Wake-up call: Draft security pub looks at cell phones, PDAs

Jul 10, 2008

In recent years cell phones and PDAs—"Personal Digital Assistants"—have exploded in power, performance and features. They now often boast expanded memory, cameras, Global Positioning System receivers and the ability to record and store multimedia files and transfer them over wireless networks—in addition to the cell phone system—using WiFi, infrared and Bluetooth communications. Oh, yes, and make phone calls.

On July 7, the National Institute of Standards and Technology published for comment draft guidelines on security considerations for cell phones and PDAs.

Part of a series of publications on computer security issues, the draft guidelines provide an overview of cell phones and PDA devices in use today and the growing security threats that they face and propose a framework that organizations can use to manage the security risks.

"The security issues for cell phones and PDAs range beyond those of other computer equipment," the NIST authors observe. "Moreover, many common safeguards available for desktop and networked computers are generally not as readily available across a broad spectrum of handheld device types."

The draft document notes that some security enhancements better known in the personal computer world are becoming available for PDAs and smart phones, including stronger user authentication systems based on biometrics, and firewall, antivirus and intrusion detection software.

Draft NIST computer security publications including Guidelines on Cell Phone and PDA Security (Special Publication 800-124 Draft) are available online from the NIST Computer Security Resource Center at csrc.nist.gov/publications/PubsDrafts.html .

Source: National Institute of Standards and Technology

Explore further: Amazon says FAA drone approval already obsolete

add to favorites email to friend print save as pdf

Related Stories

One billion people still live without electricity

Mar 09, 2015

A single light bulb greatly simplifies a family's daily life, enabling family members to carry out various activities indoors. The children do their homework, and the mother sews or prepares dinner. Indoor lighting also makes ...

QR codes engineered into cybersecurity protection

Feb 27, 2015

QR, or Quick Response, codes – those commonly black and white boxes that people scan with a smartphone to learn more about something – have been used to convey information about everything from cereals ...

Recommended for you

Amazon says FAA drone approval already obsolete

17 hours ago

The approval federal aviation officials gave Amazon.com last week to test a specific drone design outdoors is already outdated, the company's top policy executive said Tuesday in written testimony to a Senate subcommittee.

Special ops troops using flawed intel software

Mar 26, 2015

Special operations troops heading to war zones are asking for commercial intelligence analysis software they say will help their missions. But their requests are languishing, and they are being ordered to use a flawed, in-house ...

Amazon says US too late on drone rules

Mar 24, 2015

Online giant Amazon told Congress on Tuesday the US government is lagging in implementing rules for commercial drones, making it hard to make plans for its quick delivery system by air.

User comments : 0

Please sign in to add a comment. Registration is free, and takes less than a minute. Read more

Click here to reset your password.
Sign in to get notified via email when new comments are made.