All
All

Building Security into ‘Off-The-Shelf’ Smartphones

467KB | 3 files | null PDF

Use this NIST document to discuss the key issues surrounding smartphone security and how to bolster security efforts.

Recent advancements in hardware have increased the computing power, memory, storage, and wireless connectivity of handheld mobile devices. Smartphone devices are used for everyday activities that range from maps and geo-location tagging to banking. Indeed, these new hand-held devices are capable of carrying significant amount of both personal and professional data including documents thus extending the operations that we can perform from desktop to smaller devices.

Unfortunately, this reliance on hand-held devices has made them an attractive target for applications and new mobile application markets have been spawned for the different types of devices. At the same time, these new devices have become the target of malicious attackers that have shifted their attention from desktop systems to malware and malicious software for hand-held mobile devices.

This paper from the National Institute of Standards and Technology discusses the key issues surrounding smartphone security. It’s a great starting point if you’re trying to emphasize the importance of proper security in the age of BYOD.

Included in this ZIP file are:

  • Intro Page.pdf
  • Terms and Conditions.pdf
  • Building Security Into Off the Shelf Smartphones.pdf
IT Downloads help you save time and money while executing essential IT management tasks. Download this useful resource now and put it to work for your business.
Related IT Downloads

Healthcare02 Health Attitude: Unraveling and Solving the Complexities of Healthcare

In this excerpt, Dr. John R. Patrick explores how cultural attitudes toward consumer-initiated health care are changing and how technology is enabling this transition. ...  More >>

Global13 Considerations for Identity Management in Public Safety Networks

This document analyzes approaches to identity management for public safety networks in an effort to assist individuals developing technical and policy requirements for public safety use. ...  More >>

Mobile45 Vetting the Security of Mobile Applications

The purpose of this document is to help organizations understand the process for vetting the security of mobile applications, plan for the implementation of an app vetting process, develop app security requirements, and understand the types of app vulnerabilities and the testing methods used to detect those vulnerabilities. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.