Cell Phone Security

سال انتشار: 1389
نوع سند: مقاله کنفرانسی
زبان: انگلیسی
مشاهده: 1,158

فایل این مقاله در 10 صفحه با فرمت PDF قابل دریافت می باشد

استخراج به نرم افزارهای پژوهشی:

لینک ثابت به این مقاله:

شناسه ملی سند علمی:

ICECC01_053

تاریخ نمایه سازی: 27 آذر 1390

چکیده مقاله:

Cell phones have become indispensable tool for today's highly mobile workforce. Small and relatively inexpensive, this device can be used for many functions, including sending and receiving electronic mail, storing documents, delivering presentations, and remotely accessing data. While this device provides productivity benefits, they also pose new risks to organizations.This document provides an overview of cell phone device in use today and offers insights into making informed information technology security decisions on their treatment and gives details about the threats and technology risks associated with the use of this device and the available safeguards to mitigate them. The document is intended to assist organizations in securing cell phones. More specifically, this text describes in detail the threats faced by organizations that employ handheld devices and the measures that can be taken to counter those threats. Organizations can use this information to enhance security and reduce incidents involving cell phone devices.Introduction The use of handheld devices has rapidly grown in recent years due to their convenience and inexpensiveness when compared to laptop or notebook computers. These devices are no longer viewed as coveted gadgets for early technology adopters; instead, they have become indispensable tools that provide competitive advantages for the mobile workforce and individual users [1]. Because of their pervasiveness in society, the security implications of these devices are a growing concern for many organizations and the impetus behind this document

نویسندگان

مراجع و منابع این مقاله:

لیست زیر مراجع و منابع استفاده شده در این مقاله را نمایش می دهد. این مراجع به صورت کاملا ماشینی و بر اساس هوش مصنوعی استخراج شده اند و لذا ممکن است دارای اشکالاتی باشند که به مرور زمان دقت استخراج این محتوا افزایش می یابد. مراجعی که مقالات مربوط به آنها در سیویلیکا نمایه شده و پیدا شده اند، به خود مقاله لینک شده اند :
  • Judy Mottl, My Cellphone, My Everything..., internetnews .com, Jupitermedia March ...
  • Judy Mottl, What's Motorola's Android Plan?, Corporation, 2008, ...
  • Svein Willassen, Forensic Analysis of Mobile Intermal ...
  • International Conference On Digital Forensics, National Center for Forensic Science, ...
  • Wayne Jansen, Vlad Korolev, Serban Gavrila, Thomas Heute, Clement Seveillac, ...
  • M anagement(S AM'O4), June, 2004 ...
  • Resume des Menaces Mobiles pour 2007, F- April ...
  • Secure. fr/news/fs new _ 01 fra.html ...
  • Robert McMillan, New RedBrowser Trojan First to Target J2ME, C ...
  • James O'Connor, Attack Surface Analysis of BlackBerry Devices, Symantec Security ...
  • Tom Espiner, Phone Phishing Attack Hits US, 2006, ...
  • نمایش کامل مراجع