Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more ➡
Download
Standard view
Full view
of .
Add note
Save to My Library
Sync to mobile
Look up keyword
Like this
9Activity
×
0 of .
Results for:
No results containing your search query
P. 1
b Symantec Smart Phone Honey Stick Project.en Us

b Symantec Smart Phone Honey Stick Project.en Us

Ratings: (0)|Views: 24,993|Likes:
Published by Kate Freeman

More info:

Categories:Types, Research
Published by: Kate Freeman on Mar 10, 2012
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See More
See less

11/08/2012

pdf

text

original

 
The Symantec Smartphone Honey Stick Project
 
2
| The Symantec Smartphone Honey Stick Project
CONTENTS
Executive Summary...............................................................3Introduction .....................................................................4Objectives........................................................................6Methodology.....................................................................8Key Findings ....................................................................11Expanded Findings and Conclusions...............................................12Recommendations...............................................................14About the Researcher ............................................................16About Symantec.................................................................16Appendix .......................................................................17
 
3
| The Symantec Smartphone Honey Stick Project
Executive Summary
The Symantec Smartphone Honey Stick Project is an experiment involving 50 “lost”smartphones. Before the smartphones were intentionally lost, a collection of simulatedcorporate and personal data was placed on them, along with the capability to remotelymonitor what happened to them once they were found.Chief among the findings is that there is a very high likelihood attempts to accessboth sensitive personal- and business-related information will be made if a lost andunprotected smartphone is found by a stranger. Secondarily, the owner of a lostsmartphone should not assume the finder of their device will attempt to make contactwith them. Even when contact is made, the owner of the device should not assume theirpersonal- or business-related information has not been violated.The goal of this research is to show what smartphone users should expect to happenon their phones if they are lost and then found by a stranger. In today’s world, bothconsumers and corporations need to be concerned with protecting the sensitiveinformation on mobile devices. While devices can be replaced, the information stored andaccessed on them is at risk unless users and businesses take precautions to protect it.
Sites Visited by Lost Smartphone #N2
 

Activity (9)

You've already reviewed this. Edit your review.
1 thousand reads
1 hundred reads
Vespa998 liked this

You're Reading a Free Preview

Download
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->