Introduction Class DFP50123
Introduction Class DFP50123
SECURE MOBILE
COMPUTING
DFP50123
SITI SHARMILA BINTI OSMIN
SYNOPSIS
SECURE MOBILE COMPUTING course appraises
vulnerabilities and threat vector associated with
Mobile Computing devices. This course contains
a specifis emphasis on mitigation techniques
including security configurations as well as
security software.
COURSE LEARNING OUTCOMES (CLO):
Upon completion of this course, students should be able to:
CLO1 :
Manipulate the aspect of mobile computing, model and security principles using mobile
computing technology to develop applications ( P3, PLO 3 )
CLO2 :
Develop effective leadership and team work related to mobile secure environment( A4,
PLO 5 )
CLO3 :
Demonstrate best practices in developing mobile security computing in context of social
environment( A3, PLO 8 )
TRANSFERABLE SKILLS
LEADERSHIP,
AUTONOMY PERSONAL
AND SKILLS
RESPONSIBILITY
COURSE
SYLLABUS
CHAPTER 1
INFORMATION
SECURITY OVERVIEW
Identify the need for information security
Explain potential risks to information security
CHAPTER 2
MOBILE COMPUTING
TECHNOLOGIES
Identify the basics of mobile computing
Describe wireless system architecture
Discuss Mobile computing OS
CHAPTER 3
MOBILE COMPUTING
SECURITY
Describe CIA Triad in mobile computing
Explain mobile risk ecosystem
Explain Mobile Hacking
Measure mobile phone security and forensics
CHAPTER 4
MOBILE VULNERABILITIES
Mobile Number
019-5728463