4

Mobile Phones

4.1 Context

The previous discussions concerning WLAN security have centred around classical terminal devices with their corresponding architecture (laptops, PCs, printer). This part shall cover security risks in connection with the usage of mobile phones in its proper sense.

Of interest for further considerations is the fact that mobile phones pose a risk in serving as gateways for attacks on central applications, when employing either their communication functions or certain services that come with these devices. When using a mobile phone both for telephony and WLAN applications at the same time, additional risk potential arise, which will be discussed in more detail in this section, even though this technology is still ...

Get Wireless Network Security, 2nd Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.