Cell phones and Personal Digital Assistants (PDAs) have become indispensable tools for todayAis highly mobile workforce. Small and relatively inexpensive, these devices can be used not only for voice calls, simple text messages, and Personal Information Management (PIM), but also for many functions done at a desktop computer. While these devices provide productivity benefits, they also pose new risks. This document is intended to assist organizations in securing cell phones and PDAs. More specifically, this document describes in detail the threats faced by organizations that employ handheld devices and the measures that can be taken to counter those threats.Software and hardware products are available that can be used to recover erased data from the flash memory present in most present-day cell ... by forging or guessing authentication credentials (e.g., a PIN or password) or bypassing the authentication mechanism entirely. ... For example, certain Motorola phones provide aanbsp;...
|Title||:||Guidelines on Cell Phone and PDA Security|
|Publisher||:||DIANE Publishing - 2009-08|