Chapter 10

Hacker Protection and Enforceable Encryption

In This Chapter

arrow Knowing the components of on-device security components

arrow Protecting devices with device-based firewall software

arrow Fighting viruses with device-based antivirus applications

arrow Warding off spam with device-based antispam

arrow Guarding against device intrusion

arrow Defending your communications with device-based encryption

This chapter covers each of the on-device Anti-X protection components, first covered in Chapter 9, in detail. The two important concepts that are the focus of this chapter are hacker protection and enforceable encryption. We discuss various on-device protection capabilities that can be effectively used to defend against hackers. Additionally, you find out the importance of enforceable encryption and discover the tools and techniques available to enable this critical piece of your mobile security arsenal.

Getting ...

Get Mobile Device Security For Dummies now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.