacy (Security Summit - Milan)
2009: Voice Security And Privacy (Security Summit - Milan)Fabio Pietrosanti
 
FPGA Based Wireless Jamming Networks
FPGA Based Wireless Jamming NetworksFPGA Based Wireless Jamming Networks
FPGA Based Wireless Jamming NetworksIJMER
 
IRJET- Mobile Communication Security using Encryption and Decryption
IRJET- Mobile Communication Security using Encryption and DecryptionIRJET- Mobile Communication Security using Encryption and Decryption
IRJET- Mobile Communication Security using Encryption and DecryptionIRJET Journal
 
Mobile Cloning Technology Report
Mobile Cloning Technology ReportMobile Cloning Technology Report
Mobile Cloning Technology Reportmaham4569
 

Was ist angesagt? (20)

WIRELESS SYSTEMS 4G
WIRELESS SYSTEMS 4GWIRELESS SYSTEMS 4G
WIRELESS SYSTEMS 4G
 
Generation Of Network
Generation Of NetworkGeneration Of Network
Generation Of Network
 
1st lec generations
1st lec   generations1st lec   generations
1st lec generations
 
Sectechbiz Is A Uae Based Company
Sectechbiz Is A Uae Based CompanySectechbiz Is A Uae Based Company
Sectechbiz Is A Uae Based Company
 
ppt on 4 G
ppt on 4 G ppt on 4 G
ppt on 4 G
 
Explaining wireless tech
Explaining wireless techExplaining wireless tech
Explaining wireless tech
 
1G-5G technology
1G-5G technology1G-5G technology
1G-5G technology
 
4 g & 5g...!!!
4 g & 5g...!!!4 g & 5g...!!!
4 g & 5g...!!!
 
1g-4g
1g-4g1g-4g
1g-4g
 
3g4g5g 130725030734-phpapp01
3g4g5g 130725030734-phpapp013g4g5g 130725030734-phpapp01
3g4g5g 130725030734-phpapp01
 
Abdullah Al Mamun 062507056
Abdullah Al Mamun 062507056Abdullah Al Mamun 062507056
Abdullah Al Mamun 062507056
 
5G
5G 5G
5G
 
Appendix4 femto home_access_solution_whitepaper
Appendix4 femto home_access_solution_whitepaperAppendix4 femto home_access_solution_whitepaper
Appendix4 femto home_access_solution_whitepaper
 
Mobile communication
Mobile communicationMobile communication
Mobile communication
 
ISSC456_Final_J_Intindolo
ISSC456_Final_J_IntindoloISSC456_Final_J_Intindolo
ISSC456_Final_J_Intindolo
 
2009: Voice Security And Privacy (Security Summit - Milan)
2009: Voice Security And Privacy (Security Summit - Milan)2009: Voice Security And Privacy (Security Summit - Milan)
2009: Voice Security And Privacy (Security Summit - Milan)
 
FPGA Based Wireless Jamming Networks
FPGA Based Wireless Jamming NetworksFPGA Based Wireless Jamming Networks
FPGA Based Wireless Jamming Networks
 
IRJET- Mobile Communication Security using Encryption and Decryption
IRJET- Mobile Communication Security using Encryption and DecryptionIRJET- Mobile Communication Security using Encryption and Decryption
IRJET- Mobile Communication Security using Encryption and Decryption
 
Mobile cloning paper
Mobile cloning paperMobile cloning paper
Mobile cloning paper
 
Mobile Cloning Technology Report
Mobile Cloning Technology ReportMobile Cloning Technology Report
Mobile Cloning Technology Report
 

Ähnlich wie Phone works when it's off

Cell Phone and Mobile Devices Forensics
Cell Phone and Mobile Devices ForensicsCell Phone and Mobile Devices Forensics
Cell Phone and Mobile Devices ForensicsArthyR3
 
Intro 110220163729-phpapp03
Intro 110220163729-phpapp03Intro 110220163729-phpapp03
Intro 110220163729-phpapp03rex890115
 
Intro 110220163729-phpapp03
Intro 110220163729-phpapp03Intro 110220163729-phpapp03
Intro 110220163729-phpapp03rex890115
 
Securing 4G and LTE systems with Deep Learning and Virtualization
Securing 4G and LTE systems with Deep Learning and VirtualizationSecuring 4G and LTE systems with Deep Learning and Virtualization
Securing 4G and LTE systems with Deep Learning and VirtualizationDr. Edwin Hernandez
 
2 g sunset learn how your alarm monotoring is affected
2 g sunset   learn how your alarm monotoring is affected2 g sunset   learn how your alarm monotoring is affected
2 g sunset learn how your alarm monotoring is affectedAlarm Relay
 
2 g _3g__4g..._omg_what_g_is_right_for_m2m
2 g _3g__4g..._omg_what_g_is_right_for_m2m2 g _3g__4g..._omg_what_g_is_right_for_m2m
2 g _3g__4g..._omg_what_g_is_right_for_m2mIrfan Ahmad
 
Chp 6 infrastructure- the backbone of e-commerce tech
Chp 6 infrastructure- the backbone of e-commerce techChp 6 infrastructure- the backbone of e-commerce tech
Chp 6 infrastructure- the backbone of e-commerce techcheqala5626
 
Asifuzzaman (061846556)
Asifuzzaman (061846556)Asifuzzaman (061846556)
Asifuzzaman (061846556)mashiur
 
52 mobile phone cloning
52 mobile phone cloning52 mobile phone cloning
52 mobile phone cloningSALMAN SHAIKH
 
Pakdo life ka har signal
Pakdo life ka har signalPakdo life ka har signal
Pakdo life ka har signalabhilashshah12
 

Ähnlich wie Phone works when it's off (20)

Cell Phone and Mobile Devices Forensics
Cell Phone and Mobile Devices ForensicsCell Phone and Mobile Devices Forensics
Cell Phone and Mobile Devices Forensics
 
Dial up security
Dial up securityDial up security
Dial up security
 
Intro 110220163729-phpapp03
Intro 110220163729-phpapp03Intro 110220163729-phpapp03
Intro 110220163729-phpapp03
 
Intro 110220163729-phpapp03
Intro 110220163729-phpapp03Intro 110220163729-phpapp03
Intro 110220163729-phpapp03
 
Securing 4G and LTE systems with Deep Learning and Virtualization
Securing 4G and LTE systems with Deep Learning and VirtualizationSecuring 4G and LTE systems with Deep Learning and Virtualization
Securing 4G and LTE systems with Deep Learning and Virtualization
 
Chapter 09 pertemuan 13- donpas - mobile computing
Chapter 09  pertemuan 13- donpas - mobile computingChapter 09  pertemuan 13- donpas - mobile computing
Chapter 09 pertemuan 13- donpas - mobile computing
 
Ch 04 wireless security
Ch 04 wireless securityCh 04 wireless security
Ch 04 wireless security
 
2 g sunset learn how your alarm monotoring is affected
2 g sunset   learn how your alarm monotoring is affected2 g sunset   learn how your alarm monotoring is affected
2 g sunset learn how your alarm monotoring is affected
 
Unit 1
Unit 1Unit 1
Unit 1
 
Pda
PdaPda
Pda
 
IT unit 1
IT unit 1IT unit 1
IT unit 1
 
3 g vs wifi
3 g vs wifi3 g vs wifi
3 g vs wifi
 
2 g _3g__4g..._omg_what_g_is_right_for_m2m
2 g _3g__4g..._omg_what_g_is_right_for_m2m2 g _3g__4g..._omg_what_g_is_right_for_m2m
2 g _3g__4g..._omg_what_g_is_right_for_m2m
 
Pertemuan 8 mobile computing
Pertemuan 8   mobile computingPertemuan 8   mobile computing
Pertemuan 8 mobile computing
 
Mobile Computing
Mobile ComputingMobile Computing
Mobile Computing
 
Chp 6 infrastructure- the backbone of e-commerce tech
Chp 6 infrastructure- the backbone of e-commerce techChp 6 infrastructure- the backbone of e-commerce tech
Chp 6 infrastructure- the backbone of e-commerce tech
 
Asifuzzaman (061846556)
Asifuzzaman (061846556)Asifuzzaman (061846556)
Asifuzzaman (061846556)
 
52 mobile phone cloning
52 mobile phone cloning52 mobile phone cloning
52 mobile phone cloning
 
Mobile cloning
Mobile cloningMobile cloning
Mobile cloning
 
Pakdo life ka har signal
Pakdo life ka har signalPakdo life ka har signal
Pakdo life ka har signal
 

Kürzlich hochgeladen

AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Principled Technologies
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024The Digital Insurer
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024SynarionITSolutions
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 

Kürzlich hochgeladen (20)

AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 

Phone works when it's off

  • 2. danbelaprefum@gmail.com / danrichsoul@yahoo.com Program ABOUT UR PHONE DO U KNOW ABOUT PHONE DO U KNOW THE USE OF ALL APP ON UR MOBILE PHONES
  • 3. DO U KNOW ABOUT PHONE
  • 4. danbelaprefum@gmail.com / danrichsoul@yahoo.com Program ABOUT UR PHONE DO U KNOW ABOUT PHONE NOTE Network security consists of the policies and practices adopted to prevent and monitor unauthorized access, misuse, modification, or denial of a computer network and network- accessible resources. ... Networks can be private, such as within a company, and others which might be open to public access. There is no security for any Phones including “i-phone”
  • 5. danbelaprefum@gmail.com / danrichsoul@yahoo.com Program ABOUT UR PHONE DO U KNOW ABOUT PHONE HISTORY OF MOBILE PHONES covers mobile communication devices that connect wirelessly to the public switched telephone network. While the transmission of speech by radio has a long history, the first devices that were wireless, mobile, and also capable of connecting to the standard telephone network are much more recent. The fit such devices were barely portable compared to today's compact hand-held devices, and their use was clumsy. Along with the process of developing a more portable technology, and a better interconnections system, drastic changes have taken place in both the networking of wireless communication and the prevalence of its use, with smartphones.
  • 6. danbelaprefum@gmail.com / danrichsoul@yahoo.com Program ABOUT UR PHONE DO U KNOW ABOUT PHONE GLOBAL SYSTEM FOR MOBILE The Global System for Mobile Communications (GSM) is a standard developed by the European Telecommunications Standards Institute (ETSI) to describe the protocols for second-generation (2G) digital cellular networks used by mobile devices such as mobile phones and tablets. It was first deployed in Finland in December 1991. By the mid-2010s, it became a global standard for mobile communications achieving over 90% market share, and operating in over 193 countries and territories. (now in the 5G) discuss
  • 7. danbelaprefum@gmail.com / danrichsoul@yahoo.com Program ABOUT UR PHONE DO U KNOW ABOUT PHONE GLOBAL SYSTEM FOR MOBILE ARCHITECTURE
  • 8. danbelaprefum@gmail.com / danrichsoul@yahoo.com Program ABOUT UR PHONE DO U KNOW ABOUT PHONE SUBSCRIBER IDENTITY MODULE • Subscriber Identity Module (SIM CARD) • A nano sim used in mobile phones • One of the key features of GSM is the Subscriber Identity Module, commonly known as a SIM card. The SIM is a detachable smart card containing the user's subscription information and phone book. This allows the user to retain his or her information after switching handsets. Alternatively, the user can change operators while retaining the handset simply by changing the SIM. Some operators will block this by allowing the phone to use only a single SIM, or only a SIM issued by them; this practice is known as SIM locking.
  • 9. danbelaprefum@gmail.com / danrichsoul@yahoo.com Program ABOUT UR PHONE DO U KNOW ABOUT PHONE SUBSCRIBER IDENTITY MODULE A SIM card contains its unique serial number (ICCID), international mobile subscriber identity (IMSI) number, security authentication and ciphering information, temporary information related to the local network, a list of the services the user has access to, and two passwords: a personal identification number (PIN) for ordinary use, and a personal unblocking code (PUC) for PIN unlocking.
  • 10. danbelaprefum@gmail.com / danrichsoul@yahoo.com Program ABOUT UR PHONE DO U KNOW ABOUT PHONE INTERNATIONAL MOBILE EQUIPMENT IDENTITY IMEI is short for International Mobile Equipment Identity and is a unique number given to every single mobile phone, typically found behind the battery. IMEI numbers of cellular phones connected to a GSM network are stored in a database (EIR - Equipment Identity Register) containing all valid mobile phone equipment.
  • 11. danbelaprefum@gmail.com / danrichsoul@yahoo.com Program ABOUT UR PHONE DO U KNOW ABOUT PHONE MOBILE PHONE SERVER ARCHITECTURE ATTACKS UNSECURED WI-FI SPOOFING PHISHING SPYWARE BROKEN - CRYPTOGRAPHY IMPROPER SESSION - HANDLING PREVENTION INSTALL FIREWALL PASS CODE SOFTWARE UPDATE USE OFFICIAL APP - STORE
  • 12. danbelaprefum@gmail.com / danrichsoul@yahoo.com Program ABOUT UR PHONE DO U KNOW ABOUT PHONE WHAT MOBILE PHONES CAN BE USE FOR ANY IDEA CLOUD COMPUTING | LEDGE COMPUTING | FOG COMPUTING
  • 13. danbelaprefum@gmail.com / danrichsoul@yahoo.com Program ABOUT UR PHONE DO U KNOW ABOUT PHONE MAC ADDRESS A media access control address (MAC address) is a unique identifier assigned to a network interface controller (NIC) for use as a network address in communications within a network segment. This use is common in most IEEE 802 networking technologies, including Ethernet, Wi-Fi, and Bluetooth. Within the Open Systems Interconnection (OSI) network model, MAC addresses are used in the medium access control protocol sub-layer of the data link layer. As typically represented, MAC addresses are recognizable as six groups of two hexadecimal digits, separated by hyphens, colons, or without a separator. MAC addresses are primarily assigned by device manufacturers, and are therefore often referred to as the burned-in address,
  • 14. danbelaprefum@gmail.com / danrichsoul@yahoo.com Program ABOUT UR PHONE DO U KNOW ABOUT PHONE MAC ADDRESS
  • 15. danbelaprefum@gmail.com / danrichsoul@yahoo.com Program ABOUT UR PHONE DO U KNOW ABOUT PHONE IP ADDRESS An Internet Protocol address (IP address) is a numerical label assigned to each device connected to a computer network that uses the Internet Protocol for communication.An IP address serves two main functions: host or network interface identification and location addressing. Internet Protocol version 4 (IPv4) defines an IP address as a 32-bit number. However, because of the growth of the Internet and the depletion of available IPv4 addresses, a new version of IP (IPv6), using 128 bits for the IP address, was standardized in 1998. IPv6 deployment has been ongoing since the mid-2000s.
  • 16. danbelaprefum@gmail.com / danrichsoul@yahoo.com Program ABOUT UR PHONE DO U KNOW ABOUT PHONE IP ADDRESS
  • 17. danbelaprefum@gmail.com / danrichsoul@yahoo.com Program ABOUT UR PHONE DO U KNOW ABOUT PHONE QUESTION TIME THANK YOU