Threats to Wireless and Mobile Devices

While the expanded principles of information security are good in a general sense, they are not very instructive with regard to the day-to-day protection of mobile and wireless clients, devices, and networks. This section looks at some specific threats, which are broken into three categories:

  • Data theft
  • Device control
  • System access

These categories will have some overlap, but they cover the full breadth of threats.

Before looking at specific mobile and Wi-Fi threats, it’s important to remember that virtually every threat that exists on wired networks also exists on wireless and mobile networks. In addition to these threats, some threats are specific to wireless and mobile or now have wireless and mobile ...

Get Wireless and Mobile Device Security, 2nd Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.