This course focuses on aspects of mobile interaction, mobile application, wireless communication that arise in mobile computing. Topics covered: Mobile Interaction ( principles of usability, security, and privacy; Methodologies for evaluating usable security; Security and usability analysis Phishing and Risk; Knowledge-based authentication; Biometric and alternative authentication; Security and privacy; Usable security software design principles; Human- in-the- loop design framework; Security indicators and warnings; Usable security for security administrators ), Mobile Application ( Mobile Platforms, mobile services ), Mobile Communication Systems ( Mobile cellular telephony; Wireless Internet; Mobile ad hoc; Sensor networks. The course will involve a group project focusing on protocols, programming tasks, vulnerabilities, and attacks.
Intended learning outcomes
Knowledge and understanding
The student should be able to
Explain the concepts and basics of security security in mobile computing.
Describes the methods and information theories of information penetration.
Remember the most important thing that the company can use from the resume.
mental skills
The student should be able to
Linked the importance of risk analysis, risk mitigation, security system assessment, and different levels of digital infection
Designs (physical and rental) with the security of mobile devices.
Compare personal protection.
Practical skills and professionalism
The student should be able to
Design different levels of protection systems using the basic components of data security, networks and communication systems.
Use modern technology in evaluating and repairing security breaches.
Diagnose errors and dangers resulting from the failure or misuse of electronic protection methods and methods.
General and transferable skills
The student should be able to
Deal with all levels of data and information security.
Solving various data problems
Aware of community communication, and follow it in information and information security.