Blackberry JAVA DEVELOPMENT ENVIRONMENT - - FUNDAMENTALS GUIDE Especificações Página 3

  • Descarregar
  • Adicionar aos meus manuais
  • Imprimir
  • Página
    / 39
  • Índice
  • MARCADORES
  • Avaliado. / 5. Com base em avaliações de clientes
Vista de página 2
White Paper: Symantec Security Response
Contents
Introduction.........................................................................................................................................................5
Architecture Overview.........................................................................................................................................6
Operating System...............................................................................................................................6
Code Signing....................................................................................................................................................6
Modifying Signed Applications...................................................................................................................7
Malicious Code Signing...............................................................................................................................7
Mitigation Strategies.......................................................................................................................................8
BIS Deployment..........................................................................................................................................8
Application Permissions........................................................................................................................8
Device Firewall.....................................................................................................................................10
BES Deployment.......................................................................................................................................10
IT Policy................................................................................................................................................11
Application Control Policy....................................................................................................................11
Application Permissions......................................................................................................................13
Device Firewall.....................................................................................................................................13
Attack Surface Analysis.....................................................................................................................................13
Introduction..................................................................................................................................................13
JAD Files........................................................................................................................................................14
Mitigation.................................................................................................................................................15
File System....................................................................................................................................................15
Persistent Storage....................................................................................................................................15
J2ME File System......................................................................................................................................16
USB Mass Storage.....................................................................................................................................16
Mitigation.................................................................................................................................................17
Memory and Processes.................................................................................................................................17
Auto start-up and Background processes................................................................................................18
SMS (Short Message Service).......................................................................................................................18
Premium Rate Scam.................................................................................................................................18
SMS Interception......................................................................................................................................19
SMS Backdoor...........................................................................................................................................20
Mitigation.................................................................................................................................................20
Bluetooth.......................................................................................................................................................21
Bluetooth Backdoor..................................................................................................................................21
Bluetooth Worms......................................................................................................................................21
Mitigation.................................................................................................................................................22
Email..............................................................................................................................................................22
Email Interception....................................................................................................................................22
Backdoor...................................................................................................................................................22
3
Attack Surface
Analysis of
BlackBerry Devices
Vista de página 2
1 2 3 4 5 6 7 8 ... 38 39

Comentários a estes Manuais

Sem comentários