Sorry! The requested paper could not be found.
PDAs and Other Mobile Devices
Featuring 23 Papers as of June 17, 2014
Fear and Loathing in BYOD
by Joshua Wright - December 10, 2013
- Associated Webcasts: SANS Survey Results on BYOD Security Policies and Practices
- Sponsored By: Trusted Computing Group
Survey on mobile device security trends and techniques organizations are adopting to mitigate threats associated with mobile devices and BYOD.
SOHO Remote Access VPN. Easy as Pie, Raspberry Pi...
by Eric Jodoin - December 4, 2013
Free, unencrypted Wireless Access Points (WAPs) have proliferated and are now found in various locations including restaurants, libraries, schools, hotels, airports, etc.
SMS, iMessage and FaceTime security
by George Khalil - September 9, 2013
With the increasing mass adoption of mobile smart devices, attackers are increasingly focusing on gaining access and visibility into the data stored and transmitted via mobile devices.
2013 SANS Mobile Application Security Survey
by Kevin Johnson, James Jardine - June 6, 2013
Survey to assess organizational awareness and the procedures around mobile application risk.
Website Security for Mobile
by Alan Ho - April 16, 2013
Smartphones and Tablets are very popular nowadays, according to the study from Canalys (2012) in 2011Q4, which shows that global shipment for smartphones has a growth of more than 62% and growth of around 275% for pads.
What Is Your Mobile Content Policy? A Checklist for Content Risk Mitigation
by Barbara Filkins - November 3, 2012
- Sponsored By: SAP Global Marketing
Content management policies must adapt to the mobile user and the cloud, provide protection to information being accessed and processed, look at the context in which it is used and validate compliance.
SANS Survey on Mobility/BYOD Security Policies and Practices
by Kevin Johnson, Tony DeLaGrange - October 15, 2012
- Sponsored By: McAfee, a division of Intel Security F5 Networks, Inc. Oracle RSA, The Security Division of EMC MobileIron Box
Survey to determine the level of policy and controls around emerging threats against mobile devices.
SANS Mobility/BYOD Security Survey
by Kevin Johnson - March 5, 2012
Survey determines the type of mobile device usage allowed for enterprise applications and the level of policies and controls applied to this type of usage.
Reverse Engineering Of Malware On Android
by Vibha Manjunath - September 12, 2011
Smartphones have gained tremendous popularity over the last few years. In this growing market of smartphones, Android, an open source platform of Google has become one of the most popular Operating Systems. Android is mainly used in smartphones and tablets.
Security Implications of iOS
by Kiel Wadner - August 4, 2011
In the last two years, smartphone market penetration has gone from 16% to 23% (Kellog, 2010).
Securely Integrating iOS Devices into the Business Environment
by Joshua Brower - June 15, 2011
iOS is the name of Apples mobile operating system. Previous to June 2010, it was known as the iPhone OS. Released in the summer of 2007, the first generation iPhone OS was a spectacular hit in the blackberry-dominated smartphone market.
Malicious Android Applications: Risks and Exploitation
by Joany Boutet - December 22, 2010
Android is an open-source mobile operating system, based upon a modified version of the Linux kernel, initially developed by Android Inc., a firm purchased by Google in 2005. A Gartner study released on November 2010 outlined that Android has become the second-most popular OS in the world (Gartner, 11/2010). The growth of Android has exceeded their previous study, released last year, in which they had predicted that Android will be the No.2 worldwide mobile operating system in 2012 (The H, 08/10/2009). According to another Gartner study (Gartner, 08/2010)., there will be only a slight difference between Symbian and Android market share in 2014: 30.2% for Symbian against 29.6% for Android.
Wireless Mobile Security
by Erik Couture - December 3, 2010
Mobile Security: Current threats and emerging protective measures
Security Policy for the use of handheld devices in corporate environments
by Nicolas Guerin - June 24, 2008
The use of handheld devices is increasing in corporate environments, providing mobile services and constant connectivity to mobile workers. Due to the fact that handheld devices are recent and not yet properly managed, they present new threats to corporate assets. Handheld devices combine security challenges posed by laptops, removable storage (e.g. USB keys), and cameras.
Auditing Nokia Communicator 9500 in Enterprise Context
by Leonard Ong - May 17, 2005
Companies' confidential information can be stored in the device, and a compromise on the device will pose risks to companies. The paper aims to describe an audit on Nokia Communicator 9500 implementation in Enterprise context.
The PDA as a Threat Vector
by Richard Price - May 8, 2003
This paper addresses the threat to information security posed by the PDA (including related devices such as smartphones).
Wireless Security: Blackberry by Research In Motion
by Jeff Danielson - February 18, 2002
This paper presents an introduction to the Blackberry Wireless Email devices as well as suggestions to help Information Security Professionals minimize the risk of using such devices
The Dilemma of PDA Security: An Overview
by Daniel Lyon - January 16, 2002
This paper examines the security vulnerabilities of PDAs and various tools to secure hand-held devices.
Securing PDAs in the Health Care Environment
by Sarah Blanton - September 6, 2001
This paper discusses the ways to secure PDAs, especially for use in the health care industry.
PDAs in the Corporate Environment
by Dave Croxton - September 5, 2001
This paper examines the security concerns of the PDA Operating Systems Palm and Windows CE ("Pocket PC").
Security Vulnerabilities in the Palm OS version 3.x
by Laura Thomas - July 24, 2001
This article will examine the security features standard with the Palm OS(R) version 3.x, their vulnerabilities, and some alternative security software which help remedy these vulnerabilities. The classic ideals of information security apply to a Palm device as well as to a network.
Pocket PC - Secure or Unsecured?
by Darrin Murriner - July 6, 2001
This paper examines some of the steps that can be taken to secure the information stored on PDAs.
Handheld Security: A Layered Approach
by Nelson Beach - June 25, 2001
This paper describes a four-layered approach to security for mobile computing with a PDA.
Most of the computer security white papers in the Reading Room have been written by students seeking GIAC certification to fulfill part of their certification requirements and are provided by SANS as a resource to benefit the security community at large. SANS attempts to ensure the accuracy of information, but papers are published "as is". Errors or inconsistencies may exist or may be introduced over time as material becomes dated. If you suspect a serious error, please contact email@example.com.
All papers are copyrighted. No re-posting or distribution of papers is permitted.