Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Download
Standard view
Full view
of .
Save to My Library
Look up keyword or section
Like this
2Activity

Table Of Contents

Glossary and abbreviations
1. Introduction
2. Information security risks
R7. Surveillance attacks
3. Information security opportunities
3.1 Sandboxing and capabilities
3.2 Controlled software distribution
3.3 Remote application removal
4. Information security recommendations
5. Conclusions
6. Appendix: Vulnerabilities
3. Reputation vulnerabilities
6. Ability to unlock phones
6.3 User permissions fatigue
6.5 Weak app distributor authentication mechanisms
6.7 Lack of user awareness
7. References to other related best practice guides
Bibliography
0 of .
Results for:
No results containing your search query
P. 1
ENISA Smart Phone Security

ENISA Smart Phone Security

Ratings: (0)|Views: 112 |Likes:
Published by obweonztnnrdf

More info:

Published by: obweonztnnrdf on Jul 19, 2011
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less

11/22/2013

pdf

text

original

You're Reading a Free Preview
Pages 4 to 38 are not shown in this preview.
You're Reading a Free Preview
Pages 42 to 61 are not shown in this preview.

Activity (2)

You've already reviewed this. Edit your review.
1 thousand reads
1 hundred reads

You're Reading a Free Preview

Download
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->