SlideShare una empresa de Scribd logo
1 de 2
Securing Mobile Devices
The latest smartphones are designed to provide broad Internet and
network connectivity through varying channels, such as 3Gor 4G, Wi-
Fi, Bluetooth or a wired connection to a PC. Security threats may occur
in different places along these varying paths where data can be
transmitted. See the figure at next page
Securing Mobile Devices

Más contenido relacionado

La actualidad más candente

Introduction to cybercrime
Introduction to cybercrimeIntroduction to cybercrime
Introduction to cybercrimepatelripal99
 
Maleeff part 2 information security resources university of toronto 11 july...
Maleeff part 2 information security resources   university of toronto 11 july...Maleeff part 2 information security resources   university of toronto 11 july...
Maleeff part 2 information security resources university of toronto 11 july...Stephen Abram
 
Prince banton cybercrime presentation
Prince banton cybercrime presentationPrince banton cybercrime presentation
Prince banton cybercrime presentationPrinceBanton1
 
Stop in the name of norton
Stop in the name of nortonStop in the name of norton
Stop in the name of nortonspkiely
 
NMI15 Filip Chytrý – Internet věcí a jeho potenciální bezpečnostní rizika
NMI15 Filip Chytrý – Internet věcí a jeho potenciální bezpečnostní rizikaNMI15 Filip Chytrý – Internet věcí a jeho potenciální bezpečnostní rizika
NMI15 Filip Chytrý – Internet věcí a jeho potenciální bezpečnostní rizikaNew Media Inspiration
 
Digital Natives
Digital NativesDigital Natives
Digital NativesChauTran09
 
Intro to cybersecurity concepts 20210813
Intro to cybersecurity concepts 20210813Intro to cybersecurity concepts 20210813
Intro to cybersecurity concepts 20210813Kinetic Potential
 
JAVA IEEE projects in secure computing|| secure computing projects 2014-2015 ...
JAVA IEEE projects in secure computing|| secure computing projects 2014-2015 ...JAVA IEEE projects in secure computing|| secure computing projects 2014-2015 ...
JAVA IEEE projects in secure computing|| secure computing projects 2014-2015 ...Cegonsoft Fames
 

La actualidad más candente (18)

Introduction to cybercrime
Introduction to cybercrimeIntroduction to cybercrime
Introduction to cybercrime
 
Maleeff part 2 information security resources university of toronto 11 july...
Maleeff part 2 information security resources   university of toronto 11 july...Maleeff part 2 information security resources   university of toronto 11 july...
Maleeff part 2 information security resources university of toronto 11 july...
 
Prince banton cybercrime presentation
Prince banton cybercrime presentationPrince banton cybercrime presentation
Prince banton cybercrime presentation
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Building internet safety wall understanding the imperatives of national domai...
Building internet safety wall understanding the imperatives of national domai...Building internet safety wall understanding the imperatives of national domai...
Building internet safety wall understanding the imperatives of national domai...
 
Prew14
Prew14Prew14
Prew14
 
Prew14
Prew14Prew14
Prew14
 
Cyber crimes
Cyber crimesCyber crimes
Cyber crimes
 
Emerging web security threats
Emerging web security threatsEmerging web security threats
Emerging web security threats
 
Android IEEE Projects list
Android IEEE Projects listAndroid IEEE Projects list
Android IEEE Projects list
 
Stop in the name of norton
Stop in the name of nortonStop in the name of norton
Stop in the name of norton
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
NMI15 Filip Chytrý – Internet věcí a jeho potenciální bezpečnostní rizika
NMI15 Filip Chytrý – Internet věcí a jeho potenciální bezpečnostní rizikaNMI15 Filip Chytrý – Internet věcí a jeho potenciální bezpečnostní rizika
NMI15 Filip Chytrý – Internet věcí a jeho potenciální bezpečnostní rizika
 
Digital Natives
Digital NativesDigital Natives
Digital Natives
 
Intro to cybersecurity concepts 20210813
Intro to cybersecurity concepts 20210813Intro to cybersecurity concepts 20210813
Intro to cybersecurity concepts 20210813
 
JAVA IEEE projects in secure computing|| secure computing projects 2014-2015 ...
JAVA IEEE projects in secure computing|| secure computing projects 2014-2015 ...JAVA IEEE projects in secure computing|| secure computing projects 2014-2015 ...
JAVA IEEE projects in secure computing|| secure computing projects 2014-2015 ...
 

Destacado

Securing mobile devices in the business environment
Securing mobile devices in the business environmentSecuring mobile devices in the business environment
Securing mobile devices in the business environmentIBM Software India
 
Securing Mobile Devices in the Workplace - Six Tips For Midsize Businesses
Securing Mobile Devices in the Workplace - Six Tips For Midsize BusinessesSecuring Mobile Devices in the Workplace - Six Tips For Midsize Businesses
Securing Mobile Devices in the Workplace - Six Tips For Midsize BusinessesMidmarketIBM
 
Mobile devices ppt
Mobile devices pptMobile devices ppt
Mobile devices pptim_mi
 

Destacado (6)

Securing mobile devices in the business environment
Securing mobile devices in the business environmentSecuring mobile devices in the business environment
Securing mobile devices in the business environment
 
Securing Mobile Devices in the Workplace - Six Tips For Midsize Businesses
Securing Mobile Devices in the Workplace - Six Tips For Midsize BusinessesSecuring Mobile Devices in the Workplace - Six Tips For Midsize Businesses
Securing Mobile Devices in the Workplace - Six Tips For Midsize Businesses
 
Managing and securing mobile devices
Managing and securing mobile devicesManaging and securing mobile devices
Managing and securing mobile devices
 
Smart devices
Smart devicesSmart devices
Smart devices
 
Smart devices
Smart devicesSmart devices
Smart devices
 
Mobile devices ppt
Mobile devices pptMobile devices ppt
Mobile devices ppt
 

Securing Mobile Devices

  • 1. Securing Mobile Devices The latest smartphones are designed to provide broad Internet and network connectivity through varying channels, such as 3Gor 4G, Wi- Fi, Bluetooth or a wired connection to a PC. Security threats may occur in different places along these varying paths where data can be transmitted. See the figure at next page