• Create BookmarkCreate Bookmark
  • Create Note or TagCreate Note or Tag
  • PrintPrint
Share this Page URL
Help

Part V: New Targets of Opportunity: Prot... > Securing Your Privacy Using Other Di...

Chapter 14. Securing Your Privacy Using Other Digital Devices

In previous chapters, we have discussed technologies that focus on the Internet because therein lies the major source of threat to your personal privacy. However, as other technologies expand and grow that take advantage of the Internet and allow access to your personal data through other methods, you will be faced with new forms of attacks. Personal digital assistants, wireless technologies, and new protocols for sharing data have the potential to compromise your personal life the same as a hacker on the Internet can.

The use of digital devices over the past several years has grown tremendously. Businesspeople as well as students carry personal digital assistants (PDAs). People pulling out their PDAs at meetings to check schedules, make notes, or to beam (transmit) each other their contact information are common sights these days. Are PDAs secure? As we have stated earlier, the introduction of new technology also brings with it security and privacy risks. Devices such as PDAs are no exception. In this chapter, we take a look at several popular PDAs currently on the market. We examine their security risks and look at how to secure some of the devices.


PREVIEW

                                                                          

Not a subscriber?

Start A Free Trial


  
  • Creative Edge
  • Create BookmarkCreate Bookmark
  • Create Note or TagCreate Note or Tag
  • PrintPrint