Mobile Security: Threats and Best Practices

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Automotive Security Best Practices

Recommendations for security and privacy in the era of the next-generation car.

متن کامل

Security threats in Prepaid Mobile

Recent communications environment significantly expand the mobile environment. Prepaid mobile services for 3G networks enables telecommunication to sign up new users by utilizing the latest in converged billing technologies. The worldwide mobile communication market is exploding, and 50 percent of subscribers are expected to use prepaid billing . Prepaid services are driving mobile communicatio...

متن کامل

Security Threats for Mobile Platforms

The proliferation of smart-phone devices, with ever advancing technological features, has brought the issue of mobile device security back into focus. Mobile devices are rapidly becoming attractive targets for malicious attacks due to significant advances in both hardware and operating systems. The modern mobile platforms, like Android, iOS and Symbian, increasingly resemble traditional operati...

متن کامل

Threats and Security Issues in Mobile Computing

During the last decade the decrease in the size of computing machinery, coupled with the increase in their computing power has led to the development of the concept of mobile computing. Mobile Computing is a generic term is evolved in modern usage such that it requires that the mobile computing activity be connected wirelessly to and through the internet or to and through a private network. Now...

متن کامل

Best Security Practices: An Overview

Security technology is important to security, but the practices of the people who develop, integrate, evaluate, configure, maintain, and use that technology are more important; indeed, these practices are the foundation of technical (as well as physical and personnel) security. It is crucially important, therefore, that security practices be good ones; when feasible, best security practices (BS...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Mobile Information Systems

سال: 2020

ISSN: 1875-905X,1574-017X

DOI: 10.1155/2020/8828078