CHAPTER 4: ENSURING IT’S YOU

Mobile devices tend to be even more personal than personal computers, with even corporate devices holding data closely tied to their owners. With this in mind, this chapter examines the importance of giving access to the right person, by authenticating the user. Particular attention is given to the challenges posed by the current dominance of passwords and PINs, especially in the case of handheld devices that are more vulnerable to loss and theft.

Chapter 2 has already highlighted the risks facing mobile devices in terms of loss and theft while they are on the move. However, it is worth thinking what this would actually mean from the owner’s perspective, and, of course, the answer would rather depend upon the ...

Get Mobile Security: A Pocket Guide now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.