13 security</title><prolog><metadata><keywords/></metadata></prolog><conbody> |
13 security</title><prolog><metadata><keywords/></metadata></prolog><conbody> |
14 <p>The superior mobility and connectivity of mobile devices constitutes |
14 <p>The superior mobility and connectivity of mobile devices constitutes |
15 their greatest threat, and allows intruders to try different attack methods |
15 their greatest threat, and allows intruders to try different attack methods |
16 against the device. The figure below illustrates the most common methods of |
16 against the device. The figure below illustrates the most common methods of |
17 attack against mobile devices.</p> |
17 attack against mobile devices.</p> |
18 <fig id="GUID-2839B915-A025-4404-96A8-B9354F9E5A9F"><title>Mobile device and common attack methods</title><image href="GUID-A9E610B7-505C-41C4-9079-BC83C094982E_d0e7933_href.png"/></fig> |
18 <fig id="GUID-2839B915-A025-4404-96A8-B9354F9E5A9F"><title>Mobile device and common attack methods</title><image href="GUID-A9E610B7-505C-41C4-9079-BC83C094982E_d0e12153_href.png"/></fig> |
19 <p>Due to the nature of mobile devices, including the potential vulnerabilities |
19 <p>Due to the nature of mobile devices, including the potential vulnerabilities |
20 mentioned above, you should consider the following points when designing your |
20 mentioned above, you should consider the following points when designing your |
21 application:</p> |
21 application:</p> |
22 <ul> |
22 <ul> |
23 <li><p>If a mobile device is lost or stolen, confidential information |
23 <li><p>If a mobile device is lost or stolen, confidential information |
38 <p>In the continuously evolving digital world, every application should |
38 <p>In the continuously evolving digital world, every application should |
39 have a certain level of robustness against a changing and hostile environment. |
39 have a certain level of robustness against a changing and hostile environment. |
40 Applications should be prepared for data corruption and alteration, network |
40 Applications should be prepared for data corruption and alteration, network |
41 and storage blackouts, plug-ins and components that misbehave, malicious attackers, |
41 and storage blackouts, plug-ins and components that misbehave, malicious attackers, |
42 and, perhaps most importantly, user errors.</p> |
42 and, perhaps most importantly, user errors.</p> |
43 <p>The Symbian <xref href="jar:GUID-35228542-8C95-4849-A73F-2B4F082F0C44.jar!/sdk/doc_source/guide/platsecsdk/index.html" format="application/java-archive">platform security</xref> architecture |
43 <p>The Symbian <xref href="GUID-4BFEDD79-9502-526A-BA7B-97550A6F0601.dita">platform |
44 is designed to protect mobile devices and their contents.</p> |
44 security</xref> architecture is designed to protect mobile devices and their |
|
45 contents.</p> |
45 <p>For more details, see <xref href="GUID-9058F379-C495-4B22-B270-FF6A80E450B8.dita">Device |
46 <p>For more details, see <xref href="GUID-9058F379-C495-4B22-B270-FF6A80E450B8.dita">Device |
46 security mechanisms</xref>.</p> |
47 security mechanisms</xref>.</p> |
47 </conbody></concept> |
48 </conbody></concept> |