Symbian3/PDK/Source/GUID-68BBBA98-BDF7-4562-8168-5E90C73ADCF8.dita
changeset 12 80ef3a206772
parent 9 59758314f811
child 14 578be2adaf3e
equal deleted inserted replaced
11:5072524fcc79 12:80ef3a206772
    13 security</title><prolog><metadata><keywords/></metadata></prolog><conbody>
    13 security</title><prolog><metadata><keywords/></metadata></prolog><conbody>
    14 <p>The superior mobility and connectivity of mobile devices constitutes
    14 <p>The superior mobility and connectivity of mobile devices constitutes
    15 their greatest threat, and allows intruders to try different attack methods
    15 their greatest threat, and allows intruders to try different attack methods
    16 against the device. The figure below illustrates the most common methods of
    16 against the device. The figure below illustrates the most common methods of
    17 attack against mobile devices.</p>
    17 attack against mobile devices.</p>
    18 <fig id="GUID-2839B915-A025-4404-96A8-B9354F9E5A9F"><title>Mobile device and common attack methods</title><image href="GUID-A9E610B7-505C-41C4-9079-BC83C094982E_d0e13461_href.png"/></fig>
    18 <fig id="GUID-2839B915-A025-4404-96A8-B9354F9E5A9F"><title>Mobile device and common attack methods</title><image href="GUID-A9E610B7-505C-41C4-9079-BC83C094982E_d0e13560_href.png"/></fig>
    19 <p>Due to the nature of mobile devices, including the potential vulnerabilities
    19 <p>Due to the nature of mobile devices, including the potential vulnerabilities
    20 mentioned above, you should consider the following points when designing your
    20 mentioned above, you should consider the following points when designing your
    21 application:</p>
    21 application:</p>
    22 <ul>
    22 <ul>
    23 <li><p>If a mobile device is lost or stolen, confidential information
    23 <li><p>If a mobile device is lost or stolen, confidential information