Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Standard view
Full view
of .
Save to My Library
Look up keyword or section
Like this

Table Of Contents

Glossary and abbreviations
1. Introduction
2. Information security risks
R7. Surveillance attacks
3. Information security opportunities
3.1 Sandboxing and capabilities
3.2 Controlled software distribution
3.3 Remote application removal
4. Information security recommendations
5. Conclusions
6. Appendix: Vulnerabilities
3. Reputation vulnerabilities
6. Ability to unlock phones
6.3 User permissions fatigue
6.5 Weak app distributor authentication mechanisms
6.7 Lack of user awareness
7. References to other related best practice guides
0 of .
Results for:
No results containing your search query
P. 1
ENISA Smart Phone Security

ENISA Smart Phone Security

Ratings: (0)|Views: 112 |Likes:
Published by obweonztnnrdf

More info:

Published by: obweonztnnrdf on Jul 19, 2011
Copyright:Attribution Non-commercial


Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less





You're Reading a Free Preview
Pages 4 to 38 are not shown in this preview.
You're Reading a Free Preview
Pages 42 to 61 are not shown in this preview.

Activity (2)

You've already reviewed this. Edit your review.
1 thousand reads
1 hundred reads

You're Reading a Free Preview

/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->