A Mobile Security Battle

Jain, Sunil
October 2006
Security: Solutions for Enterprise Security Leaders;Oct2006, Vol. 43 Issue 10, p66
Trade Publication
The article focuses on the threat of the vulnerability of mobile computing and communications in the security systems industry in the U.S. Internet-based computing has brought with it a steady increase in the number of types of security threats. The growth of mobility has spawned several security challenges.


Related Articles

  • Keep watch beyond the perimeter. Condon, Ron // Computer Weekly;12/12/2006, p42 

    The article focuses on the challenge of network security imposed by wireless networks and mobile workers. With security threats growing continuously with each passing day, new technologies and techniques are required to resist them. The problem of network security is common, with companies often...

  • Delfigo extends keyboard biometrics to the iPhone.  // MarketWatch: Global Round-up;Nov2009, Vol. 8 Issue 11, p201 

    The article reports on the move of Delfigo Security to extend its services from personal computers and laptops to mobile devices, primarily the iPhone. It notes the services provided by Delfigo with its keyboard biometrics capabilities for authentication purposes. It highlights the ways on how...

  • A Flexible and Reliable Architecture for Mobile Agent Security. Al-Saadoon, Ghossoon M. W. // Journal of Computer Science;2009, Vol. 5 Issue 4, p270 

    Problem statement: Wireless application protocol is a protocol that makes it possible to surf the Internet from a cellular phone or other handheld wireless. Many of us that surf the Internet from home with a 56 kbps modem think that it is slow and a cell phone only uses 9.6 kbps so WAP has to...

  • Improving Mobile Device Classification using Security Events for Preventing Wireless Intrusion. Hyeokchan Kwon; Sin-Hyo Kim // International Journal of Security & Its Applications;Nov2013, Vol. 7 Issue 6, p181 

    In current wireless intrusion prevention system (WIPS), the mobile devices are classified into one of three or four categories by classification algorithm for preventing wireless intrusion. But such a classification mechanism has difficulty to delicate control the wireless access of mobile...

  • An Unsecured Mobile Device Could Spy On Us, Steal Money from Us. Kadam, Avinash W. // PC Quest;Aug2013, p38 

    The article focuses on the adverse impact of an unsecured mobile device on businesses. It reveals that unsecured mobile device can be used as a rogue device that can spy individuals as well as steal money and information from firms. It highlights several levels when securing mobile devices...

  • Trends in Mobile Device Security. James, Jeff // Windows IT Pro;Jan2012, Vol. 18 Issue 1, p62 

    The article explores the state of mobile device security in 2012. With the Android platform emerging as the dominant smartphone operating system (OS), there have been plenty of news on Android malware ranging from infected apps to key-logger applications. Embracing clear security policies,...

  • Top 10 Reasons to Control Employee PDAs. Elfanbaum, Bob; Dinman, Mark // Security: Solutions for Enterprise Security Leaders;Jun2004, Vol. 41 Issue 6, p36 

    Lists concerns that a company should address in getting their handheld security or personal digital assistants (PDA) in order, based on feedback from executives in the U.S. Network passwords; Customer data; Items that should never be stored on a mobile device such as credit card and account...

  • Enterprise Screams for Network Security. Rockwell, Mark // Wireless Week;11/1/2006, Vol. 12 Issue 22, p37 

    The article discusses the need for network security as mobile devices in the corporate network grows. According to Michael Voellinger of Telwares, mobile devices have become an asset to companies, and it has to be managed. Companies with expanding mobile devices in their information technology...

  • Intrusion Detection Methods in Wireless Network Systems. Ján, KREKÁŇ; L'ubomír, DOBOš; Ján, PAPAJ // Journal of Electrical & Electronics Engineering;May2011, Vol. 4 Issue 1, p79 

    The main purpose of this paper is to demonstrate the security weaknesses found in existing wireless networks. It demonstrates the basic principles of different security algorithms, and sketches up the ways how the attacker tries to break them. Protecting the network against unauthorized access...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics