Search GSSD

Today’s Mobile Cybersecurity: Protected, Secured, and Unified

Abstract: 
This paper released by CTIA Wireless Association discusses the key players in the smartphone environment - the players who have the ability to mitigate threat or increase the probability of threat based on their actions. It discusses different layers of the environment and the cyber threats at each level (e.g. cloud, network and services) and solutions industry has provided to mitigate risks. It concludes with the importance of making policy to mitigate and punish cyber attacks. This paper is great at explaining the technical component of cybersecurity - all the potential attacks at each different level and the perpetrators as well as complicit agents (whether unknowingly or knowingly) of cyberattacks. It does a great job of also explaining what solutions are already out there.
Institution: 
CTIA Wireless Association
Year: 
2012
Domains-Issue Area: 
Dimensions-Problem/Solution: 
Region(s): 
Industry Focus: 
Internet & Cyberspace
Country: 
United States
Datatype(s): 
Organizations
Theory/Definition