The proliferation of smart, consumer mobile devices and their incorporation into the enterprise is causing a significant shift in the way that enterprises think about client-side security. Smart mobile devices used in the enterprise need to be managed as per a variety of compliance regulations; for instance, they need to be able to be "wiped' if lost or stolen, data on them needs to be encrypted, and appropriate authentication must be supported if the device is used to access corporate data such as email. Malware has also started proliferating across mobile devices (e.g., DroidDream malware infected over 250,000 mobile devices in early March 2011), and organizations need to put countermeasures in place to ensure that mobile devices don't continue to be a weak link in enterprise security.
In this course, you will gain a strong technical background in the security features and limitations of modern mobile operating systems including Android, iOS, RIM, Symbian, and Windows Mobile.
You Will Learn
- An overview and case studies of approaches that enterprises have taken to-date to manage mobile device security
- A survey of what aspects of traditional security threats (e.g., phishing, malware/botnets, email spam) do and do not apply to mobile devices, and how those that do apply are different and need to be dealt with differently on mobile devices
- A survey of the threats posed by (and countermeasures in place for) various mobile "app stores" including Apple's App Store, the Android Market, Amazon's App Store, and emerging mobile application marketplaces
- A view in to the future of the management of security for mobile device platforms