SHARE
Facebook X Pinterest WhatsApp

Building Security into ‘Off-The-Shelf’ Smartphones

Building Security into ‘Off-The-Shelf’ Smartphones Use this NIST document to discuss the key issues surrounding smartphone security and how to bolster security efforts. Recent advancements in hardware have increased the computing power, memory, storage, and wireless connectivity of handheld mobile devices. Smartphone devices are used for everyday activities that range from maps and geo-location tagging […]

Written By
thumbnail
ITBE Staff
ITBE Staff
Feb 26, 2013

Building Security into ‘Off-The-Shelf’ Smartphones

Use this NIST document to discuss the key issues surrounding smartphone security and how to bolster security efforts.


Recent advancements in hardware have increased the computing power, memory, storage, and wireless connectivity of handheld mobile devices. Smartphone devices are used for everyday activities that range from maps and geo-location tagging to banking. Indeed, these new hand-held devices are capable of carrying significant amount of both personal and professional data including documents thus extending the operations that we can perform from desktop to smaller devices.

Unfortunately, this reliance on hand-held devices has made them an attractive target for applications and new mobile application markets have been spawned for the different types of devices. At the same time, these new devices have become the target of malicious attackers that have shifted their attention from desktop systems to malware and malicious software for hand-held mobile devices.

This paper from the National Institute of Standards and Technology discusses the key issues surrounding smartphone security. It’s a great starting point if you’re trying to emphasize the importance of proper security in the age of BYOD.

Included in this ZIP file are:

  • Intro Page.pdf
  • Terms and Conditions.pdf
  • Building Security Into Off the Shelf Smartphones.pdf

Recommended for you...

Is 5G Enough to Boost the Metaverse?
Litton Power
Apr 18, 2022
Building a Private 5G Network for Your Business 
Kihara Kimachia
Apr 18, 2022
Best Enterprise 5G Network Providers 2022
5G Cybersecurity Risks and How to Address Them
Kihara Kimachia
Dec 17, 2021
IT Business Edge Logo

The go-to resource for IT professionals from all corners of the tech world looking for cutting edge technology solutions that solve their unique business challenges. We aim to help these professionals grow their knowledge base and authority in their field with the top news and trends in the technology space.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.