Implementing Information Security Based on ISO 27001 and ISO 17799: A Management Guide
Implementing Information Security Based on ISO 27001 and ISO 17799: A Management Guide
Management Of Information Security, 2/E
Management Of Information Security, 2/E
Four billion little brothers?: privacy, mobile phones, and ubiquitous data collection
Communications of the ACM - Scratch Programming for All
Security of Mobile Communications
Security of Mobile Communications
The coming African tsunami of information insecurity
Communications of the ACM
SP 800-94. Guide to Intrusion Detection and Prevention Systems (IDPS)
SP 800-94. Guide to Intrusion Detection and Prevention Systems (IDPS)
Hi-index | 0.00 |
The most technologically advanced mobile devices are changing communications and the way we access data and information. The number of people who use mobile devices is rising exponentially, even in countries of the third world - at the same time, information security is decreasing (Best, Smyth, Etherton and Wornyo, 2010; Goodman and Harris, 2010). Mobile devices are under attack from various threats. These threats can act individually or in combinations (blended threats). The risk is greatest, when a user accesses corporate information systems via mobile devices and public networks. Users are becoming more aware of the importance of information security. Providers of security software have already perceived the need to implement control over the transfer of data from the Internet to mobile devices. Users are usually the weakest link in information security. Each corporation with its own information system should implement internal safety standards and regulate the use of mobile devices, software, protocols and public networks. It is crucial to constantly educate users about information security and measures to protect private and corporate data.