Mobile-Identity Management

Every day, employees access email and other business applications through handheld devices. More and more business applications support mobile-device interfaces. The challenge for developers today is not only getting content to the mobile device but also securing the device. Threats to mobile devices include the following:

  • Identity theft via a lost or stolen device

  • Eavesdropping on data communications

  • Surveillance of confidential screen content

  • Phishing of content from rogue sites

  • Man-in-the-middle attacks through intercepted signals

  • Inadequate device resources to provide a strong security implementation

  • Social attacks on unaware users that yield identity information

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset