Wireless Mobile Security

This paper offers an overview of the current threats to mobile system data confidentiality, availability and integrity. It will present the data-centric security model as a key enabler for secure personal and business use of mobile devices. Finally, the incident handling model will be applied...
By Erik Couture
December 3, 2010

All papers are copyrighted. No re-posting of papers is permitted