Partitioning Attacks: Or How to Rapidly Clone Some GSM Cards
SP '02 Proceedings of the 2002 IEEE Symposium on Security and Privacy
Denial-of-Service Attacks on Battery-powered Mobile Computers
PERCOM '04 Proceedings of the Second IEEE International Conference on Pervasive Computing and Communications (PerCom'04)
Proceedings of the 3rd international conference on Mobile systems, applications, and services
Smart Cards for mobile devices
International Journal of Information and Computer Security
SP 800-101. Guidelines on Cell Phone Forensics
SP 800-101. Guidelines on Cell Phone Forensics
IEEE Spectrum
Forensic imaging of embedded systems using JTAG (boundary-scan)
Digital Investigation: The International Journal of Digital Forensics & Incident Response
SP 800-144. Guidelines on Security and Privacy in Public Cloud Computing
SP 800-144. Guidelines on Security and Privacy in Public Cloud Computing
Hi-index | 0.00 |
Cell phones and personal digital assistants (PDAs) have become indispensable tools for today's highly mobile workforce. Small and relatively inexpensive, these devices can be used for many functions, including sending and receiving electronic mail, storing documents, delivering presentations, and remotely accessing data. While these devices provide productivity benefits, they also pose new risks to organizations.This document provides an overview of cell phone and PDA devices in use today and offers insights into making informed information technology security decisions on their treatment. The document gives details about the threats and technology risks associated with the use of these devices and the available safeguards to mitigate them. Organizations can use this information to enhance security and reduce incidents involving cell phone and PDA devices.