Blackberry and Handheld Devices: Management Productivity Aid or Cyber-Crime Tools?
نویسندگان
چکیده
منابع مشابه
The cyber crime threat on mobile devices
This paper is concerned with highlighting recent and emerging cyber crime threats to mobile devices. The main classes of threat are briefly reviewed, and the history of attacks against mobile systems is summarised. Two case studies of attacks against general-purpose systems not normally thought of as security-sensitive are given, and conclusions are drawn.
متن کاملAudit Tools for Cyber Crime Investigation
In current scenario cyber crime is increasing very fast as the technology is growing very rapidly. So the cyber crime investigation is becoming a very complicated task to do without a proper framework. There is wide range of different types of cyber crime today. Solution of each case requires a very complicated task. The digital revolution has created the need of new laws, digital investigators...
متن کاملSecurity Policy Management for Handheld Devices
The adoption of wireless technologies and handheld devices is becoming widespread in business, industry, and government organizations. The use of handheld devices introduces new risks to existing enterprise computing resources. Therefore, organizations require new strategies to mitigate the security risks associated with the integration of wireless technologies into existing computing environme...
متن کاملCyber Security, Cyber Crime and Cyber Forensics - Applications and Perspectives
By reading, you can know the knowledge and things more, not only about what you get from people to people. Book will be more trusted. As this cyber security cyber crime and cyber forensics applications and perspectives, it will really give you the good idea to be successful. It is not only for you to be success in certain life you can be successful in everything. The success can be started by k...
متن کاملCyber-crime Science = Crime Science + Information Security
Cyber-crime Science is an emerging area of study aiming to prevent cyber-crime by combining security protection techniques from Information Security with empirical research methods used in Crime Science. Information security research has developed techniques for protecting the confidentiality, integrity, and availability of information assets but is less strong on the empirical study of the eff...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of Politics and Law
سال: 2012
ISSN: 1913-9055,1913-9047
DOI: 10.5539/jpl.v5n1p139