article - acces control using smartphones€¦ · in any case, data stored in a mobile application...

2
JUNE - 2017 GIT SECURITY - JUNE 2017 Article - ACCES CONTROL USING SMARTPHONES Press_06_2017_GIT_SECURITY_CONTROL_ACCES_ARTICLE_US_1/2

Upload: others

Post on 19-Jul-2020

0 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Article - ACCES CONTROL USING SMARTPHONES€¦ · In any case, data stored in a mobile application and any data exchanges must be secured using encryption and obfuscation methods

JUNE - 2017

GIT SECURITY - JUNE 2017

Article - ACCES CONTROL USING SMARTPHONES

Pres

s_06

_201

7_G

IT_S

ECU

RIT

Y_CO

NTR

OL_

ACCES

_ART

ICLE

_US_1

/2

Page 2: Article - ACCES CONTROL USING SMARTPHONES€¦ · In any case, data stored in a mobile application and any data exchanges must be secured using encryption and obfuscation methods

JUNE - 2017

Article - ACCES CONTROL USING SMARTPHONES

Pres

s_06

_201

7_G

IT_S

ECU

RIT

Y_CO

NTR

OL_

ACCES

_ART

ICLE

_US_2

/2

GIT SECURITY - JUNE 2017