Home / Mobile / MOBILE DEVICE ATTACKS
MOBILE DEVICE ATTACKS

MOBILE DEVICE ATTACKS

A recent information security challenges is the number of mobile devices ranging from USB flash drives to laptops that are infected with malware outside of a security perimeter, and then carried into an organization.

Traditional network based protection, such as the firewalls and intrusion detection systems, are powerless to prevent the initial attacks.

Mobile device defenses

Defenses include administration controls such as restricting the use of mobile devices via policy.

Technical controls to mitigate infected mobile computers include requiring authentication at OSI model Layer 2 via 802.1X. 802.1X authentication may be bundled with additional security functionality, such as verification of current patches and antivirus signature.

Another mobile device security concern is the loss or theft of a mobile device, which threatens the confidentiality, integrity, and availability of the device and the data that resides on it.

Backups can assure the availability and integrity of the mobile data.

Full disk encryption (also which is known as whole disk encryption) ensures the confidentiality of mobile device data.

Remote wipe capability is another critical control, which describes the ability to erase and sometimes disable a mobile device that is lost or stolen.

About Jahanzaib Khan

A Passionate Bloggers from Pakistan, Who Loves to Put Content That Talks About The Reality of Current Situations.

Check Also

(Samsung): How to Install One UI Beta on Galaxy S9, S9 Plus And Note 9

(Samsung): How to Install One UI Beta on Galaxy S9, S9 Plus And Note 9

Recently Samsung His Announced It’s New Quality Update One UI Beta And Android Nine Pie, …

2 comments

  1. I don’t even know how I ended up here, but I thought this post was great. I don’t know who you are but certainly you are going to a famous blogger if you aren’t already 😉 Cheers!

  2. Very nice post. I just stumbled upon your blog and wanted to say that I’ve really enjoyed browsing your blog posts. In any case I’ll be subscribing to your feed and I hope you write again soon!

Leave a Reply

Your email address will not be published. Required fields are marked *