Talk With an Expert

Wireless Mobile Security

Wireless Mobile Security (PDF, 1.96MB)Published: 03 Dec, 2010
Created by
Erik Couture

This paper offers an overview of the current threats to mobile system data confidentiality, availability and integrity. It will present the data-centric security model as a key enabler for secure personal and business use of mobile devices. Finally, the incident handling model will be applied against mobile device security events in order to assess the model against this relatively new threat vector to the enterprise computing environment.