2009/dap/policy-reqs Overview.html,1.53,1.54

Update of /sources/public/2009/dap/policy-reqs
In directory hutz:/tmp/cvs-serv16792

Modified Files:
	Overview.html 
Log Message:
additional update to security/threats section


Index: Overview.html
===================================================================
RCS file: /sources/public/2009/dap/policy-reqs/Overview.html,v
retrieving revision 1.53
retrieving revision 1.54
diff -u -d -r1.53 -r1.54
--- Overview.html	6 Jan 2011 23:35:43 -0000	1.53
+++ Overview.html	6 Jan 2011 23:39:06 -0000	1.54
@@ -365,10 +365,6 @@
       <section id="threats" class='appendix'>
         <h3>Security and Privacy Threats</h3>
         <p>
-          This section outlines some threats related to
-          the Device APIs. 
-        </p>
-        <p>
           The landscape that is being created 
           is the enablement of
           cross-platform, cross-device, easy to develop, highly functional
@@ -378,14 +374,14 @@
           increasing significance. This section outlines some known threats.
         </p>
         <p>
-          Up until now the measures taken by the mobile industry have
-          proven highly successful in ensuring no major malware incident
-          has affected the industry. There have been attempts: the
+          Up until now no major malware incident
+          has affected the mobile industry, but risks increase as
+          adoption and convergence increases. There have been attempts: the
           MMS-spreading Commwarrior virus is probably the most infamous, along
           with the Spyware tool, Flexispy. An additional factor in
-          ensuring the success of mobile security has been the fact that
-          mobile platforms have been too fragmented and complex, therefore
-          not representing an attractive target so far. Existing modus
+          avoiding mobile security issues to date has been the fact that
+          mobile platforms have been too fragmented and complex
+          to provide an attractive target. Existing modus
           operandi from technology-related attacks can provide indicators
           as to the types of attack and abuse that can be expected on
           widgets and web applications as device APIs are opened up

Received on Thursday, 6 January 2011 23:39:16 UTC