equal
deleted
inserted
replaced
13 security</title><prolog><metadata><keywords/></metadata></prolog><conbody> |
13 security</title><prolog><metadata><keywords/></metadata></prolog><conbody> |
14 <p>The superior mobility and connectivity of mobile devices constitutes |
14 <p>The superior mobility and connectivity of mobile devices constitutes |
15 their greatest threat, and allows intruders to try different attack methods |
15 their greatest threat, and allows intruders to try different attack methods |
16 against the device. The figure below illustrates the most common methods of |
16 against the device. The figure below illustrates the most common methods of |
17 attack against mobile devices.</p> |
17 attack against mobile devices.</p> |
18 <fig id="GUID-2839B915-A025-4404-96A8-B9354F9E5A9F"><title>Mobile device and common attack methods</title><image href="GUID-A9E610B7-505C-41C4-9079-BC83C094982E_d0e10566_href.png"/></fig> |
18 <fig id="GUID-2839B915-A025-4404-96A8-B9354F9E5A9F"><title>Mobile device and common attack methods</title><image href="GUID-A9E610B7-505C-41C4-9079-BC83C094982E_d0e11841_href.png"/></fig> |
19 <p>Due to the nature of mobile devices, including the potential vulnerabilities |
19 <p>Due to the nature of mobile devices, including the potential vulnerabilities |
20 mentioned above, you should consider the following points when designing your |
20 mentioned above, you should consider the following points when designing your |
21 application:</p> |
21 application:</p> |
22 <ul> |
22 <ul> |
23 <li><p>If a mobile device is lost or stolen, confidential information |
23 <li><p>If a mobile device is lost or stolen, confidential information |