Blackberry JAVA DEVELOPMENT ENVIRONMENT - - FUNDAMENTALS GUIDE Especificações Página 4

  • Descarregar
  • Adicionar aos meus manuais
  • Imprimir
  • Página
    / 39
  • Índice
  • MARCADORES
  • Avaliado. / 5. Com base em avaliações de clientes
Vista de página 3
White Paper: Symantec Security Response
Worm.........................................................................................................................................................22
Mitigation.................................................................................................................................................23
PIM Data (Personal Information Manager Data)..........................................................................................24
Data Theft.................................................................................................................................................25
Loss of data availability and integrity......................................................................................................25
Mitigation.................................................................................................................................................25
TCP/IP Connections.......................................................................................................................................25
Proxy/Firewall Bypass..............................................................................................................................26
Backdoor...................................................................................................................................................27
Port Scan...................................................................................................................................................27
Mitigation.................................................................................................................................................27
Port Scan...................................................................................................................................................28
HTTP / WAP....................................................................................................................................................28
Data Theft.................................................................................................................................................28
Backdoor.............................................................................................................................................28
HTTP Proxy................................................................................................................................................29
Mitigation.................................................................................................................................................29
Telephony......................................................................................................................................................30
Call Record Monitoring.............................................................................................................................31
Premium Rate Calls..................................................................................................................................31
Bypassing Caller Verification Systems.....................................................................................................31
Telephony Data Theft................................................................................................................................32
Mitigation.................................................................................................................................................32
Camera..........................................................................................................................................................33
Mitigation.................................................................................................................................................33
Conclusions.......................................................................................................................................................33
Appendix A.........................................................................................................................................................35
References.........................................................................................................................................................36
4
Attack Surface
Analysis of
BlackBerry Devices
Vista de página 3
1 2 3 4 5 6 7 8 9 ... 38 39

Comentários a estes Manuais

Sem comentários