Do New Mobile Devices in Enterprises Pose A Serious Security Threat?
نویسنده
چکیده
The purpose of this paper is to introduce a research proposal designed to explore the network security issues concerning mobile devices protection. Many threats exist and they harm not only computers but handheld devices as well. The mobility of phones and their excessive use make them more vulnerable. The findings suggest a list of protections that can provide high level of security for new mobile devices.
منابع مشابه
Approaches for Ensuring Security and Privacy in Unplanned Ubiquitous Computing Interactions
Modern technology and omnipresent computing and communication facilities are leading us closer to the ubiquitous computing vision. However, the very nature of ubicomp infrastructure, the openness of the environments and the characteristics of the interactions pose unique security and privacy challenges. We anticipate that the vast number of interactions will be unplanned and will occur among mu...
متن کاملDifferential Power Analysis: A Serious Threat to FPGA Security
Differential Power Analysis (DPA) implies measuring the supply current of a cipher-circuit in an attempt to uncover part of a cipher key. Cryptographic security gets compromised if the current waveforms obtained correlate with those from a hypothetical power model of the circuit. As FPGAs are becoming integral parts of embedded systems and increasingly popular for cryptographic applications and...
متن کاملPractical Attacks against Virtual Desktop Infrastructure (VDI) Solutions
The Virtual Desktop Infrastructure (VDI) technology is considered one such practical solution. Since VDI provides a remote workstation offering so that no data is stored locally on an endpoint device, it is touted as the security solution against data theft. While such a solution comes in handy when a mobile device is stolen, how does VDI scale when the device itself is compromised by a threat ...
متن کامل3G WCDMA Mobile Network DoS Attack and Detection Technology
Currently, there has been a 3G mobile networks data traffic explosion due to the large increase in the number of smartphone users. Unlike a traditional wired infrastructure, 3G mobile networks have limited wireless resources and signaling procedures for complex wireless resource management. And mobile network security for various abnormal and malicious traffic technologies was not ready. So Mal...
متن کاملSecurity Analysis of Wireless Java
This paper represents a careful study of the security aspects of Java 2 Micro-Edition (J2ME) Connected Limited Device Configuration (CLDC). This Java platform is intended for resource-constrained devices, with the purpose of expanding the range of applications available for these devices, by enabling them to run Java programs. Consequently, malicious code would pose a threat to the security and...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2013