Solved

Mobile Application Security

Posted on 2012-03-26
3
422 Views
Last Modified: 2012-03-28
We are reviewing a document on mobile application security and one of the topics is: Implement Controls to Prevent Unauthorized Access to Paid-For Resources.  Under this topic is the following comment which I need help on:

"Minimize data transfers using techniques such as fast dormancy (3GPP), caching, and others to minimize signaling load on base stations."  ...what does this mean?

I will appreciate any help understanding this comment.
0
Comment
Question by:kooolsam
  • 2
3 Comments
 
LVL 62

Accepted Solution

by:
btan earned 500 total points
ID: 37772006
Over is to minimise mobile congestion with connection and persistent connection to base station unnecessarily. At the same time to stay efficient by maximizing every connection established. This some sort alluding to content delivery network where cache is done at local some instead of always making longer trip to base station. Likewise for father normalcy the idea is not to tear down and build connection to many or unnecessarily. Sort of reducing the chance for new connection instead and optimized already established or going to established connection call...hope those make senses...one example below http://m.computerworld.com/s/article/9191759/Fast_dormancy_to_improve_smartphone_networking_and_battery_performance_?mm_ref=http%3A%2F%2Fwww.google.com%2Fsearch%3Fhl%3Den%26gl%3DGB%26ie%3DUTF-8%26source%3Dandroid-browser%26q%3Dfaster%2Bdormancy%2Bmobile%2Bbase%2Bstation
0
 

Author Closing Comment

by:kooolsam
ID: 37777279
The comments was very poor and hard to understand.  But the link provided was very, very helpful
0
 
LVL 62

Expert Comment

by:btan
ID: 37780015
Sorry as using the mobile phone as input keyboard.
0

Featured Post

Three Reasons Why Backup is Strategic

Backup is strategic to your business because your data is strategic to your business. Without backup, your business will fail. This white paper explains why it is vital for you to design and immediately execute a backup strategy to protect 100 percent of your data.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Examines three attack vectors, specifically, the different types of malware used in malicious attacks, web application attacks, and finally, network based attacks.  Concludes by examining the means of securing and protecting critical systems and inf…
One of the biggest threats facing all high-value targets are APT's.  These threats include sophisticated tactics that "often starts with mapping human organization and collecting intelligence on employees, who are nowadays a weaker link than network…
Nobody understands Phishing better than an anti-spam company. That’s why we are providing Phishing Awareness Training to our customers. According to a report by Verizon, only 3% of targeted users report malicious emails to management. With compan…
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…

832 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question