Free Trial

Safari Books Online is a digital library providing on-demand subscription access to thousands of learning resources.

Share this Page URL

Hardware and peripheral security risks > Removable storage devices - Pg. 12

12 Eleventh Hour Security : Exam SY0-201 Study Guide If the cell phone supports a power-on password or has a key lock, which prevents the phone from being used unless a personal identification num- ber (PIN) is entered, these features should be activated on the phone. Data stored on memory cards used by cell phones should be encrypted if the phone software supports it. Organizations should also decide whether to limit or prohibit the use of cameras on cell phones as a cell phone camera can be used to take pictures of sensitive data displayed on a screen or other classified infor- mation that may be displayed in plain sight. Viruses have been written for cell phones and could be easily dissemi- nated to cell phone users. The first cell phone virus, Cabir, first appeared in 2004 and spread between cell phones that used the Symbian operating system by transmit- ting itself using Bluetooth. Cell phones can be used as modems and can allow a computer to connect to the Internet without having to go through the corporate firewall. This could allow for the unauthorized transfer of data outside of the corporate network. Another method of transferring data is using Bluetooth technology. Bluetooth is a wireless protocol and service that allows Bluetooth-enabled