Blackberry JAVA DEVELOPMENT ENVIRONMENT - - FUNDAMENTALS GUIDE Especificaciones Pagina 4

  • Descarga
  • Añadir a mis manuales
  • Imprimir
  • Pagina
    / 39
  • Tabla de contenidos
  • MARCADORES
  • Valorado. / 5. Basado en revisión del cliente
Vista de pagina 3
White Paper: Symantec Security Response
Worm.........................................................................................................................................................22
Mitigation.................................................................................................................................................23
PIM Data (Personal Information Manager Data)..........................................................................................24
Data Theft.................................................................................................................................................25
Loss of data availability and integrity......................................................................................................25
Mitigation.................................................................................................................................................25
TCP/IP Connections.......................................................................................................................................25
Proxy/Firewall Bypass..............................................................................................................................26
Backdoor...................................................................................................................................................27
Port Scan...................................................................................................................................................27
Mitigation.................................................................................................................................................27
Port Scan...................................................................................................................................................28
HTTP / WAP....................................................................................................................................................28
Data Theft.................................................................................................................................................28
Backdoor.............................................................................................................................................28
HTTP Proxy................................................................................................................................................29
Mitigation.................................................................................................................................................29
Telephony......................................................................................................................................................30
Call Record Monitoring.............................................................................................................................31
Premium Rate Calls..................................................................................................................................31
Bypassing Caller Verification Systems.....................................................................................................31
Telephony Data Theft................................................................................................................................32
Mitigation.................................................................................................................................................32
Camera..........................................................................................................................................................33
Mitigation.................................................................................................................................................33
Conclusions.......................................................................................................................................................33
Appendix A.........................................................................................................................................................35
References.........................................................................................................................................................36
4
Attack Surface
Analysis of
BlackBerry Devices
Vista de pagina 3
1 2 3 4 5 6 7 8 9 ... 38 39

Comentarios a estos manuales

Sin comentarios