Skip to Main Content
Information Security Management Handbook, Volume 7, 6th Edition
book

Information Security Management Handbook, Volume 7, 6th Edition

by Richard O'Hanley, James S. Tiller
August 2013
Intermediate to advanced content levelIntermediate to advanced
434 pages
15h 17m
English
Auerbach Publications
Content preview from Information Security Management Handbook, Volume 7, 6th Edition
60 ◾  Information Security Management Handbook
Android OS has been a target for malware writers and hackers for some time now and many
enterprises still do not prefer Android for enterprise usage due to reported major vulnerabili-
ties. ere are specific websites (http://www.cvedetails.com) that highlight some of the major
vulnerabilities found in Android OS. Most vulnerabilities found in Android revolves around
access bypass and privilege escalation. Some of the common malwares found on Android are
Zitmo Android Edition mobile version of banking malware (Zeus).
3
Data at rest: Applications might store user data such as passwords to applications such as Facebook
locally on mobile phones. In case of a device theft or unauthorized access, it ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Information Security Management Handbook, Volume 5, 6th Edition

Information Security Management Handbook, Volume 5, 6th Edition

Micki Krause Nozaki, Harold F. Tipton
Information Security for Managers

Information Security for Managers

Michael Workman, Daniel C. Phelps, John N. Gathegi

Publisher Resources

ISBN: 9781466567498