An abstract image shows dark and bright shades glowing.

© Elena Kichigina/Shutterstock

CHAPTER 13
Securing Mobile Communications

WITH THE CONVERGENCE OF COMPUTERS and mobile communications devices, the need to secure endpoint devices is growing. The demand for smartphones and personal digital assistants (PDAs) is as great as ever because of functionality that was previously reserved for home or office computer systems, such as email, internet-based banking, and file storage. The popularity of real-time mobile communications, such as texting, tweeting, and sharing of photos, also underscores the need for greater security. As the boundaries of personal and business computing blur and users demand more functionality from mobile devices, the importance of securing endpoint devices will garner more attention.

This chapter covers some of the more popular endpoint devices and communications as well as some of the security risks to those devices and how best to address them.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
13.59.193.151