Types of Threats Against Mobile Devices and Security Protection Techniques
VerifiedAI Summary
This document discusses the different types of threats against mobile devices and how these devices are vulnerable to destruction and abuse. It proposes and justifies two security protection techniques for mobile devices and explains how they can be used to mitigate threats. The document also describes how organizations ensure the availability of web service using a Linux server and identifies Linux auditing tools to monitor and analyze web server and email server problems.