comment on this article

Call security!

Mobile devices are vulnerable to a range of threats. So how can they be protected? By Louise Joselyn.

The advent of the smart ’phone means security is becoming essential in our mobile communications and networking based society. The latest internet enabled mobile devices feature advanced applications, which increasingly require or generate sensitive data stored on the device itself. Services such as e-commerce, video streaming and music downloads require user authentication, encryption schemes, plus facilities for the storage and protection of pin numbers, passwords and keys.
As ’phones, pdas and entertainment systems converge, more open standards, like GSM/GPRS, Bluetooth and 802.11 wireless local area networking (wlan) are being adopted.
Unsecured mobile devices are vulnerable to viruses and Trojan horses. This, and the inherent security risk of eavesdropping, makes them a security threat to the public and enterprise networks to which they want to connect. Potentially, they are an easy access point for viruses, hackers, fraudsters and content pirates.

Author
Louise Joselyn

Related Downloads
5517\call-security.pdf

Comment on this article


This material is protected by MA Business copyright See Terms and Conditions. One-off usage is permitted but bulk copying is not. For multiple copies contact the sales team.

What you think about this article:


Add your comments

Name
 
Email
 
Comments
 

Your comments/feedback may be edited prior to publishing. Not all entries will be published.
Please view our Terms and Conditions before leaving a comment.

Related Articles