O'Reilly logo

Mobile Security: A Pocket Guide by Steven Furnell

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

CHAPTER 4: ENSURING IT’S YOU

Mobile devices tend to be even more personal than personal computers, with even corporate devices holding data closely tied to their owners. With this in mind, this chapter examines the importance of giving access to the right person, by authenticating the user. Particular attention is given to the challenges posed by the current dominance of passwords and PINs, especially in the case of handheld devices that are more vulnerable to loss and theft.

Chapter 2 has already highlighted the risks facing mobile devices in terms of loss and theft while they are on the move. However, it is worth thinking what this would actually mean from the owner’s perspective, and, of course, the answer would rather depend upon the ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required