Master's Thesis from the year 2011 in the subject Computer Science - IT-Security, grade: 75, Royal Holloway, University of London, course: M.Sc. Information Security, language: English, abstract: Smartphones have been widely accepted by mass market users and enterprise users. However, the threats related to Smartphones have also emerged. Smartphones carry substantial amount of sensitive data. There have been successful attacks in the wild on jail broken phones. Smartphones needs to be treated like a computer and has to be secured from all type of attacks. There are proof of concept attacks on Apple iOS and Google Android. This project aims to analyse some attacks on Smartphones and possible solutions to defend the attacks. This project also uses a proof of concept malware for testing antivirus software.
Die Inhaltsangabe kann sich auf eine andere Ausgabe dieses Titels beziehen.
Master's Thesis from the year 2011 in the subject Computer Science - IT-Security, grade: 75, Royal Holloway, University of London, course: M.Sc. Information Security, language: English, abstract: Smartphones have been widely accepted by mass market users and enterprise users. However, the threats related to Smartphones have also emerged. Smartphones carry substantial amount of sensitive data. There have been successful attacks in the wild on jail broken phones. Smartphones needs to be treated like a computer and has to be secured from all type of attacks. There are proof of concept attacks on Apple iOS and Google Android. This project aims to analyse some attacks on Smartphones and possible solutions to defend the attacks. This project also uses a proof of concept malware for testing antivirus software.
Master's Thesis from the year 2011 in the subject Computer Science - IT-Security, grade: 75, Royal Holloway, University of London, course: M.Sc. Information Security, language: English, comment: The project is an attempt to explain answers to the below question. Are Anti-virus products effective on devices that run Android and iOS? Why should organizations have a Mobile Device Management in place for BYOD security? Why jail-broken or rooted phones should not be allowed to connect to enterprise networks? How is Android and iOS different from conventional computer OS Windows? , abstract: Smartphones have been widely accepted by mass market users and enterprise users. However, the threats related to Smartphones have also emerged. Smartphones carry substantial amount of sensitive data. There have been successful attacks in the wild on jail broken phones. Smartphones needs to be treated like a computer and has to be secured from all type of attacks. There are proof of concept attacks on Apple iOS and Google Android. This project aims to analyse some attacks on Smartphones and possible solutions to defend the attacks. This project also uses a proof of concept malware for testing antivirus software.
„Über diesen Titel“ kann sich auf eine andere Ausgabe dieses Titels beziehen.
Gratis für den Versand innerhalb von/der Deutschland
Versandziele, Kosten & DauerAnbieter: preigu, Osnabrück, Deutschland
Taschenbuch. Zustand: Neu. Potential for Data Loss from Security Protected Smartphones | Investigate how to use protective security measures from the PC world to secure Smartphones | Vikas Rajole | Taschenbuch | 60 S. | Englisch | 2013 | GRIN Verlag | EAN 9783656437895 | Verantwortliche Person für die EU: BoD - Books on Demand, In de Tarpen 42, 22848 Norderstedt, info[at]bod[dot]de | Anbieter: preigu. Artikel-Nr. 105901924
Anzahl: 5 verfügbar
Anbieter: AHA-BUCH GmbH, Einbeck, Deutschland
Taschenbuch. Zustand: Neu. Druck auf Anfrage Neuware - Printed after ordering - Master's Thesis from the year 2011 in the subject Computer Science - IT-Security, grade: 75, Royal Holloway, University of London, course: M.Sc. Information Security, language: English, abstract: Smartphones have been widely accepted by mass market users and enterprise users.However, the threats related to Smartphones have also emerged. Smartphones carry substantialamount of sensitive data. There have been successful attacks in the wild on jail broken phones.Smartphones needs to be treated like a computer and has to be secured from all type of attacks.There are proof of concept attacks on Apple iOS and Google Android. This project aims toanalyse some attacks on Smartphones and possible solutions to defend the attacks. This projectalso uses a proof of concept malware for testing antivirus software. Artikel-Nr. 9783656437895
Anzahl: 1 verfügbar