Please enable JavaScript.
Coggle requires JavaScript to display documents.
MOBILE VULNERABILITIES 4.3.6-4.3.8 - Coggle Diagram
MOBILE VULNERABILITIES 4.3.6-4.3.8
THREAT ANALYSIS AND COUNTERMEASURES OF THE WORELESS COMMUNICATION
3 BASIC THREATS
ALTERATION
DISRUPTION
INTERCEPTION
MOBILE DEVICE THREATS
NETWORK-BASED
NETWORK EXPLOITS
WIFI SNIFFING
APPLICATION-BASED
SPYWARE
PRIVACY THREATS
MALWARE
VULNERABLE APPLICATIONS
WEB-BASED
PHISHING SCAMS
BROWSER EXPLOITS
DRIVE BY DOWNLOADS
SQL INJECTION AND CROSS SITE SCRIPTING
PHYSICAL
DEVICE STOLEN
TEMPORARY PHYSICAL ACCESS
DEVICE LOST
EXPLAIN TYPES OF MALWARE IN MOBILE DEVICE
SPYWARE
EXPLOITING SOFTWARE VULNERABILITIES
RANSOMWARE
ENCRYPTING FILES OM THE HARD DRIVE
ADWARE
POPS UP ON WEBSITES
SMS MALWARE
USING A MOBILE DEVICES OR SERVICES FOR UNAUTHORIZED PURPOSES