Cell phones and Personal Digital Assistants (PDAs) have become indispensable tools for todayAis highly mobile workforce. Small and relatively inexpensive, these devices can be used not only for voice calls, simple text messages, and Personal Information Management (PIM), but also for many functions done at a desktop computer. While these devices provide productivity benefits, they also pose new risks. This document is intended to assist organizations in securing cell phones and PDAs. More specifically, this document describes in detail the threats faced by organizations that employ handheld devices and the measures that can be taken to counter those threats.Under the GSM framework, a cellular phone is referred to as a Mobile Station and is partitioned into two distinct components: the ... Rights are assigned to a subscriber through four to eight digit Personal Identification Number (PIN) codes.
|Title||:||Guidelines on Cell Phone and PDA Security|
|Publisher||:||DIANE Publishing - 2009-08|