Mobile Device Management and Strategy
Due to their always-on wireless connections, physical sensors, and location services, mobile devices are subject to unique threats. The diversity of available devices, operating systems, carrier-provided services, and mobile applications present additional security challenges to the confidentiality, integrity, and availability of information. This book discusses the baseline of standard security requirements for mobile computing. It examines the US government’s Mobile Security Architecture that incorporates security and privacy by design to develop a standard Mobile Device management system that is applicable in most all corporate and organizational situations.