CHAPTER 4: ENSURING IT’S YOU

Mobile devices tend to be even more personal than personal computers, with even corporate devices holding data closely tied to their owners. With this in mind, this chapter examines the importance of giving access to the right person, by authenticating the user. Particular attention is given to the challenges posed by the current dominance of passwords and PINs, especially in the case of handheld devices that are more vulnerable to loss and theft.

Chapter 2 has already highlighted the risks facing mobile devices in terms of loss and theft while they are on the move. However, it is worth thinking what this would actually mean from the owner’s perspective, and, of course, the answer would rather depend upon the ...

Get Mobile Security: A Pocket Guide now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.