Computer security is based on the authenticated user, also called "username" to get accountability for user actions and to manage access to resources. The lack of a resource unit of the agent is available to authorized users who have physical access to the device. If a device can be remote access, physical access is not even necessary.
Family access procedure, which usually provides a user ID and password to access the system, formally referred to as the identification and authentication. authentication step is always based on something the user knows, or is', password or card biometric signatures can be used for authentication and the password is a common solution.
Web sites often allow unauthenticated users the means to enable easy access to non-sensitive data or services. As mobile operating systems have adopted the approach to the website, which makes it easy, but based on the user needs to store sensitive information from the device. If you miss a question, any confidential information, are stored, processed or transmitted by the device is not protected. Please note, some mobile devices to encrypt communications, which provides protection during transmission.
In replacement for personal computers is the lack of security in many tablets a significant problem if the use of the tablet without warranty implies something sensible. Users should seriously consider the potential consequences of compromise of the information used on a shelf unsecured.
mobile applications to provide an additional layer of uncertainty that an application with data not supplied by the user is not clear to the user. Users should be aware that applications can store data long after, he was assigned as the data is available to strangers to the user.
Of course, the theft of the device is a problem because the device can also be theft, data theft, and may be due to data theft. users 'awareness of' the impact of these problems requires some training, which is probably unrealistic.
As companies have learned to mobile devices for employees to use, the security team of the company can expect to understand and solve problems involving employees to use information resources company and sensitive assets.
Mobile Computing And An Anonymous User
Labels: Mobile Computing And An Anonymous UserPosted by xena at 6:19 PM
Subscribe to:
Post Comments (Atom)
0 comments:
Post a Comment