Wake-up call: Draft security pub looks at cell phones, PDAs

Jul 10, 2008

In recent years cell phones and PDAs—"Personal Digital Assistants"—have exploded in power, performance and features. They now often boast expanded memory, cameras, Global Positioning System receivers and the ability to record and store multimedia files and transfer them over wireless networks—in addition to the cell phone system—using WiFi, infrared and Bluetooth communications. Oh, yes, and make phone calls.

On July 7, the National Institute of Standards and Technology published for comment draft guidelines on security considerations for cell phones and PDAs.

Part of a series of publications on computer security issues, the draft guidelines provide an overview of cell phones and PDA devices in use today and the growing security threats that they face and propose a framework that organizations can use to manage the security risks.

"The security issues for cell phones and PDAs range beyond those of other computer equipment," the NIST authors observe. "Moreover, many common safeguards available for desktop and networked computers are generally not as readily available across a broad spectrum of handheld device types."

The draft document notes that some security enhancements better known in the personal computer world are becoming available for PDAs and smart phones, including stronger user authentication systems based on biometrics, and firewall, antivirus and intrusion detection software.

Draft NIST computer security publications including Guidelines on Cell Phone and PDA Security (Special Publication 800-124 Draft) are available online from the NIST Computer Security Resource Center at csrc.nist.gov/publications/PubsDrafts.html .

Source: National Institute of Standards and Technology

Explore further: Technology and data analytics should transform municipal government, professors say

add to favorites email to friend print save as pdf

Related Stories

Law enforcement grapples with iPhone's enhanced encryption

Oct 03, 2014

Apple is no stranger to disruption, having upended the music business with iTunes and the mobile industry with the iPhone. But now, some law enforcement officials are warning that the company is threatening to disrupt their ...

CloudFlare tackles lost SSL key risk with Keyless SSL

Sep 19, 2014

Organizations looking for and concerned about optimal security protection are the targets of a new service announced by San Francisco-based CloudFlare. The offering is called Keyless SSL. CloudFlare explained ...

IT student seeks to help mitigate risks of Google Glass

Sep 26, 2014

As online data breaches continue to challenge companies' and consumers' trust in cybersecurity, UC information-technology major Marina Grebenshchikova is exploring the risks associated with ever-evolving ...

How to print your own cell phone microscope for pennies

Sep 16, 2014

At one o'clock in the morning, layers of warm plastic are deposited on the platform of the 3D printer that sits on scientist Rebecca Erikson's desk. A small plastic housing, designed to fit over the end of ...

Recommended for you

When emotions control objects

5 hours ago

Dimming a light, immersive playing on a computer, and tracking yoga exercises in real time – sensors developed by SmartCardia use various vital signs to transmit data to a host of everyday objects.

User comments : 0