Reference Hub2
Conservation of Mobile Data and Usability Constraints

Conservation of Mobile Data and Usability Constraints

Rania Mokhtar, Rashid Saeed
ISBN13: 9781609608514|ISBN10: 1609608518|EISBN13: 9781609608521
DOI: 10.4018/978-1-60960-851-4.ch003
Cite Chapter Cite Chapter

MLA

Mokhtar, Rania, and Rashid Saeed. "Conservation of Mobile Data and Usability Constraints." Cyber Security Standards, Practices and Industrial Applications: Systems and Methodologies, edited by Junaid Ahmed Zubairi and Athar Mahboob, IGI Global, 2012, pp. 40-55. https://doi.org/10.4018/978-1-60960-851-4.ch003

APA

Mokhtar, R. & Saeed, R. (2012). Conservation of Mobile Data and Usability Constraints. In J. Zubairi & A. Mahboob (Eds.), Cyber Security Standards, Practices and Industrial Applications: Systems and Methodologies (pp. 40-55). IGI Global. https://doi.org/10.4018/978-1-60960-851-4.ch003

Chicago

Mokhtar, Rania, and Rashid Saeed. "Conservation of Mobile Data and Usability Constraints." In Cyber Security Standards, Practices and Industrial Applications: Systems and Methodologies, edited by Junaid Ahmed Zubairi and Athar Mahboob, 40-55. Hershey, PA: IGI Global, 2012. https://doi.org/10.4018/978-1-60960-851-4.ch003

Export Reference

Mendeley
Favorite

Abstract

An important part of ISO/IEC 27002 cyber security standard is the conservation of confidentiality that falls under its computer facility protection part which insures that the computer and its stored information can only be accessed by the authorized users. Securing mobile devices and mobile data to ensure the confidentiality, integrity, and availability of both data and security applications requires special consideration to be paid to the typical mobile environment in which a mobile computing device would be utilized. Protecting mobile devices includes multiple security technologies such as the right identification of its particular user, data encryption, physical locking devices, monitoring and tracking software, and alarms. This chapter reviews security-specific hardware and software applied to mobile computing and presents its advantages and drawbacks. Then it considers the concept of usability constraints in context of mobile computing security and introduces the seamless security method for identity proof of a particular user or device.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.