Skip to Main Content

PLP Minor in Cybersecurity: LU2_Week 16

Banner

Online Articles

Note: Refer to MHE Lecture 9- Mobile Attacks and Countermeasures: Slide 11

 

application sanboxing

Note: Refer to MHE Lecture 9- Mobile Attacks and Countermeasures: Slide 12

 

Note: Refer to MHE Lecture 9- Mobile Attacks and Countermeasures: Slide 21

 

Note: Refer to MHE Lecture 9- Mobile Attacks and Countermeasures: Slide 31

LinkedIn Learning

Note: Refer to MHE Lecture 9- Mobile Attacks and CountermeasuresSlide 25

Videos

Bluebugging | Here's how hackers use your Bluetooth-enabled device to steal  data | Business Standard - YouTube

Note: Refer to MHE Lecture 9- Mobile Attacks and Countermeasures: Slide 17

Note: Refer to MHE Lecture 9- Mobile Attacks and Countermeasures: Slide 17

 

Note: Refer to MHE Lecture 9- Mobile Attacks and Countermeasures: Slide 20

 

Note: Refer to MHE Lecture 9- Mobile Attacks and Countermeasures: Slide 23

 

BYOD - The Pros & Cons of Bring-Your-Own-Device - YouTube

Note: Refer to MHE Lecture 9- Mobile Attacks and Countermeasures: Slide 26