Software vulnerability research + cell phone q&a

Please answer both questions with no more that 250 words for each

1. Our task in this week’s conference is to discuss, mobile phones (including smart phones and tablets). with an emphasis on an auditing system for such phones/devices.  The solution space should be applicable to phones brought to work as well as to  phones that are not brought to work.  

Don't use plagiarized sources. Get Your Custom Essay on
Software vulnerability research + cell phone q&a
Just from $13/Page
Order Essay

Let’s have a robust and lively dialogue with respect to the following questions:  

  1. What do you need to log/audit in a mobile phone? Why?  
  2. How is that different from auditing a desktop/laptop/server?
  3.  What tools, methodologies, or frameworks are available to assist us in detecting vulnerabilities and auditing issues in the mobile phone environment?
  4. Is privacy sufficiently catered for? If not how it could be addressed better?

2. Provide in a paragraph a list of pro’s and con’s for the NESSUS vulnerability tool scanner. 

Calculator

Calculate the price of your paper

Total price:$26
Our features

We've got everything to become your favourite writing service

Need a better grade?
We've got you covered.

Order your paper