Cell Phone Security
Publish place: International Conference on eCitizen & Cell phone 2010
Publish Year: 1389
Type: Conference paper
Language: English
View: 1,243
This Paper With 10 Page And PDF Format Ready To Download
- Certificate
- I'm the author of the paper
Export:
Document National Code:
ICECC01_053
Index date: 18 December 2011
Cell Phone Security abstract
Cell phones have become indispensable tool for today's highly mobile workforce. Small and relatively inexpensive, this device can be used for many functions, including sending and receiving electronic mail, storing documents, delivering presentations, and remotely accessing data. While this device provides productivity benefits, they also pose new risks to organizations.This document provides an overview of cell phone device in use today and offers insights into making informed information technology security decisions on their treatment and gives details about the threats and technology risks associated with the use of this device and the available safeguards to mitigate them. The document is intended to assist organizations in securing cell phones. More specifically, this text describes in detail the threats faced by organizations that employ handheld devices and the measures that can be taken to counter those threats. Organizations can use this information to enhance security and reduce incidents involving cell phone devices.Introduction The use of handheld devices has rapidly grown in recent years due to their convenience and inexpensiveness when compared to laptop or notebook computers. These devices are no longer viewed as coveted gadgets for early technology adopters; instead, they have become indispensable tools that provide competitive advantages for the mobile workforce and individual users [1]. Because of their pervasiveness in society, the security implications of these devices are a growing concern for many organizations and the impetus behind this document
Cell Phone Security Keywords:
Cell Phone Security authors
Sara Artang
IRAN
مراجع و منابع این Paper:
لیست زیر مراجع و منابع استفاده شده در این Paper را نمایش می دهد. این مراجع به صورت کاملا ماشینی و بر اساس هوش مصنوعی استخراج شده اند و لذا ممکن است دارای اشکالاتی باشند که به مرور زمان دقت استخراج این محتوا افزایش می یابد. مراجعی که مقالات مربوط به آنها در سیویلیکا نمایه شده و پیدا شده اند، به خود Paper لینک شده اند :