SEC595: Applied Data Science and AI/Machine Learning for Cybersecurity Professionals

Experience SANS training through course previews.
Learn MoreLet us help.
Contact usBecome a member for instant access to our free resources.
Sign UpWe're here to help.
Contact UsJust as mobile or cellular phones evolved from the original wireline telephone system, wireless devices offering Internet Protocol (IP) connectivity are likewise developing. This includes devices such as Personal Digital Assistants (PDA) and handheld computers. This mobile computing should not be confused with portable computing, where computing activities are disrupted when the user changes the computer's point of attachment. Mobile computing continues unbroken as the user or node moves from one link to another. It does this without human intervention and noninteractively. The vocabulary normally used to describe this mobile computing is Mobile IP. The original set of Request for Comments (RFC) describing this model is RFCs 2002 through 2006. The purpose of this white paper is to discuss the security aspects of Mobile IP.