diff -r 000000000000 -r 89d6a7a84779 Symbian3/SDK/Source/GUID-68BBBA98-BDF7-4562-8168-5E90C73ADCF8.dita --- /dev/null Thu Jan 01 00:00:00 1970 +0000 +++ b/Symbian3/SDK/Source/GUID-68BBBA98-BDF7-4562-8168-5E90C73ADCF8.dita Thu Jan 21 18:18:20 2010 +0000 @@ -0,0 +1,47 @@ + + + + + +Device +security +

The superior mobility and connectivity of mobile devices constitutes +their greatest threat, and allows intruders to try different attack methods +against the device. The figure below illustrates the most common methods of +attack against mobile devices.

+Mobile device and common attack methods +

Due to the nature of mobile devices, including the potential vulnerabilities +mentioned above, you should consider the following points when designing your +application:

+ +

When you handle confidential information in your application, remember +that with sufficient motivation and resources there are always ways to extract +information from a mobile device. As the level of software security improves +and attacks become less practical, interest in hardware attacks may in turn +increase.

+

In the continuously evolving digital world, every application should +have a certain level of robustness against a changing and hostile environment. +Applications should be prepared for data corruption and alteration, network +and storage blackouts, plug-ins and components that misbehave, malicious attackers, +and, perhaps most importantly, user errors.

+

The Symbian platform security architecture +is designed to protect mobile devices and their contents.

+

For more details, see Device +security mechanisms.

+
\ No newline at end of file