首页> 美国政府科技报告 >Automatic Identification & Mitigation of Unauthorized Information Leaking from Tactical Mobile Networks.
【24h】

Automatic Identification & Mitigation of Unauthorized Information Leaking from Tactical Mobile Networks.

机译:自动识别和减轻战术移动网络中未经授权的信息泄露。

获取原文

摘要

Most hand-held mobile devices today are equipped with a phone, web browser, music player, camera, and a horde of other applications and services. Google Android, NeoFreeRunner, Nokia Maemo, iPhone OS and Windows Phone OS are noteworthy hand-held device platforms capable of performing most of the functions previously found only in full-fledged desktop operating systems. Usability of such devices is further increased by the availability of third- party applications that can be purchased or freely downloaded by users from online application stores or developer websites. Unfortunately, few of these applications provide the required level of security to protect the sensitive, potentially mission critical data that they access and store. Furthermore, while the major mobile device manufactures have given much lip service to security for their respective platforms, all currently fall way short of providing the robust security controls required to securely operate these devices in a tactical or other mission critical environment. This issue is under scored by the fact that no DoD accreditation authority has yet to accredit and authorize the use of any commercial mobile devices in a tactical environment despite the need and demand for the capabilities that such devices provide for the warfighter.

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号