dcsimg

Ten Approaches to Protecting Mobile Data

  • Ten Approaches to Protecting Mobile Data-

    Person-Action-Object

    Passwords are challenged in a couple of ways: People tend to use numbers and words with which they are familiar, and that can be found by hackers perusing Facebook and public records, and they often are written down. Carnegie Mellon University is working on a mnemonic approach called person-action-object (PAO). In PAO, people make up absurd stories – Bill Gates swallowing a bicycle is the one used in the story – that enable creation of truly random passwords that users don’t need to write down.

1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12

Ten Approaches to Protecting Mobile Data

  • 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12
  • Ten Approaches to Protecting Mobile Data-7

    Person-Action-Object

    Passwords are challenged in a couple of ways: People tend to use numbers and words with which they are familiar, and that can be found by hackers perusing Facebook and public records, and they often are written down. Carnegie Mellon University is working on a mnemonic approach called person-action-object (PAO). In PAO, people make up absurd stories – Bill Gates swallowing a bicycle is the one used in the story – that enable creation of truly random passwords that users don’t need to write down.

Mobility exploded onto the business scene during the past decade and, needless to say, is here to stay. Now, important and sensitive tasks are as likely to be performed on smartphones, tablets and other non-PC devices as on big machines sitting on office desks.

Security has been a bit of a game of catch up. It is complicated by a couple of ongoing challenges: Like diet and exercise, people (and the companies for which they work) pay lip service to good security practice, but usually skimp, forget or get lazy. On top of that, the emergence of bring-your-own-device (BYOD) approaches complicated things significantly.

But great progress has been made. SNS Research reported in September that the investment in mobile device and network security in 2013 alone will be $9 billion. This slideshow covers some of the latest techniques and approaches to bolstering mobile data security.