Symbian3/PDK/Source/GUID-68BBBA98-BDF7-4562-8168-5E90C73ADCF8.dita
author Dominic Pinkman <Dominic.Pinkman@Nokia.com>
Tue, 30 Mar 2010 11:56:28 +0100
changeset 5 f345bda72bc4
parent 3 46218c8b8afa
child 9 59758314f811
permissions -rw-r--r--
Week 12 contribution of PDK documentation_content. See release notes for details. Fixes Bug 2054, Bug 1583, Bug 381, Bug 390, Bug 463, Bug 1897, Bug 344, Bug 1319, Bug 394, Bug 1520, Bug 1522, Bug 1892"

<?xml version="1.0" encoding="utf-8"?>
<!-- Copyright (c) 2007-2010 Nokia Corporation and/or its subsidiary(-ies) All rights reserved. -->
<!-- This component and the accompanying materials are made available under the terms of the License 
"Eclipse Public License v1.0" which accompanies this distribution, 
and is available at the URL "http://www.eclipse.org/legal/epl-v10.html". -->
<!-- Initial Contributors:
    Nokia Corporation - initial contribution.
Contributors: 
-->
<!DOCTYPE concept
  PUBLIC "-//OASIS//DTD DITA Concept//EN" "concept.dtd">
<concept id="GUID-68BBBA98-BDF7-4562-8168-5E90C73ADCF8" xml:lang="en"><title>Device
security</title><prolog><metadata><keywords/></metadata></prolog><conbody>
<p>The superior mobility and connectivity of mobile devices constitutes
their greatest threat, and allows intruders to try different attack methods
against the device. The figure below illustrates the most common methods of
attack against mobile devices.</p>
<fig id="GUID-2839B915-A025-4404-96A8-B9354F9E5A9F"><title>Mobile device and common attack methods</title><image href="GUID-A9E610B7-505C-41C4-9079-BC83C094982E_d0e12153_href.png"/></fig>
<p>Due to the nature of mobile devices, including the potential vulnerabilities
mentioned above, you should consider the following points when designing your
application:</p>
<ul>
<li><p>If a mobile device is lost or stolen, confidential information
(for example, calendar and contacts) can be read even by those with little
expertise.</p></li>
<li><p>Users can access confidential information and files at any
time, including reverse engineering of software and algorithms.</p></li>
<li><p>Data can be transferred from and to the mobile device through
different methods, even accidentally. </p></li>
<li><p>Users may detach removable media or the battery at any time,
which can cause data loss or corruption.</p></li>
</ul>
<p>When you handle confidential information in your application, remember
that with sufficient motivation and resources there are always ways to extract
information from a mobile device. As the level of software security improves
and attacks become less practical, interest in hardware attacks may in turn
increase.</p>
<p>In the continuously evolving digital world, every application should
have a certain level of robustness against a changing and hostile environment.
Applications should be prepared for data corruption and alteration, network
and storage blackouts, plug-ins and components that misbehave, malicious attackers,
and, perhaps most importantly, user errors.</p>
<p>The Symbian <xref href="GUID-4BFEDD79-9502-526A-BA7B-97550A6F0601.dita">platform
security</xref> architecture is designed to protect mobile devices and their
contents.</p>
<p>For more details, see <xref href="GUID-9058F379-C495-4B22-B270-FF6A80E450B8.dita">Device
security mechanisms</xref>.</p>
</conbody></concept>