Difference between revisions of "What kind of security threats will be there for mobile technology (virusses, eavesdropping, ...)?"

From ScenarioThinking
Jump to navigation Jump to search
(New page: An attacker might want to gain access to an electronic message for numerous reasons. Gaining unauthorised access to information in order to violate someone's privacy, impersonating another...)
 
Line 2: Line 2:




blalbbal
blalbbal Under construction
<b>Source:</b> http://upetd.up.ac.za/thesis/available/etd-07202004-111814/unrestricted/00dissertation.pdf
<b>Source:</b> http://upetd.up.ac.za/thesis/available/etd-07202004-111814/unrestricted/00dissertation.pdf
<br><br><br><br>
<br><br><br><br>
<p align="right">''Go back to [[Next_generation_mobile_devices_2015]]''</p>
<p align="right">''Go back to [[Next_generation_mobile_devices_2015]]''</p>

Revision as of 16:56, 21 April 2008

An attacker might want to gain access to an electronic message for numerous reasons. Gaining unauthorised access to information in order to violate someone's privacy, impersonating another user in order to shift the responsibility or originate


blalbbal Under construction Source: http://upetd.up.ac.za/thesis/available/etd-07202004-111814/unrestricted/00dissertation.pdf



Go back to Next_generation_mobile_devices_2015