• Entry
  • Reader's guide
  • Entries A-Z
  • Subject index

Mobile Security

Mobile security relies heavily on telecommunications and computing technology to provide specific, authorized persons access to one or more specific physical or digital resources. Mobile computing devices (smartphones, tablet computers, laptop computers) may connect to public, corporate, and enterprise networks, as well as the Internet. Physical or hard tokens (payment cards, key cards, USB devices, PIN tokens) and software or soft tokens (smartphone apps) also provide mobile users access to payment systems, networks, applications, or physical spaces. Tokens are often used as part of a multifactor authentication scheme that requires users to present something they have along with something they know (password, personal identification number [PIN]). Some tokens use near field communications to present credentials without a physical connection. This approach is commonly used ...

    • Loading...
    locked icon

    Sign in to access this content

    Get a 30 day FREE TRIAL

    • Watch videos from a variety of sources bringing classroom topics to life
    • Read modern, diverse business cases
    • Explore hundreds of books and reference titles