Security Challenges for Mobile Devices

Authentication is not enough as an attacker can get around it if they have the device

  • solution - Device Encryption

Cypher Block Chaining Mode

  • The encryption of a block is dependent on the previous

  • Improvement because repeated data will be different

At the system level

  • Protection needs to consider all possibilities

  • Attacker need ton find one weakness

    • Impossible to make a 100% secure system

    • Best practice is to reduce attack surface