摘要 :
The modern era of computing has been shaped by the mobility revolution. Desktops are beginning to fade in prominence as laptops, netbooks, ultrabooks, and other portable computers take over.
摘要 :
Mobile device forensics is the science of recovering digital evidence from a mobile device under forensically sound conditions using accepted methods. Mobile device forensics is an evolving specialty in the field of digital forens...
展开
Mobile device forensics is the science of recovering digital evidence from a mobile device under forensically sound conditions using accepted methods. Mobile device forensics is an evolving specialty in the field of digital forensics. This guide attempts to bridge the gap by providing an in-depth look into mobile devices and explaining technologies involved and their relationship to forensic procedures. This document covers mobile devices with features beyond simple voice communication and text messaging capabilities. This guide also discusses procedures for the validation, preservation, acquisition, examination, analysis, and reporting of digital information.
收起
摘要 :
The Mobility Capability Package describes the Enterprise Mobility Architecture, a layered security approach for using commercial devices and networks to securely connect mobile users to the Government enterprise. This release focu...
展开
The Mobility Capability Package describes the Enterprise Mobility Architecture, a layered security approach for using commercial devices and networks to securely connect mobile users to the Government enterprise. This release focuses on using smartphones and commercial cellular networks to provide a secure voice capability and web-arbitrated services with non-resident data.
收起
摘要 :
Mobile Devices (MDs) such as Personal Digital Assistants (PDAs), smart phones, handheld personal computers, and Tablet PCs, are proliferating in the marketplace. Cheap and ubiquitous mobile computing devices represent computings f...
展开
Mobile Devices (MDs) such as Personal Digital Assistants (PDAs), smart phones, handheld personal computers, and Tablet PCs, are proliferating in the marketplace. Cheap and ubiquitous mobile computing devices represent computings fifth wave (1), bringing about new opportunities in the marketplace. As MDs become more powerful and commonplace with ubiquitous connectivity, the line that currently divides these handheld devices from typical network computers will become very unclear. Mobile devices have become integrated into the business processes of both government and commercial institutions. MDs are small, portable, and able to store large amounts of information. The breadth of communication options (infrared, wireless, docking station) for MDs introduces many security risks. Some of the problems associated with MDs are: easy to loose, misplace, or have stolen, potential loss/comprise of company data (user ids, passwords, contacts, sensitive documentation, credit card numbers), increases the opportunity for a backdoor into an enterprises network, lack of authentication and limited logging capability. The use of these devices poses a risk to the security of an organization.
收起
摘要 :
The On-Device Dynamic Analysis of Mobile Applications (ODAMA) project was started in an effort to protect mobile devices used in Industrial Control Systems (ICS) from cyber attack. Because mobile devices hide as much of the comput...
展开
The On-Device Dynamic Analysis of Mobile Applications (ODAMA) project was started in an effort to protect mobile devices used in Industrial Control Systems (ICS) from cyber attack. Because mobile devices hide as much of the computer as possible, the user's ability to assess the software running on their system is limited. The research team chose Google's Android platform for this initial research because it is open source and it would give us freedom in our approach, including the ability to modify the mobile devices operating system itself. The research team concluded that a Privileged Application was the right approach, and the result was ODAMA. This project is an important piece of the work to secure the expanding use of mobile devices within our nation's critical infrastructure.
收起
摘要 :
Today's mobile devices, especially mobile phones, are comparable in computing capability and storage to the desktop computers of a few years ago. Tbe volume and diversity of the information kept on mobile devices has continually i...
展开
Today's mobile devices, especially mobile phones, are comparable in computing capability and storage to the desktop computers of a few years ago. Tbe volume and diversity of the information kept on mobile devices has continually increased and users have taken advantage of this. Since information is being stored on multiple devices, searching for and retrieving tbe desired information has become an important function. This tbesis focuses on search witb regard to Personal Information Management (PIM) on mobile devices. A search system which involves different types of mobile devices is also introduced.
收起