Blackberry JAVA DEVELOPMENT ENVIRONMENT - - FUNDAMENTALS GUIDE Spécifications Page 4

  • Télécharger
  • Ajouter à mon manuel
  • Imprimer
  • Page
    / 39
  • Table des matières
  • MARQUE LIVRES
  • Noté. / 5. Basé sur avis des utilisateurs
Vue de la page 3
White Paper: Symantec Security Response
Worm.........................................................................................................................................................22
Mitigation.................................................................................................................................................23
PIM Data (Personal Information Manager Data)..........................................................................................24
Data Theft.................................................................................................................................................25
Loss of data availability and integrity......................................................................................................25
Mitigation.................................................................................................................................................25
TCP/IP Connections.......................................................................................................................................25
Proxy/Firewall Bypass..............................................................................................................................26
Backdoor...................................................................................................................................................27
Port Scan...................................................................................................................................................27
Mitigation.................................................................................................................................................27
Port Scan...................................................................................................................................................28
HTTP / WAP....................................................................................................................................................28
Data Theft.................................................................................................................................................28
Backdoor.............................................................................................................................................28
HTTP Proxy................................................................................................................................................29
Mitigation.................................................................................................................................................29
Telephony......................................................................................................................................................30
Call Record Monitoring.............................................................................................................................31
Premium Rate Calls..................................................................................................................................31
Bypassing Caller Verification Systems.....................................................................................................31
Telephony Data Theft................................................................................................................................32
Mitigation.................................................................................................................................................32
Camera..........................................................................................................................................................33
Mitigation.................................................................................................................................................33
Conclusions.......................................................................................................................................................33
Appendix A.........................................................................................................................................................35
References.........................................................................................................................................................36
4
Attack Surface
Analysis of
BlackBerry Devices
Vue de la page 3
1 2 3 4 5 6 7 8 9 ... 38 39

Commentaires sur ces manuels

Pas de commentaire