Free Trial

Safari Books Online is a digital library providing on-demand subscription access to thousands of learning resources.

  • Create BookmarkCreate Bookmark
  • Create Note or TagCreate Note or Tag
  • PrintPrint

Evaluating the Target

In planning security, it is always constructive to begin with a use model and a threat model. The former describes how the thing we are trying to protect is used. The latter describes how the “bad guys” may attempt to attack it. In our case, we will consider mobile phones and similar devices.

We begin by looking at how people use mobile phones. It sounds simple, but if you stop and think a moment, this actually presents a very complex picture. A variety of users exist. Mobile phones are used by over 3 billion people in over 200 countries, operating on 700 different networks [GSMA]. The users possess a wide range of technical skills. The devices are used almost anywhere. The hardware is produced by a fairly large variety of manufacturers. On the other hand, only a very small number of operating systems are in use. Also, due to the relatively closed models in use, there is not much variety in software running on them (at least relative to desktop computers). Of course, some of these li....


  

You are currently reading a PREVIEW of this book.

                                                                                                                    

Get instant access to over $1 million worth of books and videos.

  

Start a Free 10-Day Trial


  
  • Safari Books Online
  • Create BookmarkCreate Bookmark
  • Create Note or TagCreate Note or Tag
  • PrintPrint