Changes between Version 2 and Version 3 of Other/Summer/2015/fSec


Ignore:
Timestamp:
Jun 18, 2015, 2:23:29 PM (9 years ago)
Author:
sidhikaV
Comment:

Legend:

Unmodified
Added
Removed
Modified
  • Other/Summer/2015/fSec

    v2 v3  
    44
    55=== Introduction ===
    6 {{{Mobile security or mobile phone security has become increasingly important in mobile computing. It is of particular concern as it relates to the security of personal and business information now stored on smartphones.
    7 More and more users and businesses employ smartphones as communication tools, but also as a means of planning and organizing their work and private life. Within companies, these technologies are causing profound changes in the organization of information systems and therefore they have become the source of new risks. Indeed, smartphones collect and compile an increasing amount of sensitive information to which access must be controlled to protect the privacy of the user and the intellectual property of the company.}}}
     6Mobile security or mobile phone security has become increasingly important in mobile computing. It is of particular concern as it relates to the security of personal and business information now stored on smartphones.
     7More and more users and businesses employ smartphones as communication tools, but also as a means of planning and organizing their work and private life. Within companies, these technologies are causing profound changes in the organization of information systems and therefore they have become the source of new risks. Indeed, smartphones collect and compile an increasing amount of sensitive information to which access must be controlled to protect the privacy of the user and the intellectual property of the company.
    88
    99'''Threats and Attacks''':