سیویلیکا را در شبکه های اجتماعی دنبال نمایید.

Cell Phone Security

Publish Year: 1389
Type: Conference paper
Language: English
View: 1,243

This Paper With 10 Page And PDF Format Ready To Download

Export:

Link to this Paper:

Document National Code:

ICECC01_053

Index date: 18 December 2011

Cell Phone Security abstract

Cell phones have become indispensable tool for today's highly mobile workforce. Small and relatively inexpensive, this device can be used for many functions, including sending and receiving electronic mail, storing documents, delivering presentations, and remotely accessing data. While this device provides productivity benefits, they also pose new risks to organizations.This document provides an overview of cell phone device in use today and offers insights into making informed information technology security decisions on their treatment and gives details about the threats and technology risks associated with the use of this device and the available safeguards to mitigate them. The document is intended to assist organizations in securing cell phones. More specifically, this text describes in detail the threats faced by organizations that employ handheld devices and the measures that can be taken to counter those threats. Organizations can use this information to enhance security and reduce incidents involving cell phone devices.Introduction The use of handheld devices has rapidly grown in recent years due to their convenience and inexpensiveness when compared to laptop or notebook computers. These devices are no longer viewed as coveted gadgets for early technology adopters; instead, they have become indispensable tools that provide competitive advantages for the mobile workforce and individual users [1]. Because of their pervasiveness in society, the security implications of these devices are a growing concern for many organizations and the impetus behind this document

Cell Phone Security authors

مراجع و منابع این Paper:

لیست زیر مراجع و منابع استفاده شده در این Paper را نمایش می دهد. این مراجع به صورت کاملا ماشینی و بر اساس هوش مصنوعی استخراج شده اند و لذا ممکن است دارای اشکالاتی باشند که به مرور زمان دقت استخراج این محتوا افزایش می یابد. مراجعی که مقالات مربوط به آنها در سیویلیکا نمایه شده و پیدا شده اند، به خود Paper لینک شده اند :
Judy Mottl, My Cellphone, My Everything..., internetnews .com, Jupitermedia March ...
Judy Mottl, What's Motorola's Android Plan?, Corporation, 2008, ...
Svein Willassen, Forensic Analysis of Mobile Intermal ...
International Conference On Digital Forensics, National Center for Forensic Science, ...
Wayne Jansen, Vlad Korolev, Serban Gavrila, Thomas Heute, Clement Seveillac, ...
M anagement(S AM'O4), June, 2004 ...
Resume des Menaces Mobiles pour 2007, F- April ...
Secure. fr/news/fs new _ 01 fra.html ...
Robert McMillan, New RedBrowser Trojan First to Target J2ME, C ...
James O'Connor, Attack Surface Analysis of BlackBerry Devices, Symantec Security ...
Tom Espiner, Phone Phishing Attack Hits US, 2006, ...
نمایش کامل مراجع