Blackberry JAVA DEVELOPMENT ENVIRONMENT - - FUNDAMENTALS GUIDE Dokumentacja Strona 4

  • Pobierz
  • Dodaj do moich podręczników
  • Drukuj
  • Strona
    / 39
  • Spis treści
  • BOOKMARKI
  • Oceniono. / 5. Na podstawie oceny klientów
Przeglądanie stron 3
White Paper: Symantec Security Response
Worm.........................................................................................................................................................22
Mitigation.................................................................................................................................................23
PIM Data (Personal Information Manager Data)..........................................................................................24
Data Theft.................................................................................................................................................25
Loss of data availability and integrity......................................................................................................25
Mitigation.................................................................................................................................................25
TCP/IP Connections.......................................................................................................................................25
Proxy/Firewall Bypass..............................................................................................................................26
Backdoor...................................................................................................................................................27
Port Scan...................................................................................................................................................27
Mitigation.................................................................................................................................................27
Port Scan...................................................................................................................................................28
HTTP / WAP....................................................................................................................................................28
Data Theft.................................................................................................................................................28
Backdoor.............................................................................................................................................28
HTTP Proxy................................................................................................................................................29
Mitigation.................................................................................................................................................29
Telephony......................................................................................................................................................30
Call Record Monitoring.............................................................................................................................31
Premium Rate Calls..................................................................................................................................31
Bypassing Caller Verification Systems.....................................................................................................31
Telephony Data Theft................................................................................................................................32
Mitigation.................................................................................................................................................32
Camera..........................................................................................................................................................33
Mitigation.................................................................................................................................................33
Conclusions.......................................................................................................................................................33
Appendix A.........................................................................................................................................................35
References.........................................................................................................................................................36
4
Attack Surface
Analysis of
BlackBerry Devices
Przeglądanie stron 3
1 2 3 4 5 6 7 8 9 ... 38 39

Komentarze do niniejszej Instrukcji

Brak uwag