Mobile-Identity Management

Every day, employees access email and other business applications through handheld devices. More and more business applications support mobile-device interfaces. The challenge for developers today is not only getting content to the mobile device but also securing the device. Threats to mobile devices include the following:

  • Identity theft via a lost or stolen device

  • Eavesdropping on data communications

  • Surveillance of confidential screen content

  • Phishing of content from rogue sites

  • Man-in-the-middle attacks through intercepted signals

  • Inadequate device resources to provide a strong security implementation

  • Social attacks on unaware users that yield identity information

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
18.221.182.150