Abstract

This chapter discusses the threats from the perspective of the risk they present. It focuses on proactive defensive measures that can be taken and examines what to do if the device suffers some attack or loss. The chapter provides a model by which one can evaluate the risk of the mobile device and identify which defensive measures are the most appropriate. The risk model was based primarily on the nature of use of the device, the use model, and the type of information and access stored on it. It reviews the types of model attacks from a risk perspective, and concludes that device loss/theft is the most concerning risk, and that as devices and networks mature, remote attacks like those of desktop computers will continue to grow. The chapter reviews various defensive measures available to mobile users, including best practices and third-party secure add-ons. For most users, following simple best practices provides significant protection against likely risks. For high-risk users, some of the security add-ons provide additional value. It is likely in the near future that the protection by these add-ons will be appropriate to a wider audience.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.