Symbian3/PDK/Source/GUID-68BBBA98-BDF7-4562-8168-5E90C73ADCF8.dita
changeset 5 f345bda72bc4
parent 3 46218c8b8afa
child 9 59758314f811
equal deleted inserted replaced
4:4816d766a08a 5:f345bda72bc4
    13 security</title><prolog><metadata><keywords/></metadata></prolog><conbody>
    13 security</title><prolog><metadata><keywords/></metadata></prolog><conbody>
    14 <p>The superior mobility and connectivity of mobile devices constitutes
    14 <p>The superior mobility and connectivity of mobile devices constitutes
    15 their greatest threat, and allows intruders to try different attack methods
    15 their greatest threat, and allows intruders to try different attack methods
    16 against the device. The figure below illustrates the most common methods of
    16 against the device. The figure below illustrates the most common methods of
    17 attack against mobile devices.</p>
    17 attack against mobile devices.</p>
    18 <fig id="GUID-2839B915-A025-4404-96A8-B9354F9E5A9F"><title>Mobile device and common attack methods</title><image href="GUID-A9E610B7-505C-41C4-9079-BC83C094982E_d0e7933_href.png"/></fig>
    18 <fig id="GUID-2839B915-A025-4404-96A8-B9354F9E5A9F"><title>Mobile device and common attack methods</title><image href="GUID-A9E610B7-505C-41C4-9079-BC83C094982E_d0e12153_href.png"/></fig>
    19 <p>Due to the nature of mobile devices, including the potential vulnerabilities
    19 <p>Due to the nature of mobile devices, including the potential vulnerabilities
    20 mentioned above, you should consider the following points when designing your
    20 mentioned above, you should consider the following points when designing your
    21 application:</p>
    21 application:</p>
    22 <ul>
    22 <ul>
    23 <li><p>If a mobile device is lost or stolen, confidential information
    23 <li><p>If a mobile device is lost or stolen, confidential information
    38 <p>In the continuously evolving digital world, every application should
    38 <p>In the continuously evolving digital world, every application should
    39 have a certain level of robustness against a changing and hostile environment.
    39 have a certain level of robustness against a changing and hostile environment.
    40 Applications should be prepared for data corruption and alteration, network
    40 Applications should be prepared for data corruption and alteration, network
    41 and storage blackouts, plug-ins and components that misbehave, malicious attackers,
    41 and storage blackouts, plug-ins and components that misbehave, malicious attackers,
    42 and, perhaps most importantly, user errors.</p>
    42 and, perhaps most importantly, user errors.</p>
    43 <p>The Symbian <xref href="jar:GUID-35228542-8C95-4849-A73F-2B4F082F0C44.jar!/sdk/doc_source/guide/platsecsdk/index.html" format="application/java-archive">platform security</xref> architecture
    43 <p>The Symbian <xref href="GUID-4BFEDD79-9502-526A-BA7B-97550A6F0601.dita">platform
    44 is designed to protect mobile devices and their contents.</p>
    44 security</xref> architecture is designed to protect mobile devices and their
       
    45 contents.</p>
    45 <p>For more details, see <xref href="GUID-9058F379-C495-4B22-B270-FF6A80E450B8.dita">Device
    46 <p>For more details, see <xref href="GUID-9058F379-C495-4B22-B270-FF6A80E450B8.dita">Device
    46 security mechanisms</xref>.</p>
    47 security mechanisms</xref>.</p>
    47 </conbody></concept>
    48 </conbody></concept>