Securing the apps, adapters, connections, and data
Security is important for mobile devices and applications
because they face challenges and threats that are not as commonplace
on servers and personal computers.
See the following topics for guidance on how to construct secure
mobile applications.
Types of information security
Information security is accomplished through compliance
to a number of security principles.
Information security and mobile applications: overview
Mobile devices have information security requirements that
are unique when compared with traditional fixed assets (for example,
servers, desktop computers and, to a lesser extent, notebook computers).
Worklight mobile application security
To produce secure mobile applications, you must apply security
principles and techniques to the implementation and configuration
of your Worklight mobile applications, adapters, data, and web resources.