8/12/2019 Top Threats to Mobile Computing
1/18
TOP THREATS TO MOBILECOMPUTINGTEAM 1: YUYAO HAN, FARHIN HASAN, XING JIN, AHMADREZA KHOSRAVI, CHIRAG PATEL, H
XU, CHEN YANG
8/12/2019 Top Threats to Mobile Computing
2/18
BYODbring your own
Mobile Expense Management?
Remote Email Access?
Mobile Enabled Business Appl
8/12/2019 Top Threats to Mobile Computing
3/18
BYODbring your own
Mobile Expense Management?
Remote Email Access?Mobile Enabled Business Ap
This simply makes you an enterprise that uses mobile
8/12/2019 Top Threats to Mobile Computing
4/18
A MOBILE ENTERPRISE:
Has enabled flexible and scalable enterprise-wide mobility for employees and customers usiintegrated approach.
Takes an integrated approach that aligns mobility initiatives with each other and with businesgoals and objectives, these organizations are able to provide instant access to business-criti
applications for a variety of devices, while still maintaining high levels of security.
May utilize cloud technology as an element in their approach to provide the scalable, on-deminfrastructure that makes true mobility possible across the entire mobile IT stack.
Uses business analytics that draw data from both traditional sources and social business inteincluding analytics from mobile transactions and contextual data,allowing them to fine tune e
from relevant employee applications to customer service and marketing initiatives.
8/12/2019 Top Threats to Mobile Computing
5/18
WHAT IS MOBILE COMPUTING?
~ a versatile and potentially
strategic technology that
improves information quality and
accessibility, increases
operational efficiency, and
enhances management
effectiveness.
8/12/2019 Top Threats to Mobile Computing
6/18
MOBILE COMPUTING SERVICE PROVID
IBM MOBILEFIRST PLATFORM
IBM MobileFirst Strategy and Design Services -Exploration, assessment and planning of your
mobile enterprise to address current and future
business and technology requirements that are
unique to your organization, your industry and your
users.
IBM MobileFirst Development and IntegrationServices - Services to help you develop, deploy,
integrate and manage application and infrastructure
elements of the mobile enterprise while making the
most of your existing investments.
VERIVO AKULA
8/12/2019 Top Threats to Mobile Computing
7/18
WHY ARE COMPANIES BECOMING MOB
ADVANTAGES
Marketplace instant and connected
Meets employee demands and increasesproductivity
Increases sales and enhances customer service
Improves operational efficiencies, reduces costsmore scalable mobile architecture
Differentiates and transforms customerexperience
Enables faster implementation of new servicesand business models such as online product
delivery and employee telecommuting by
decreasing development and test times
CHALLENGES
Increased need for collabortherefore need for cyber sec
Security, security, security
The need for business and strategy change
Mobile complexity and integ
The mobile skills gap.
8/12/2019 Top Threats to Mobile Computing
8/18
A DEEPER LOOK INTO CHALLENGESSecurity Change in Strategy Complexity and
Integration
Mobile Skill Gap
Mobile security
includes identity andaccess management,
network security,protections for
confidential data, and
protection against
viruses and malware.
Identity and
device/network
access
managementincluding endpoint
control - presents the
most immediate
security challenge.
The integrated nature
of the mobileenterprise requires a
correspondingintegration of
platforms, processes
and organizational
decision making.
This includes
everything from
ready-for-mobile
applicationdevelopment and
delivery to business-
to-employee (B2E)
and business-to-
customer (B2C)
communications
processes
cross-functional
integration
IT mobility stack
Application store
An average of
percent of bushave all the sk
needed to impland maintain ro
and integrated
mobility.
Some of this s
gap may be fill
increased mob
staffing investm
IT professionadeep mobility s
can be difficult
Implementing a
maintaining a m
enterprise with
help of a third p
partner may be
better solution
many organiza
8/12/2019 Top Threats to Mobile Computing
9/18
THE EVIL 8
Data lossfrom lost, stolen or decommissioned devices.
Information-stealing mobile malware
Data loss and data leakage through poorly written third-party applications.
Vulnerabilities within devices, operating system, design and third-party ap
Unsecured WiFi, networkaccess and rogue access points. Unsecured or rogue marketplaces.
Insufficient management tools, capabilities and access to application proginterfaces.
Near-field communications and proximity-based hacking.
http://www.bankinfosecurity.com/data-loss-c-208http://www.bankinfosecurity.com/anti-malware-c-309http://www.bankinfosecurity.com/network-perimeter-c-213http://www.bankinfosecurity.com/network-perimeter-c-213http://www.bankinfosecurity.com/anti-malware-c-309http://www.bankinfosecurity.com/data-loss-c-2088/12/2019 Top Threats to Mobile Computing
10/18
TOP 3 SECURITY THREATS TO MOBILECOMPUTINGDATA LOSSFROM LOST, STOLEN ORDECOMMISSIONED DEVICES
Description: Effect/Downtime:
Backup Option/Bootime:Identity management - using single
sign-on - allows the organization to assign access
limitations via a user name and password combination
based on an employees title or line of business and to
track the applications and data accessed by an individual
across the enterprise.
Network access control and policy management -
integrated with endpoint control toolscheck the employee
devices to be sure they are compliant with corporatesecurity standards. If a smartphone has had its security
policies changed by its user or is not utilizing an acceptable
level of virus and malware protection, endpoint control
protocols can automatically deny access or quarantine the
device. Endpoint control can then initiate an automated
correction process to bring the device back in l ine with
corporate standards.
INFORMATION-STEALING MOBILE MALWARE
Description:
Effect/Downtime:
Backup Option/Bootime: IT mobility stack - The
endpoint control layer is where all the other layers
meet. When the endpoint control layer serves as the
automated integration point for the network and
communication layer, the applications and
provisioning layer and the security and certificate
management layer, the complexities of user accessand security can be simplified and managed more
efficiently and effectively. Within the network and
communication layer, the mobile enterprise can
leverage the heightened scalability that is required to
manage large volumes of voice, video and application
information.
DATA LOSS AND DATA LEAKAGE
POORLY WRITTEN THIRD-PARTAPPLICATIONS.
Description:
Effect/Downtime:
Backup Option/Bootime:
Application store - When the applicatio
using to access corporate information i
unapproved, the employee may experi
failure and the organization can face he
risks. The mobile enterprise allows for t
contained application store. Two app screated: one where customers can dow
and one where employees can downlo
applications or remote desktop images
corporate preferences. The contained a
provides built-in application security fro
access format that employees and cus
familiar with.
http://www.bankinfosecurity.com/data-loss-c-208http://www.bankinfosecurity.com/anti-malware-c-309http://www.bankinfosecurity.com/anti-malware-c-309http://www.bankinfosecurity.com/data-loss-c-2088/12/2019 Top Threats to Mobile Computing
11/18
RECENT SECURITY BREACHES
Target
http://www.nytimes.com/2014/02/27/business/target-reports-on-fourth-quarter-earnings.html?_r=0
http://online.wsj.com/news/articles/SB10001424052702304255604579406694182132568
http://www.usatoday.com/story/money/business/2014/02/26/target-earnings/5829469/
http://bluesky.chicagotribune.com/chi-target-data-breach-bsi-news,0,0.story
http://www.cio.com/article/749841/4_Lessons_CIOs_Can_Learn_From_the_Target_Breach?taxonomyId=
3089
Neiman Marcus
http://www.bloomberg.com/news/2014-12/neiman-marcus-sued-over-custome
data-breach.html
http://www.businessweek.com/articles/21/neiman-marcus-hackers-set-off-60-0
while-bagging-credit-card-data
http://www.bloomberg.com/news/2014-21/neiman-marcus-hackers-set-off-60-0
bagging-card-data.html
http://www.calculator.co.uk/2014/01/ovcredit-card-accounts-stolen-in-neiman-
security-breach/
http://www.nytimes.com/2014/02/27/business/target-reports-on-fourth-quarter-earnings.html?_r=0http://www.nytimes.com/2014/02/27/business/target-reports-on-fourth-quarter-earnings.html?_r=0http://online.wsj.com/news/articles/SB10001424052702304255604579406694182132568http://online.wsj.com/news/articles/SB10001424052702304255604579406694182132568http://www.usatoday.com/story/money/business/2014/02/26/target-earnings/5829469/http://www.usatoday.com/story/money/business/2014/02/26/target-earnings/5829469/http://bluesky.chicagotribune.com/chi-target-data-breach-bsi-news,0,0.storyhttp://bluesky.chicagotribune.com/chi-target-data-breach-bsi-news,0,0.storyhttp://www.bloomberg.com/news/2014-03-12/neiman-marcus-sued-over-customer-credit-card-data-breach.htmlhttp://www.bloomberg.com/news/2014-03-12/neiman-marcus-sued-over-customer-credit-card-data-breach.htmlhttp://www.bloomberg.com/news/2014-03-12/neiman-marcus-sued-over-customer-credit-card-data-breach.htmlhttp://www.businessweek.com/articles/2014-02-21/neiman-marcus-hackers-set-off-60-000-alerts-while-bagging-credit-card-datahttp://www.businessweek.com/articles/2014-02-21/neiman-marcus-hackers-set-off-60-000-alerts-while-bagging-credit-card-datahttp://www.businessweek.com/articles/2014-02-21/neiman-marcus-hackers-set-off-60-000-alerts-while-bagging-credit-card-datahttp://www.bloomberg.com/news/2014-02-21/neiman-marcus-hackers-set-off-60-000-alerts-in-bagging-card-data.htmlhttp://www.bloomberg.com/news/2014-02-21/neiman-marcus-hackers-set-off-60-000-alerts-in-bagging-card-data.htmlhttp://www.bloomberg.com/news/2014-02-21/neiman-marcus-hackers-set-off-60-000-alerts-in-bagging-card-data.htmlhttp://www.calculator.co.uk/2014/01/over-1-million-credit-card-accounts-stolen-in-neiman-marcus-security-breach/http://www.calculator.co.uk/2014/01/over-1-million-credit-card-accounts-stolen-in-neiman-marcus-security-breach/http://www.calculator.co.uk/2014/01/over-1-million-credit-card-accounts-stolen-in-neiman-marcus-security-breach/http://www.calculator.co.uk/2014/01/over-1-million-credit-card-accounts-stolen-in-neiman-marcus-security-breach/http://www.calculator.co.uk/2014/01/over-1-million-credit-card-accounts-stolen-in-neiman-marcus-security-breach/http://www.calculator.co.uk/2014/01/over-1-million-credit-card-accounts-stolen-in-neiman-marcus-security-breach/http://www.calculator.co.uk/2014/01/over-1-million-credit-card-accounts-stolen-in-neiman-marcus-security-breach/http://www.calculator.co.uk/2014/01/over-1-million-credit-card-accounts-stolen-in-neiman-marcus-security-breach/http://www.calculator.co.uk/2014/01/over-1-million-credit-card-accounts-stolen-in-neiman-marcus-security-breach/http://www.calculator.co.uk/2014/01/over-1-million-credit-card-accounts-stolen-in-neiman-marcus-security-breach/http://www.calculator.co.uk/2014/01/over-1-million-credit-card-accounts-stolen-in-neiman-marcus-security-breach/http://www.calculator.co.uk/2014/01/over-1-million-credit-card-accounts-stolen-in-neiman-marcus-security-breach/http://www.calculator.co.uk/2014/01/over-1-million-credit-card-accounts-stolen-in-neiman-marcus-security-breach/http://www.calculator.co.uk/2014/01/over-1-million-credit-card-accounts-stolen-in-neiman-marcus-security-breach/http://www.calculator.co.uk/2014/01/over-1-million-credit-card-accounts-stolen-in-neiman-marcus-security-breach/http://www.calculator.co.uk/2014/01/over-1-million-credit-card-accounts-stolen-in-neiman-marcus-security-breach/http://www.calculator.co.uk/2014/01/over-1-million-credit-card-accounts-stolen-in-neiman-marcus-security-breach/http://www.calculator.co.uk/2014/01/over-1-million-credit-card-accounts-stolen-in-neiman-marcus-security-breach/http://www.calculator.co.uk/2014/01/over-1-million-credit-card-accounts-stolen-in-neiman-marcus-security-breach/http://www.calculator.co.uk/2014/01/over-1-million-credit-card-accounts-stolen-in-neiman-marcus-security-breach/http://www.bloomberg.com/news/2014-02-21/neiman-marcus-hackers-set-off-60-000-alerts-in-bagging-card-data.htmlhttp://www.bloomberg.com/news/2014-02-21/neiman-marcus-hackers-set-off-60-000-alerts-in-bagging-card-data.htmlhttp://www.bloomberg.com/news/2014-02-21/neiman-marcus-hackers-set-off-60-000-alerts-in-bagging-card-data.htmlhttp://www.bloomberg.com/news/2014-02-21/neiman-marcus-hackers-set-off-60-000-alerts-in-bagging-card-data.htmlhttp://www.bloomberg.com/news/2014-02-21/neiman-marcus-hackers-set-off-60-000-alerts-in-bagging-card-data.htmlhttp://www.bloomberg.com/news/2014-02-21/neiman-marcus-hackers-set-off-60-000-alerts-in-bagging-card-data.htmlhttp://www.bloomberg.com/news/2014-02-21/neiman-marcus-hackers-set-off-60-000-alerts-in-bagging-card-data.htmlhttp://www.bloomberg.com/news/2014-02-21/neiman-marcus-hackers-set-off-60-000-alerts-in-bagging-card-data.htmlhttp://www.bloomberg.com/news/2014-02-21/neiman-marcus-hackers-set-off-60-000-alerts-in-bagging-card-data.htmlhttp://www.bloomberg.com/news/2014-02-21/neiman-marcus-hackers-set-off-60-000-alerts-in-bagging-card-data.htmlhttp://www.bloomberg.com/news/2014-02-21/neiman-marcus-hackers-set-off-60-000-alerts-in-bagging-card-data.htmlhttp://www.bloomberg.com/news/2014-02-21/neiman-marcus-hackers-set-off-60-000-alerts-in-bagging-card-data.htmlhttp://www.bloomberg.com/news/2014-02-21/neiman-marcus-hackers-set-off-60-000-alerts-in-bagging-card-data.htmlhttp://www.bloomberg.com/news/2014-02-21/neiman-marcus-hackers-set-off-60-000-alerts-in-bagging-card-data.htmlhttp://www.bloomberg.com/news/2014-02-21/neiman-marcus-hackers-set-off-60-000-alerts-in-bagging-card-data.htmlhttp://www.bloomberg.com/news/2014-02-21/neiman-marcus-hackers-set-off-60-000-alerts-in-bagging-card-data.htmlhttp://www.bloomberg.com/news/2014-02-21/neiman-marcus-hackers-set-off-60-000-alerts-in-bagging-card-data.htmlhttp://www.bloomberg.com/news/2014-02-21/neiman-marcus-hackers-set-off-60-000-alerts-in-bagging-card-data.htmlhttp://www.bloomberg.com/news/2014-02-21/neiman-marcus-hackers-set-off-60-000-alerts-in-bagging-card-data.htmlhttp://www.bloomberg.com/news/2014-02-21/neiman-marcus-hackers-set-off-60-000-alerts-in-bagging-card-data.htmlhttp://www.businessweek.com/articles/2014-02-21/neiman-marcus-hackers-set-off-60-000-alerts-while-bagging-credit-card-datahttp://www.businessweek.com/articles/2014-02-21/neiman-marcus-hackers-set-off-60-000-alerts-while-bagging-credit-card-datahttp://www.businessweek.com/articles/2014-02-21/neiman-marcus-hackers-set-off-60-000-alerts-while-bagging-credit-card-datahttp://www.businessweek.com/articles/2014-02-21/neiman-marcus-hackers-set-off-60-000-alerts-while-bagging-credit-card-datahttp://www.businessweek.com/articles/2014-02-21/neiman-marcus-hackers-set-off-60-000-alerts-while-bagging-credit-card-datahttp://www.businessweek.com/articles/2014-02-21/neiman-marcus-hackers-set-off-60-000-alerts-while-bagging-credit-card-datahttp://www.businessweek.com/articles/2014-02-21/neiman-marcus-hackers-set-off-60-000-alerts-while-bagging-credit-card-datahttp://www.businessweek.com/articles/2014-02-21/neiman-marcus-hackers-set-off-60-000-alerts-while-bagging-credit-card-datahttp://www.businessweek.com/articles/2014-02-21/neiman-marcus-hackers-set-off-60-000-alerts-while-bagging-credit-card-datahttp://www.businessweek.com/articles/2014-02-21/neiman-marcus-hackers-set-off-60-000-alerts-while-bagging-credit-card-datahttp://www.businessweek.com/articles/2014-02-21/neiman-marcus-hackers-set-off-60-000-alerts-while-bagging-credit-card-datahttp://www.businessweek.com/articles/2014-02-21/neiman-marcus-hackers-set-off-60-000-alerts-while-bagging-credit-card-datahttp://www.businessweek.com/articles/2014-02-21/neiman-marcus-hackers-set-off-60-000-alerts-while-bagging-credit-card-datahttp://www.businessweek.com/articles/2014-02-21/neiman-marcus-hackers-set-off-60-000-alerts-while-bagging-credit-card-datahttp://www.businessweek.com/articles/2014-02-21/neiman-marcus-hackers-set-off-60-000-alerts-while-bagging-credit-card-datahttp://www.businessweek.com/articles/2014-02-21/neiman-marcus-hackers-set-off-60-000-alerts-while-bagging-credit-card-datahttp://www.businessweek.com/articles/2014-02-21/neiman-marcus-hackers-set-off-60-000-alerts-while-bagging-credit-card-datahttp://www.businessweek.com/articles/2014-02-21/neiman-marcus-hackers-set-off-60-000-alerts-while-bagging-credit-card-datahttp://www.businessweek.com/articles/2014-02-21/neiman-marcus-hackers-set-off-60-000-alerts-while-bagging-credit-card-datahttp://www.businessweek.com/articles/2014-02-21/neiman-marcus-hackers-set-off-60-000-alerts-while-bagging-credit-card-datahttp://www.businessweek.com/articles/2014-02-21/neiman-marcus-hackers-set-off-60-000-alerts-while-bagging-credit-card-datahttp://www.businessweek.com/articles/2014-02-21/neiman-marcus-hackers-set-off-60-000-alerts-while-bagging-credit-card-datahttp://www.businessweek.com/articles/2014-02-21/neiman-marcus-hackers-set-off-60-000-alerts-while-bagging-credit-card-datahttp://www.businessweek.com/articles/2014-02-21/neiman-marcus-hackers-set-off-60-000-alerts-while-bagging-credit-card-datahttp://www.bloomberg.com/news/2014-03-12/neiman-marcus-sued-over-customer-credit-card-data-breach.htmlhttp://www.bloomberg.com/news/2014-03-12/neiman-marcus-sued-over-customer-credit-card-data-breach.htmlhttp://www.bloomberg.com/news/2014-03-12/neiman-marcus-sued-over-customer-credit-card-data-breach.htmlhttp://www.bloomberg.com/news/2014-03-12/neiman-marcus-sued-over-customer-credit-card-data-breach.htmlhttp://www.bloomberg.com/news/2014-03-12/neiman-marcus-sued-over-customer-credit-card-data-breach.htmlhttp://www.bloomberg.com/news/2014-03-12/neiman-marcus-sued-over-customer-credit-card-data-breach.htmlhttp://www.bloomberg.com/news/2014-03-12/neiman-marcus-sued-over-customer-credit-card-data-breach.htmlhttp://www.bloomberg.com/news/2014-03-12/neiman-marcus-sued-over-customer-credit-card-data-breach.htmlhttp://www.bloomberg.com/news/2014-03-12/neiman-marcus-sued-over-customer-credit-card-data-breach.htmlhttp://www.bloomberg.com/news/2014-03-12/neiman-marcus-sued-over-customer-credit-card-data-breach.htmlhttp://www.bloomberg.com/news/2014-03-12/neiman-marcus-sued-over-customer-credit-card-data-breach.htmlhttp://www.bloomberg.com/news/2014-03-12/neiman-marcus-sued-over-customer-credit-card-data-breach.htmlhttp://www.bloomberg.com/news/2014-03-12/neiman-marcus-sued-over-customer-credit-card-data-breach.htmlhttp://www.bloomberg.com/news/2014-03-12/neiman-marcus-sued-over-customer-credit-card-data-breach.htmlhttp://www.bloomberg.com/news/2014-03-12/neiman-marcus-sued-over-customer-credit-card-data-breach.htmlhttp://bluesky.chicagotribune.com/chi-target-data-breach-bsi-news,0,0.storyhttp://bluesky.chicagotribune.com/chi-target-data-breach-bsi-news,0,0.storyhttp://bluesky.chicagotribune.com/chi-target-data-breach-bsi-news,0,0.storyhttp://bluesky.chicagotribune.com/chi-target-data-breach-bsi-news,0,0.storyhttp://bluesky.chicagotribune.com/chi-target-data-breach-bsi-news,0,0.storyhttp://bluesky.chicagotribune.com/chi-target-data-breach-bsi-news,0,0.storyhttp://bluesky.chicagotribune.com/chi-target-data-breach-bsi-news,0,0.storyhttp://bluesky.chicagotribune.com/chi-target-data-breach-bsi-news,0,0.storyhttp://bluesky.chicagotribune.com/chi-target-data-breach-bsi-news,0,0.storyhttp://bluesky.chicagotribune.com/chi-target-data-breach-bsi-news,0,0.storyhttp://bluesky.chicagotribune.com/chi-target-data-breach-bsi-news,0,0.storyhttp://bluesky.chicagotribune.com/chi-target-data-breach-bsi-news,0,0.storyhttp://www.usatoday.com/story/money/business/2014/02/26/target-earnings/5829469/http://www.usatoday.com/story/money/business/2014/02/26/target-earnings/5829469/http://www.usatoday.com/story/money/business/2014/02/26/target-earnings/5829469/http://www.usatoday.com/story/money/business/2014/02/26/target-earnings/5829469/http://www.usatoday.com/story/money/business/2014/02/26/target-earnings/5829469/http://online.wsj.com/news/articles/SB10001424052702304255604579406694182132568http://online.wsj.com/news/articles/SB10001424052702304255604579406694182132568http://online.wsj.com/news/articles/SB10001424052702304255604579406694182132568http://www.nytimes.com/2014/02/27/business/target-reports-on-fourth-quarter-earnings.html?_r=0http://www.nytimes.com/2014/02/27/business/target-reports-on-fourth-quarter-earnings.html?_r=0http://www.nytimes.com/2014/02/27/business/target-reports-on-fourth-quarter-earnings.html?_r=0http://www.nytimes.com/2014/02/27/business/target-reports-on-fourth-quarter-earnings.html?_r=0http://www.nytimes.com/2014/02/27/business/target-reports-on-fourth-quarter-earnings.html?_r=0http://www.nytimes.com/2014/02/27/business/target-reports-on-fourth-quarter-earnings.html?_r=0http://www.nytimes.com/2014/02/27/business/target-reports-on-fourth-quarter-earnings.html?_r=0http://www.nytimes.com/2014/02/27/business/target-reports-on-fourth-quarter-earnings.html?_r=0http://www.nytimes.com/2014/02/27/business/target-reports-on-fourth-quarter-earnings.html?_r=0http://www.nytimes.com/2014/02/27/business/target-reports-on-fourth-quarter-earnings.html?_r=0http://www.nytimes.com/2014/02/27/business/target-reports-on-fourth-quarter-earnings.html?_r=0http://www.nytimes.com/2014/02/27/business/target-reports-on-fourth-quarter-earnings.html?_r=08/12/2019 Top Threats to Mobile Computing
12/18
MOBILE COMPUTING SECURITY OPTIO
CHALLENGES/
LIMITABIL
INTEROPERABILI
BETWEEN SECUR
SOFTWARE
8/12/2019 Top Threats to Mobile Computing
13/18
SECURITY SOFTWARE SUBSCRIPTION
8/12/2019 Top Threats to Mobile Computing
14/18
COST/BENEFIT REVIEW
8/12/2019 Top Threats to Mobile Computing
15/18
HOW DIFFICULT IS IT TO SWITCH BETWSECURITY PROVIDERS?
8/12/2019 Top Threats to Mobile Computing
16/18
CHECKLIST WHEN TRANSFORMING INMOBILE ENTERPRISE:
Detailed strategy development
Security and certificate management
Endpoint control
Network infrastructure, access and control
Applications and provisioning
Unified communications
Back-end integration
Skills: in-house versus third party
8/12/2019 Top Threats to Mobile Computing
17/18
REFERNCES
https://zmail.utdallas.edu/service/home/~/Mobile%20Enterprisuth=co&loc=en_US&id=9182&part=2
http://www.idi.ntnu.no/grupper/su/mowahs/links/MobileFramew
http://www.ocio.usda.gov/about-ocio/enterprise-applications-seas/eas-mobile-computing-program-management-office
https://zmail.utdallas.edu/service/home/~/Mobile%20Enterprise.pdf?auth=co&loc=en_US&id=9182&part=2https://zmail.utdallas.edu/service/home/~/Mobile%20Enterprise.pdf?auth=co&loc=en_US&id=9182&part=2http://www.idi.ntnu.no/grupper/su/mowahs/links/MobileFramework.pdfhttp://www.ocio.usda.gov/about-ocio/enterprise-applications-services-eas/eas-mobile-computing-program-management-officehttp://www.ocio.usda.gov/about-ocio/enterprise-applications-services-eas/eas-mobile-computing-program-management-officehttp://www.ocio.usda.gov/about-ocio/enterprise-applications-services-eas/eas-mobile-computing-program-management-officehttp://www.ocio.usda.gov/about-ocio/enterprise-applications-services-eas/eas-mobile-computing-program-management-officehttp://www.ocio.usda.gov/about-ocio/enterprise-applications-services-eas/eas-mobile-computing-program-management-officehttp://www.ocio.usda.gov/about-ocio/enterprise-applications-services-eas/eas-mobile-computing-program-management-officehttp://www.ocio.usda.gov/about-ocio/enterprise-applications-services-eas/eas-mobile-computing-program-management-officehttp://www.ocio.usda.gov/about-ocio/enterprise-applications-services-eas/eas-mobile-computing-program-management-officehttp://www.ocio.usda.gov/about-ocio/enterprise-applications-services-eas/eas-mobile-computing-program-management-officehttp://www.ocio.usda.gov/about-ocio/enterprise-applications-services-eas/eas-mobile-computing-program-management-officehttp://www.ocio.usda.gov/about-ocio/enterprise-applications-services-eas/eas-mobile-computing-program-management-officehttp://www.ocio.usda.gov/about-ocio/enterprise-applications-services-eas/eas-mobile-computing-program-management-officehttp://www.ocio.usda.gov/about-ocio/enterprise-applications-services-eas/eas-mobile-computing-program-management-officehttp://www.ocio.usda.gov/about-ocio/enterprise-applications-services-eas/eas-mobile-computing-program-management-officehttp://www.ocio.usda.gov/about-ocio/enterprise-applications-services-eas/eas-mobile-computing-program-management-officehttp://www.ocio.usda.gov/about-ocio/enterprise-applications-services-eas/eas-mobile-computing-program-management-officehttp://www.ocio.usda.gov/about-ocio/enterprise-applications-services-eas/eas-mobile-computing-program-management-officehttp://www.ocio.usda.gov/about-ocio/enterprise-applications-services-eas/eas-mobile-computing-program-management-officehttp://www.ocio.usda.gov/about-ocio/enterprise-applications-services-eas/eas-mobile-computing-program-management-officehttp://www.ocio.usda.gov/about-ocio/enterprise-applications-services-eas/eas-mobile-computing-program-management-officehttp://www.ocio.usda.gov/about-ocio/enterprise-applications-services-eas/eas-mobile-computing-program-management-officehttp://www.idi.ntnu.no/grupper/su/mowahs/links/MobileFramework.pdfhttp://www.idi.ntnu.no/grupper/su/mowahs/links/MobileFramework.pdfhttps://zmail.utdallas.edu/service/home/~/Mobile%20Enterprise.pdf?auth=co&loc=en_US&id=9182&part=2https://zmail.utdallas.edu/service/home/~/Mobile%20Enterprise.pdf?auth=co&loc=en_US&id=9182&part=2https://zmail.utdallas.edu/service/home/~/Mobile%20Enterprise.pdf?auth=co&loc=en_US&id=9182&part=28/12/2019 Top Threats to Mobile Computing
18/18
The End