0% found this document useful (0 votes)
29 views1 page

Standard Kompetensi : Group Discussion

This graduate-level course provides an introduction to mobile security and explores the unique challenges of securing mobile networks and devices. It gives an overview of security principles in modern mobile networks and examines the security models of popular mobile platforms like Android. The lecture aims to address the growing threat to Android smartphones, mobile networks, and services. Students will learn about mobile technology development, secure mobile devices, apply key security components, optimize Android system performance, and troubleshoot problems using available tools. The course teaches through lectures, tutorials, discussions, simulations, practical work, group projects, and presentations. Several reference books on topics like mobile application security, wireless security, and Android security attacks and defenses are also listed.

Uploaded by

helmikurniawan77
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
29 views1 page

Standard Kompetensi : Group Discussion

This graduate-level course provides an introduction to mobile security and explores the unique challenges of securing mobile networks and devices. It gives an overview of security principles in modern mobile networks and examines the security models of popular mobile platforms like Android. The lecture aims to address the growing threat to Android smartphones, mobile networks, and services. Students will learn about mobile technology development, secure mobile devices, apply key security components, optimize Android system performance, and troubleshoot problems using available tools. The course teaches through lectures, tutorials, discussions, simulations, practical work, group projects, and presentations. Several reference books on topics like mobile application security, wireless security, and Android security attacks and defenses are also listed.

Uploaded by

helmikurniawan77
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 1

This is a graduate-level course that provides an introduction to mobile security.

We explore
the unique challenges facing mobile security while comparing and contrasting it with what
we’ve learnt from computer and network security. This course provides a good conceptual
overview of the security principles incorporated in the design of several generations of
mobile networks.We also explore platform security models of the popular mobile device
platforms ex; Android.

This lecture is designed to address this growing threat to mobile devices, networks and
services delivered over the mobile infrastructure for Android Mobile Smartphone.

Standard Kompetensi;
 Mahasiswa dapat memahami tentang dunia mobile beserta perkembangannya.
 Mahasiswa memahami tentang keamanan mobile device.
 Dapat menerapkan komponen kunci keamanan untuk melindungi perangkat mobile beserta
konfigurasinya.
 Mampu mengoptimalkan performa kinerja sistem mobile berbasis Android
 Mampu memecahkan masalah system dengan menggunakan teknik dan tool-tool yang
tersedia pada perangkat mobile Android
Metode Belajar;
 Ceramah & tutorial
 Diskusi
 Simulasi and praktikum
 Group Discussion
 Membuat proyek akhir
 Presentasi
Buku Referensi;
1. Mobile Application Security, Himanshu Dviwedi, Chris Clark and David Thiel, 1st Edition
2. Boudriga, 2010, Security of Mobile Communication, CRC Press
3. Jaya Nampalli, 2008, Mobile Security How to Secure, Privatize, and Recover Your
Devices, Packt Publishing
4. Anmol Misra, Abhishek Dubey, 2013. Android Security Attacks and Defenses, Auerbach
Publications
5. Chaouchi, Maknavicius, 2007, Wireless and Mobile Network Security, Security Basics,
Security in On-the-shelf and Emerging Technologies, WILEY
6. Mike Price, 2013, Hacking Exposed Mobile_ Security Secrets & Solutions, McGraw-Hil
7. Russell Dean Vines, 2002, Wireless Security Essentials_ Defending Mobile Systems
from Data Piracy, Wiley

You might also like