Conclusion: Mobile Wireless Computing
Wireless PDA devices have really proliferated in the IT community. The
applications of these devices are essential to doing business today. In
order to effectively access the wealth of information in corporate databases,
wireless connectivity from your PDA is a must. However, security
is a big concern for these types of applications.
Every day you hear about new wireless exploits that hackers are creating
to circumvent security measures and access protected information
on a corporate intranet. Any compromise in access will undoubtedly
reduce your ability to do business.
The goal of this chapter has been to describe all the possible vulnerabilities
that exist for Palm and PocketPC devices. If you understand the
problems that can result from these devices, you can learn to add precautions
to protect your ability to access networked resources.
An ounce of prevention is often enough to help you prevent handheld
device security problems. Make certain that your handheld device is protected
as described in this chapter, so that you can be certain you are
armed to defend yourself against hackers attempting to compromise the
security of your mobile device. 301
285 times read
|No matching news for this article
Did you enjoy this article?
(total 0 votes)