The Security of Mobile Internet Devices . Northwest Academic Computing Consortium (NWACC) 2010 Network Security Workshop
Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.
Northwest Academic Computing Consortium (NWACC)
2010 Network Security Workshop
Joe St Sauver, Ph.D.Nationwide Internet2 Security Programs ManagerInternet2 and the University of Oregon (firstname.lastname@example.org or email@example.com)http://www.uoregon.edu/~joe/nwacc-mobile-security/
This talk has been prepared in a detailed format for ease of indexing and to insure accessibility for the disabled.
About half of the respondents (51.2%) indicated that they own an Internet capable handheld device, and another 11.8% indicated that they plan to purchase one in the next 12 months [...]
Notes: Some tools may only be available to gov/mil/LE. Also, if you must jailbreak an iPhone to use a tool, this may complicate use of resulting evidence for prosecution
-- Pre-3GS versions of the iPhone may take an hour per 8GB of storage to wipe; 3GS’s wipe instantaneously.
Are there any questions?
What did we forget to cover that we should havementioned?
Safe travels home (no DWD!), and hope we’ll see you all next year!