O'Reilly logo

Mobile Computing Deployment and Management: Real World Skills for CompTIA Mobility+ Certification and Beyond by Robert J. Bartz

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 15Mobile Device Security Threats and Risks

Mobile devices have their share of risks and threats associated with the technology. The risks can be with wireless (radio ­frequency) technology, software, hardware, and within the organization itself. This chapter will explore some of the threats that fall under each of these risk categories. Keep in mind that many of the threats discussed here are not limited to wireless technology; they are threats that you may already be familiar with from other networking technologies. ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required