Solved

Mobile Application Security

Posted on 2012-03-26
3
418 Views
Last Modified: 2012-03-28
We are reviewing a document on mobile application security and one of the topics is: Implement Controls to Prevent Unauthorized Access to Paid-For Resources.  Under this topic is the following comment which I need help on:

"Minimize data transfers using techniques such as fast dormancy (3GPP), caching, and others to minimize signaling load on base stations."  ...what does this mean?

I will appreciate any help understanding this comment.
0
Comment
Question by:kooolsam
  • 2
3 Comments
 
LVL 61

Accepted Solution

by:
btan earned 500 total points
ID: 37772006
Over is to minimise mobile congestion with connection and persistent connection to base station unnecessarily. At the same time to stay efficient by maximizing every connection established. This some sort alluding to content delivery network where cache is done at local some instead of always making longer trip to base station. Likewise for father normalcy the idea is not to tear down and build connection to many or unnecessarily. Sort of reducing the chance for new connection instead and optimized already established or going to established connection call...hope those make senses...one example below http://m.computerworld.com/s/article/9191759/Fast_dormancy_to_improve_smartphone_networking_and_battery_performance_?mm_ref=http%3A%2F%2Fwww.google.com%2Fsearch%3Fhl%3Den%26gl%3DGB%26ie%3DUTF-8%26source%3Dandroid-browser%26q%3Dfaster%2Bdormancy%2Bmobile%2Bbase%2Bstation
0
 

Author Closing Comment

by:kooolsam
ID: 37777279
The comments was very poor and hard to understand.  But the link provided was very, very helpful
0
 
LVL 61

Expert Comment

by:btan
ID: 37780015
Sorry as using the mobile phone as input keyboard.
0

Featured Post

Free Trending Threat Insights Every Day

Enhance your security with threat intelligence from the web. Get trending threat insights on hackers, exploits, and suspicious IP addresses delivered to your inbox with our free Cyber Daily.

Join & Write a Comment

Phishing is at the top of most security top 10 efforts you should be pursuing in 2016 and beyond. If you don't have phishing incorporated into your Security Awareness Program yet, now is the time. Phishers, and the scams they use, are only going to …
Big data transfers via information superhighways require special attention and protection. Learn more about the IT-regulations of the country where your server is located. Analyze cloud providers and their encryption systems for safe data transit. S…
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, Just open a new email message.  In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
Excel styles will make formatting consistent and let you apply and change formatting faster. In this tutorial, you'll learn how to use Excel's built-in styles, how to modify styles, and how to create your own. You'll also learn how to use your custo…

758 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

22 Experts available now in Live!

Get 1:1 Help Now