Nytro Posted June 29, 2011 Report Posted June 29, 2011 A Window Into Mobile Device SecurityExamining the security approaches employed in Apple’s iOSand Google’s AndroidCarey NachenbergVP, FellowContentsExecutive Summary............................................1Introduction........................................................1Mobile Security Goals.........................................2Web-based and network-based attacks ......2Malware ........................................................2Social Engineering Attacks...........................3Resource Abuse.............................................3Data Loss ......................................................3Data Integrity Threats...................................3Device Security Models......................................3Apple iOS.......................................................4Android........................................................10iOS vs. Android: Security Overview...................17Device Ecosystems ............................................17Mobile Security Solutions................................20Mobile Antivirus..........................................20Secure Browser...........................................21Mobile Device Management (MDM)...........21Enterprise Sandbox.....................................21Data Loss Prevention (DLP)........................22Conclusion........................................................22Download:http://www.symantec.com/content/en/us/about/media/pdfs/symc_mobile_device_security_june2011.pdf Quote