Skip to Content
Wireless and Mobile Device Security, 2nd Edition
book

Wireless and Mobile Device Security, 2nd Edition

by Jim Doherty
March 2021
Intermediate to advanced content levelIntermediate to advanced
400 pages
14h 24m
English
Jones & Bartlett Learning
Content preview from Wireless and Mobile Device Security, 2nd Edition

CHAPTER SUMMARY

The use of application provenance and sandboxing is common among the three main mobile platforms and has proven to be a sound foundation for securing mobile devices. Application provenance helps to ensure that developers and applications are vetted before applications are released. Sandboxing helps ensure that applications are self-contained so that issues with one application do not affect others.

The efficacy of the application provenance model is essentially proven by the fact that the one platform that does not use this model is the one that has the most issues with malware. Also, most issues on those platforms that do use this model are the result of users circumventing provenance control.

Beyond the device-specific security ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Wireless and Mobile Device Security

Wireless and Mobile Device Security

Jim Doherty
Mobile Security and Privacy

Mobile Security and Privacy

Man Ho Au, Raymond Choo

Publisher Resources

ISBN: 9781284211733