Symbian3/SDK/Source/GUID-68BBBA98-BDF7-4562-8168-5E90C73ADCF8.dita
changeset 8 ae94777fff8f
parent 7 51a74ef9ed63
child 13 48780e181b38
equal deleted inserted replaced
7:51a74ef9ed63 8:ae94777fff8f
    13 security</title><prolog><metadata><keywords/></metadata></prolog><conbody>
    13 security</title><prolog><metadata><keywords/></metadata></prolog><conbody>
    14 <p>The superior mobility and connectivity of mobile devices constitutes
    14 <p>The superior mobility and connectivity of mobile devices constitutes
    15 their greatest threat, and allows intruders to try different attack methods
    15 their greatest threat, and allows intruders to try different attack methods
    16 against the device. The figure below illustrates the most common methods of
    16 against the device. The figure below illustrates the most common methods of
    17 attack against mobile devices.</p>
    17 attack against mobile devices.</p>
    18 <fig id="GUID-2839B915-A025-4404-96A8-B9354F9E5A9F"><title>Mobile device and common attack methods</title><image href="GUID-A9E610B7-505C-41C4-9079-BC83C094982E_d0e10566_href.png"/></fig>
    18 <fig id="GUID-2839B915-A025-4404-96A8-B9354F9E5A9F"><title>Mobile device and common attack methods</title><image href="GUID-A9E610B7-505C-41C4-9079-BC83C094982E_d0e11841_href.png"/></fig>
    19 <p>Due to the nature of mobile devices, including the potential vulnerabilities
    19 <p>Due to the nature of mobile devices, including the potential vulnerabilities
    20 mentioned above, you should consider the following points when designing your
    20 mentioned above, you should consider the following points when designing your
    21 application:</p>
    21 application:</p>
    22 <ul>
    22 <ul>
    23 <li><p>If a mobile device is lost or stolen, confidential information
    23 <li><p>If a mobile device is lost or stolen, confidential information