Find an IT Download

Building Security into ‘Off-The-Shelf’ Smartphones

Use this NIST document to discuss the key issues surrounding smartphone security and how to bolster security efforts.

467KB | 3 files | null PDF

Recent advancements in hardware have increased the computing power, memory, storage, and wireless connectivity of handheld mobile devices. Smartphone devices are used for everyday activities that range from maps and geo-location tagging to banking. Indeed, these new hand-held devices are capable of carrying significant amount of both personal and professional data including documents thus extending the operations that we can perform from desktop to smaller devices.

Unfortunately, this reliance on hand-held devices has made them an attractive target for applications and new mobile application markets have been spawned for the different types of devices. At the same time, these new devices have become the target of malicious attackers that have shifted their attention from desktop systems to malware and malicious software for hand-held mobile devices.

This paper from the National Institute of Standards and Technology discusses the key issues surrounding smartphone security. It’s a great starting point if you’re trying to emphasize the importance of proper security in the age of BYOD.

Included in this ZIP file are:

  • Intro Page.pdf
  • Terms and Conditions.pdf
  • Building Security Into Off the Shelf Smartphones.pdf


Recent IT Downloads
Building a GRC Program: Assessing Stakeholder Needs and Readiness

This table outlines the top needs of each stakeholder group that can help guide your conversat...Read More

Recent IT Downloads
Guide to Cyber Threat Information Sharing

This publication provides guidelines for establishing and participating in cyber threat inform...Read More

Recent IT Downloads
Colocation Checklist

This checklist will help make sure you ask the important questions that will affect your coloc...Read More

Recent IT Downloads
Trustworthy Email

This document provides recommendations and guidelines for enhancing trust in email, including ...Read More