. "Als Kryptohandys werden abh\u00F6rsichere Mobiltelefone bezeichnet."@de . . "La s\u00E9curit\u00E9 logicielle des smartphones ou s\u00E9curit\u00E9 logicielle des t\u00E9l\u00E9phones intelligents est devenue une pr\u00E9occupation de plus en plus importante de l'informatique li\u00E9e \u00E0 la t\u00E9l\u00E9phonie mobile. Elle est particuli\u00E8rement pr\u00E9occupante car elle concerne la s\u00E9curit\u00E9 des informations personnelles disponibles au sein des smartphones. De plus en plus d'utilisateurs et d'entreprises utilisent au jour le jour des smartphones comme outils de communication mais aussi pour la planification, la gestion et l'organisation de leurs vies professionnelle et priv\u00E9e. Au sein des entreprises, ces techniques sont \u00E0 l'origine de profonds bouleversements dans l'organisation des syst\u00E8mes d'information et par cons\u00E9quent elles deviennent la source de nouveaux risques. En effet, les smartphones collectent et compilent un nombre croissant d'informations sensibles dont l'acc\u00E8s doit \u00EAtre contr\u00F4l\u00E9 afin de prot\u00E9ger la vie priv\u00E9e de l'usager et ce qui est du domaine de la propri\u00E9t\u00E9 intellectuelle de l'entreprise. Tout comme les ordinateurs, les smartphones sont des cibles privil\u00E9gi\u00E9es d'attaques. Ces attaques exploitent plusieurs faiblesses li\u00E9es au smartphone: cela peut provenir des moyens de communications comme les SMS/MMS et les r\u00E9seaux Wi-Fi et GSM. Ensuite des vuln\u00E9rabilit\u00E9s aux attaques exploitant les failles logicielles qui peuvent provenir aussi bien du navigateur web que du syst\u00E8me. Et enfin des logiciels malveillants qui le plus souvent comptent sur les faibles connaissances d'un utilisateur commun. Diff\u00E9rentes contre-mesures sont d\u00E9velopp\u00E9es et appos\u00E9es sur les terminaux au fil de leur d\u00E9veloppement, sur chacune des couches logicielles, jusqu'\u00E0 la diffusion d'information \u00E0 l'utilisateur final de la machine. Il y a des bonnes pratiques \u00E0 respecter \u00E0 tous les niveaux, de la conception \u00E0 l'utilisation, en passant par le d\u00E9veloppement des syst\u00E8mes d'exploitation, des couches logicielles, des applications t\u00E9l\u00E9chargeables sur les kiosques destin\u00E9s \u00E0 cet effet."@fr . . . . . . . "S\u00E9curit\u00E9 logicielle des smartphones"@fr . . . . . . . . . . . . . . . . . . . . . . . . . . . "\u79FB\u52D5\u5B89\u5168"@zh . . . . "\u0422\u0435\u0445\u043D\u043E\u043B\u043E\u0433\u0438\u0438 \u0437\u0430\u0449\u0438\u0442\u044B \u0442\u0435\u043B\u0435\u0444\u043E\u043D\u043D\u044B\u0445 \u043F\u0435\u0440\u0435\u0433\u043E\u0432\u043E\u0440\u043E\u0432"@ru . "Mobile security, or mobile device security, is the protection of smartphones, tablets, and laptops from threats associated with wireless computing. It has become increasingly important in mobile computing. The security of personal and business information now stored on smartphones is of particular concern. More and more users and businesses use smartphones not only to communicate, but also to plan and organize both their users' work and private life. Within companies, these technologies are causing profound changes in the organization of information systems and have therefore become the source of new risks. Indeed, smartphones collect and compile an increasing amount of sensitive information to which access must be controlled to protect the privacy of the user and the intellectual property of the company. All smartphones, as computers, are preferred targets of attacks. This is because these devices have family photos, pictures of pets, passwords, and more. For attackers, these items are a digital passport to access everything they would need to know about a person. This is why attacks on mobile devices are on the rise. These attacks exploit weaknesses inherent in smartphones that come from the communication mode\u2014like Short Message Service (SMS, aka text messaging), Multimedia Messaging Service (MMS), WiFi, Bluetooth and GSM, the de facto global standard for mobile communications. There are also exploits that target software vulnerabilities in the browser or operating system, taking advantages of the weak knowledge of an average user. Security countermeasures are being developed and applied to smartphones, from security in different layers of software to the dissemination of information to end users. There are practices to be observed at all levels, from design to use, through the development of operating systems, software layers, and downloadable apps."@en . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . "Mobile security"@en . . . . . . . . . "La telefon\u00EDa m\u00F3vil se caracteriza por ser un sistema de protecci\u00F3n y comunicaci\u00F3n ampliamente difundido debido a su f\u00E1cil acceso, conectividad y versatilidad. Los tel\u00E9fonos inteligentes (smartphones) cuentan con sistemas operativos similares a un ordenador, y tienen la ventaja del uso de redes geogr\u00E1ficamente distribuidas a nivel global. Lo cual los hace vulnerables a riesgos derivados por virus o ataques inform\u00E1ticos."@es . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . "La telefon\u00EDa m\u00F3vil se caracteriza por ser un sistema de protecci\u00F3n y comunicaci\u00F3n ampliamente difundido debido a su f\u00E1cil acceso, conectividad y versatilidad. Los tel\u00E9fonos inteligentes (smartphones) cuentan con sistemas operativos similares a un ordenador, y tienen la ventaja del uso de redes geogr\u00E1ficamente distribuidas a nivel global. Lo cual los hace vulnerables a riesgos derivados por virus o ataques inform\u00E1ticos."@es . "\u0623\u0645\u0646 \u0627\u0644\u0647\u0627\u062A\u0641 \u0627\u0644\u0645\u062D\u0645\u0648\u0644"@ar . . . . . . . . . . . . . . . . "Seguretat en la telefonia m\u00F2bil"@ca . . . . . . . . . . . . . . . "Kryptohandy"@de . . . . "La telefonia m\u00F2bil es caracteritza per ser un sistema de comunicaci\u00F3 molt dif\u00F3s a causa del seu f\u00E0cil acc\u00E9s, connectivitat i versatilitat. Els tel\u00E8fons intel\u00B7ligents compten amb sistemes operatius similars a un ordinador, i tenen com a avantatges de l'\u00FAs de xarxes geogr\u00E0ficament distribu\u00EFdes a escala global. Per\u00F2 aquest avantatge comporta un desavantatges, ja que aix\u00F2 els fa vulnerables als riscos derivats per virus o atacs inform\u00E0tics."@ca . . . "\u0623\u0645\u0646 \u0627\u0644\u0647\u0648\u0627\u062A\u0641 \u0627\u0644\u0630\u0643\u064A\u0629 \u0623\u0635\u0628\u062D \u0623\u0645\u0646 \u0627\u0644\u0647\u0648\u0627\u062A\u0641 \u0630\u0627 \u0623\u0647\u0645\u064A\u0629 \u0643\u0628\u064A\u0631\u0629\u060C \u0648\u0630\u0644\u0643 \u0628\u0633\u0628\u0628 \u0627\u0644\u062A\u0648\u0633\u0639 \u0641\u064A \u0627\u0646\u062A\u0634\u0627\u0631 \u0627\u0644\u0647\u0648\u0627\u062A\u0641 \u0627\u0644\u0646\u0642\u0627\u0644\u0629 (\u0627\u0644\u0630\u0643\u064A\u0629). \u0648\u0645\u0645\u0627 \u064A\u062B\u064A\u0631 \u0627\u0644\u0642\u0644\u0642 \u0628\u0634\u0643\u0644 \u062E\u0627\u0635 \u0647\u0648 \u0623\u0645\u0646 \u0627\u0644\u0645\u0639\u0644\u0648\u0645\u0627\u062A \u0627\u0644\u0634\u062E\u0635\u064A\u0629 \u0648\u0627\u0644\u062A\u062C\u0627\u0631\u064A\u0629 \u0627\u0644\u0645\u062E\u0632\u0646\u0629 \u0627\u0644\u0622\u0646 \u0639\u0644\u0649 \u0627\u0644\u0647\u0648\u0627\u062A\u0641 \u0627\u0644\u0630\u0643\u064A\u0629. \u0643\u0645\u0627 \u0623\u0646 \u0627\u0644\u0643\u062B\u064A\u0631 \u0645\u0646 \u0645\u0633\u062A\u062E\u062F\u0645\u064A \u0627\u0644\u0625\u0646\u062A\u0631\u0646\u062A \u064A\u0633\u062A\u062E\u062F\u0645\u0648\u0646 \u0627\u0644\u0647\u0648\u0627\u062A\u0641 \u0627\u0644\u0630\u0643\u064A\u0629 \u0645\u062B\u0644 \u0648\u0633\u0627\u0626\u0644 \u0627\u0644\u0627\u062A\u0635\u0627\u0644\u060C \u0623\u064A\u0636\u0627\u064B \u0643\u0648\u0633\u064A\u0644\u0629 \u0644\u062A\u062E\u0637\u064A\u0637 \u0648\u062A\u0646\u0638\u064A\u0645 \u0639\u0645\u0644\u0647\u0645 \u0648\u062D\u064A\u0627\u062A\u0647\u0645 \u0627\u0644\u062E\u0627\u0635\u0629. \u0627\u0644\u0647\u0648\u0627\u062A\u0641 \u0627\u0644\u0630\u0643\u064A\u0629 \u062A\u062D\u062A\u0648\u064A \u0639\u0644\u0649 \u0643\u0645\u064A\u0629 \u0643\u0628\u064A\u0631\u0629 \u0645\u0646 \u0627\u0644\u0645\u0639\u0644\u0648\u0645\u0627\u062A \u0627\u0644\u062D\u0633\u0627\u0633\u0629 \u0627\u0644\u062A\u064A \u064A\u062C\u0628 \u0627\u0644\u062D\u0641\u0627\u0638 \u0639\u0644\u064A\u0647\u0627 \u0648\u062D\u0645\u0627\u064A\u062A\u0647\u0627. \u0643\u0645\u0627 \u064A\u062C\u0628 \u0645\u0639\u0631\u0641\u0629 \u0623\u0646 \u062C\u0645\u064A\u0639 \u0627\u0644\u0647\u0648\u0627\u062A\u0641 \u0627\u0644\u0630\u0643\u064A\u0629\u060C \u0648\u0623\u062C\u0647\u0632\u0629 \u0627\u0644\u062D\u0627\u0633\u0648\u0628 \u0647\u064A \u0627\u0644\u0623\u0647\u062F\u0627\u0641 \u0627\u0644\u0645\u0641\u0636\u0644\u0629 \u0644\u0644\u0647\u062C\u0645\u0627\u062A. \u0648\u0647\u0630\u0647 \u0627\u0644\u0647\u062C\u0645\u0627\u062A \u063A\u0627\u0644\u0628\u0627\u064B \u0645\u0627 \u062A\u0633\u062A\u063A\u0644 \u0646\u0642\u0627\u0637 \u0627\u0644\u0636\u0639\u0641 \u0627\u0644\u0645\u062A\u0639\u0644\u0642\u0629 \u0628\u0627\u0644\u0647\u0648\u0627\u062A\u0641 \u0627\u0644\u0630\u0643\u064A\u0629 \u0627\u0644\u062A\u064A \u064A\u0645\u0643\u0646 \u0623\u0646 \u062A\u0623\u062A\u064A \u0645\u0646 \u0648\u0633\u0627\u0626\u0644 \u0627\u0644\u0627\u062A\u0635\u0627\u0644 \u0645\u062B\u0644 \u062E\u062F\u0645\u0629 \u0627\u0644\u0631\u0633\u0627\u0626\u0644 \u0627\u0644\u0642\u0635\u064A\u0631\u0629 (SMS)\u060C \u0648\u062E\u062F\u0645\u0629 \u0627\u0644\u0631\u0633\u0627\u0626\u0644 \u0645\u062A\u0639\u062F\u062F\u0629 \u0627\u0644\u0648\u0633\u0627\u0626\u0637 (MMS)\u060C \u0648\u062C\u064A \u0627\u0633 \u0627\u0645 (GSM) \u0648\u0634\u0628\u0643\u0627\u062A \u0627\u0644\u0648\u0627\u064A \u0641\u0627\u064A (Wi-Fi)."@ar . . . . . . . . . . . . "\u0623\u0645\u0646 \u0627\u0644\u0647\u0648\u0627\u062A\u0641 \u0627\u0644\u0630\u0643\u064A\u0629 \u0623\u0635\u0628\u062D \u0623\u0645\u0646 \u0627\u0644\u0647\u0648\u0627\u062A\u0641 \u0630\u0627 \u0623\u0647\u0645\u064A\u0629 \u0643\u0628\u064A\u0631\u0629\u060C \u0648\u0630\u0644\u0643 \u0628\u0633\u0628\u0628 \u0627\u0644\u062A\u0648\u0633\u0639 \u0641\u064A \u0627\u0646\u062A\u0634\u0627\u0631 \u0627\u0644\u0647\u0648\u0627\u062A\u0641 \u0627\u0644\u0646\u0642\u0627\u0644\u0629 (\u0627\u0644\u0630\u0643\u064A\u0629). \u0648\u0645\u0645\u0627 \u064A\u062B\u064A\u0631 \u0627\u0644\u0642\u0644\u0642 \u0628\u0634\u0643\u0644 \u062E\u0627\u0635 \u0647\u0648 \u0623\u0645\u0646 \u0627\u0644\u0645\u0639\u0644\u0648\u0645\u0627\u062A \u0627\u0644\u0634\u062E\u0635\u064A\u0629 \u0648\u0627\u0644\u062A\u062C\u0627\u0631\u064A\u0629 \u0627\u0644\u0645\u062E\u0632\u0646\u0629 \u0627\u0644\u0622\u0646 \u0639\u0644\u0649 \u0627\u0644\u0647\u0648\u0627\u062A\u0641 \u0627\u0644\u0630\u0643\u064A\u0629. \u0643\u0645\u0627 \u0623\u0646 \u0627\u0644\u0643\u062B\u064A\u0631 \u0645\u0646 \u0645\u0633\u062A\u062E\u062F\u0645\u064A \u0627\u0644\u0625\u0646\u062A\u0631\u0646\u062A \u064A\u0633\u062A\u062E\u062F\u0645\u0648\u0646 \u0627\u0644\u0647\u0648\u0627\u062A\u0641 \u0627\u0644\u0630\u0643\u064A\u0629 \u0645\u062B\u0644 \u0648\u0633\u0627\u0626\u0644 \u0627\u0644\u0627\u062A\u0635\u0627\u0644\u060C \u0623\u064A\u0636\u0627\u064B \u0643\u0648\u0633\u064A\u0644\u0629 \u0644\u062A\u062E\u0637\u064A\u0637 \u0648\u062A\u0646\u0638\u064A\u0645 \u0639\u0645\u0644\u0647\u0645 \u0648\u062D\u064A\u0627\u062A\u0647\u0645 \u0627\u0644\u062E\u0627\u0635\u0629. \u0627\u0644\u0647\u0648\u0627\u062A\u0641 \u0627\u0644\u0630\u0643\u064A\u0629 \u062A\u062D\u062A\u0648\u064A \u0639\u0644\u0649 \u0643\u0645\u064A\u0629 \u0643\u0628\u064A\u0631\u0629 \u0645\u0646 \u0627\u0644\u0645\u0639\u0644\u0648\u0645\u0627\u062A \u0627\u0644\u062D\u0633\u0627\u0633\u0629 \u0627\u0644\u062A\u064A \u064A\u062C\u0628 \u0627\u0644\u062D\u0641\u0627\u0638 \u0639\u0644\u064A\u0647\u0627 \u0648\u062D\u0645\u0627\u064A\u062A\u0647\u0627. \u0643\u0645\u0627 \u064A\u062C\u0628 \u0645\u0639\u0631\u0641\u0629 \u0623\u0646 \u062C\u0645\u064A\u0639 \u0627\u0644\u0647\u0648\u0627\u062A\u0641 \u0627\u0644\u0630\u0643\u064A\u0629\u060C \u0648\u0623\u062C\u0647\u0632\u0629 \u0627\u0644\u062D\u0627\u0633\u0648\u0628 \u0647\u064A \u0627\u0644\u0623\u0647\u062F\u0627\u0641 \u0627\u0644\u0645\u0641\u0636\u0644\u0629 \u0644\u0644\u0647\u062C\u0645\u0627\u062A. \u0648\u0647\u0630\u0647 \u0627\u0644\u0647\u062C\u0645\u0627\u062A \u063A\u0627\u0644\u0628\u0627\u064B \u0645\u0627 \u062A\u0633\u062A\u063A\u0644 \u0646\u0642\u0627\u0637 \u0627\u0644\u0636\u0639\u0641 \u0627\u0644\u0645\u062A\u0639\u0644\u0642\u0629 \u0628\u0627\u0644\u0647\u0648\u0627\u062A\u0641 \u0627\u0644\u0630\u0643\u064A\u0629 \u0627\u0644\u062A\u064A \u064A\u0645\u0643\u0646 \u0623\u0646 \u062A\u0623\u062A\u064A \u0645\u0646 \u0648\u0633\u0627\u0626\u0644 \u0627\u0644\u0627\u062A\u0635\u0627\u0644 \u0645\u062B\u0644 \u062E\u062F\u0645\u0629 \u0627\u0644\u0631\u0633\u0627\u0626\u0644 \u0627\u0644\u0642\u0635\u064A\u0631\u0629 (SMS)\u060C \u0648\u062E\u062F\u0645\u0629 \u0627\u0644\u0631\u0633\u0627\u0626\u0644 \u0645\u062A\u0639\u062F\u062F\u0629 \u0627\u0644\u0648\u0633\u0627\u0626\u0637 (MMS)\u060C \u0648\u062C\u064A \u0627\u0633 \u0627\u0645 (GSM) \u0648\u0634\u0628\u0643\u0627\u062A \u0627\u0644\u0648\u0627\u064A \u0641\u0627\u064A (Wi-Fi)."@ar . . . . . . . . . . . . . "Seguridad en telefon\u00EDa m\u00F3vil"@es . . . . . . . . "\u79FB\u52D5\u5B89\u5168\uFF08\u82F1\u8A9E\uFF1AMobile security\uFF09\u6216\u66F4\u7CBE\u78BA\u7684\u8AAA\u6CD5\u70BA\u79FB\u52D5\u8A2D\u5099\u5B89\u5168\uFF08\u82F1\u8A9E\uFF1AMobile device security\uFF09\uFF0C\u662F\u4E00\u7A2E\u4FDD\u8B77\u667A\u80FD\u624B\u673A\u3001\u5E73\u677F\u96FB\u8166\u548C\u7B46\u8A18\u578B\u96FB\u8166\u4E0D\u7528\u53D7\u5230\u8207\u65E0\u7EBF\u7F51\u7EDC\u76F8\u95DC\u7684\u5A01\u8105\uFF0C\u5B83\u5728\u79FB\u52A8\u8BA1\u7B97\u4E2D\u8B8A\u5F97\u8D8A\u4F86\u8D8A\u91CD\u8981\u3002\u800C\u8F03\u503C\u5F97\u95DC\u6CE8\u7684\u662F\uFF0C\u76EE\u524D\u5132\u5B58\u5728\u667A\u6167\u624B\u6A5F\u4E0A\u7684\u500B\u4EBA\u548C\u5546\u696D\u4FE1\u606F\u7684\u5B89\u5168\u6027\u3002"@zh . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . "Als Kryptohandys werden abh\u00F6rsichere Mobiltelefone bezeichnet."@de . . . . . . . . . . . . . . "La telefonia m\u00F2bil es caracteritza per ser un sistema de comunicaci\u00F3 molt dif\u00F3s a causa del seu f\u00E0cil acc\u00E9s, connectivitat i versatilitat. Els tel\u00E8fons intel\u00B7ligents compten amb sistemes operatius similars a un ordinador, i tenen com a avantatges de l'\u00FAs de xarxes geogr\u00E0ficament distribu\u00EFdes a escala global. Per\u00F2 aquest avantatge comporta un desavantatges, ja que aix\u00F2 els fa vulnerables als riscos derivats per virus o atacs inform\u00E0tics."@ca . . . . . "La s\u00E9curit\u00E9 logicielle des smartphones ou s\u00E9curit\u00E9 logicielle des t\u00E9l\u00E9phones intelligents est devenue une pr\u00E9occupation de plus en plus importante de l'informatique li\u00E9e \u00E0 la t\u00E9l\u00E9phonie mobile. Elle est particuli\u00E8rement pr\u00E9occupante car elle concerne la s\u00E9curit\u00E9 des informations personnelles disponibles au sein des smartphones."@fr . . . . "1121163725"^^ . . . "\u0422\u0435\u0445\u043D\u043E\u043B\u043E\u0433\u0438\u0438 \u0437\u0430\u0449\u0438\u0442\u044B \u0442\u0435\u043B\u0435\u0444\u043E\u043D\u043D\u044B\u0445 \u043F\u0435\u0440\u0435\u0433\u043E\u0432\u043E\u0440\u043E\u0432 \u2014 \u043C\u0435\u0442\u043E\u0434\u044B \u0438 \u0441\u0440\u0435\u0434\u0441\u0442\u0432\u0430 \u0437\u0430\u0449\u0438\u0442\u044B, \u043D\u0430\u043F\u0440\u0430\u0432\u043B\u0435\u043D\u043D\u044B\u0435 \u043D\u0430 \u043E\u0431\u0435\u0441\u043F\u0435\u0447\u0435\u043D\u0438\u0435 \u043A\u043E\u043D\u0444\u0438\u0434\u0435\u043D\u0446\u0438\u0430\u043B\u044C\u043D\u043E\u0441\u0442\u0438 \u043E\u0431\u043C\u0435\u043D\u0430 \u0438\u043D\u0444\u043E\u0440\u043C\u0430\u0446\u0438\u0435\u0439 \u043C\u0435\u0436\u0434\u0443 \u0430\u0431\u043E\u043D\u0435\u043D\u0442\u0430\u043C\u0438. \u041A\u043E\u043D\u0442\u0440\u043E\u043B\u044C \u0442\u0435\u043B\u0435\u0444\u043E\u043D\u043D\u044B\u0445 \u043F\u0435\u0440\u0435\u0433\u043E\u0432\u043E\u0440\u043E\u0432 \u043E\u0441\u0442\u0430\u0435\u0442\u0441\u044F \u043E\u0434\u043D\u0438\u043C \u0438\u0437 \u043D\u0430\u0438\u0431\u043E\u043B\u0435\u0435 \u0440\u0430\u0441\u043F\u0440\u043E\u0441\u0442\u0440\u0430\u043D\u0435\u043D\u043D\u044B\u0445 \u0432\u0438\u0434\u043E\u0432 \u043F\u0440\u043E\u043C\u044B\u0448\u043B\u0435\u043D\u043D\u043E\u0433\u043E \u0448\u043F\u0438\u043E\u043D\u0430\u0436\u0430 \u0438 \u0434\u0435\u0439\u0441\u0442\u0432\u0438\u0439 \u043F\u0440\u0435\u0441\u0442\u0443\u043F\u043D\u044B\u0445 \u044D\u043B\u0435\u043C\u0435\u043D\u0442\u043E\u0432. \u041F\u0440\u0438\u0447\u0438\u043D\u044B \u043F\u0440\u043E\u0441\u0442\u044B \u2014 \u043D\u0438\u0437\u043A\u0438\u0439 \u0443\u0440\u043E\u0432\u0435\u043D\u044C \u0437\u0430\u0442\u0440\u0430\u0442 \u0438 \u0440\u0438\u0441\u043A \u0440\u0435\u0430\u043B\u0438\u0437\u0430\u0446\u0438\u0438 \u0443\u0433\u0440\u043E\u0437, \u043D\u0435\u043E\u0431\u044F\u0437\u0430\u0442\u0435\u043B\u044C\u043D\u043E\u0441\u0442\u044C \u0437\u0430\u0445\u043E\u0434\u0430 \u0432 \u043A\u043E\u043D\u0442\u0440\u043E\u043B\u0438\u0440\u0443\u0435\u043C\u043E\u0435 \u043F\u043E\u043C\u0435\u0449\u0435\u043D\u0438\u0435, \u0440\u0430\u0437\u043D\u043E\u043E\u0431\u0440\u0430\u0437\u0438\u0435 \u0441\u043F\u043E\u0441\u043E\u0431\u043E\u0432 \u0438 \u043C\u0435\u0441\u0442 \u0441\u044A\u0451\u043C\u0430 \u0438\u043D\u0444\u043E\u0440\u043C\u0430\u0446\u0438\u0438 \u0438 \u043F\u0440. \u041A\u043E\u043D\u0442\u0440\u043E\u043B\u0438\u0440\u043E\u0432\u0430\u0442\u044C \u0442\u0435\u043B\u0435\u0444\u043E\u043D\u043D\u044B\u0435 \u0440\u0430\u0437\u0433\u043E\u0432\u043E\u0440\u044B \u043C\u043E\u0436\u043D\u043E \u043D\u0430 \u0432\u0441\u0435\u043C \u043F\u0440\u043E\u0442\u044F\u0436\u0435\u043D\u0438\u0438 \u0442\u0435\u043B\u0435\u0444\u043E\u043D\u043D\u043E\u0439 \u043B\u0438\u043D\u0438\u0438, \u0430 \u043F\u0440\u0438 \u0438\u0441\u043F\u043E\u043B\u044C\u0437\u043E\u0432\u0430\u043D\u0438\u0438 \u0441\u043E\u0442\u043E\u0432\u043E\u0439 \u0442\u0435\u043B\u0435\u0444\u043E\u043D\u043D\u043E\u0439 \u0441\u0432\u044F\u0437\u0438 \u2014 \u0432\u043E \u0432\u0441\u0435\u0439 \u0441\u043E\u0442\u043E\u0432\u043E\u0439 \u0437\u043E\u043D\u0435. \u0423\u0447\u0438\u0442\u044B\u0432\u0430\u044F \u043D\u044B\u043D\u0435\u0448\u043D\u044E\u044E \u0441\u0442\u043E\u0438\u043C\u043E\u0441\u0442\u044C \u0438\u043D\u0444\u043E\u0440\u043C\u0430\u0446\u0438\u0438, \u0442\u0435\u0445\u043D\u043E\u043B\u043E\u0433\u0438\u0438 \u0438 \u0441\u043F\u043E\u0441\u043E\u0431\u044B \u0437\u0430\u0449\u0438\u0442\u044B \u0442\u0435\u043B\u0435\u0444\u043E\u043D\u043D\u044B\u0445 \u043F\u0435\u0440\u0435\u0433\u043E\u0432\u043E\u0440\u043E\u0432 \u0431\u0443\u0434\u0443\u0442 \u0441\u0442\u0440\u0435\u043C\u0438\u0442\u0435\u043B\u044C\u043D\u043E \u0440\u0430\u0437\u0432\u0438\u0432\u0430\u0442\u044C\u0441\u044F \u0438 \u044D\u0432\u043E\u043B\u044E\u0446\u0438\u043E\u043D\u0438\u0440\u043E\u0432\u0430\u0442\u044C."@ru . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . "30500317"^^ . . "\u0422\u0435\u0445\u043D\u043E\u043B\u043E\u0433\u0438\u0438 \u0437\u0430\u0449\u0438\u0442\u044B \u0442\u0435\u043B\u0435\u0444\u043E\u043D\u043D\u044B\u0445 \u043F\u0435\u0440\u0435\u0433\u043E\u0432\u043E\u0440\u043E\u0432 \u2014 \u043C\u0435\u0442\u043E\u0434\u044B \u0438 \u0441\u0440\u0435\u0434\u0441\u0442\u0432\u0430 \u0437\u0430\u0449\u0438\u0442\u044B, \u043D\u0430\u043F\u0440\u0430\u0432\u043B\u0435\u043D\u043D\u044B\u0435 \u043D\u0430 \u043E\u0431\u0435\u0441\u043F\u0435\u0447\u0435\u043D\u0438\u0435 \u043A\u043E\u043D\u0444\u0438\u0434\u0435\u043D\u0446\u0438\u0430\u043B\u044C\u043D\u043E\u0441\u0442\u0438 \u043E\u0431\u043C\u0435\u043D\u0430 \u0438\u043D\u0444\u043E\u0440\u043C\u0430\u0446\u0438\u0435\u0439 \u043C\u0435\u0436\u0434\u0443 \u0430\u0431\u043E\u043D\u0435\u043D\u0442\u0430\u043C\u0438. \u041A\u043E\u043D\u0442\u0440\u043E\u043B\u044C \u0442\u0435\u043B\u0435\u0444\u043E\u043D\u043D\u044B\u0445 \u043F\u0435\u0440\u0435\u0433\u043E\u0432\u043E\u0440\u043E\u0432 \u043E\u0441\u0442\u0430\u0435\u0442\u0441\u044F \u043E\u0434\u043D\u0438\u043C \u0438\u0437 \u043D\u0430\u0438\u0431\u043E\u043B\u0435\u0435 \u0440\u0430\u0441\u043F\u0440\u043E\u0441\u0442\u0440\u0430\u043D\u0435\u043D\u043D\u044B\u0445 \u0432\u0438\u0434\u043E\u0432 \u043F\u0440\u043E\u043C\u044B\u0448\u043B\u0435\u043D\u043D\u043E\u0433\u043E \u0448\u043F\u0438\u043E\u043D\u0430\u0436\u0430 \u0438 \u0434\u0435\u0439\u0441\u0442\u0432\u0438\u0439 \u043F\u0440\u0435\u0441\u0442\u0443\u043F\u043D\u044B\u0445 \u044D\u043B\u0435\u043C\u0435\u043D\u0442\u043E\u0432. \u041F\u0440\u0438\u0447\u0438\u043D\u044B \u043F\u0440\u043E\u0441\u0442\u044B \u2014 \u043D\u0438\u0437\u043A\u0438\u0439 \u0443\u0440\u043E\u0432\u0435\u043D\u044C \u0437\u0430\u0442\u0440\u0430\u0442 \u0438 \u0440\u0438\u0441\u043A \u0440\u0435\u0430\u043B\u0438\u0437\u0430\u0446\u0438\u0438 \u0443\u0433\u0440\u043E\u0437, \u043D\u0435\u043E\u0431\u044F\u0437\u0430\u0442\u0435\u043B\u044C\u043D\u043E\u0441\u0442\u044C \u0437\u0430\u0445\u043E\u0434\u0430 \u0432 \u043A\u043E\u043D\u0442\u0440\u043E\u043B\u0438\u0440\u0443\u0435\u043C\u043E\u0435 \u043F\u043E\u043C\u0435\u0449\u0435\u043D\u0438\u0435, \u0440\u0430\u0437\u043D\u043E\u043E\u0431\u0440\u0430\u0437\u0438\u0435 \u0441\u043F\u043E\u0441\u043E\u0431\u043E\u0432 \u0438 \u043C\u0435\u0441\u0442 \u0441\u044A\u0451\u043C\u0430 \u0438\u043D\u0444\u043E\u0440\u043C\u0430\u0446\u0438\u0438 \u0438 \u043F\u0440. \u041A\u043E\u043D\u0442\u0440\u043E\u043B\u0438\u0440\u043E\u0432\u0430\u0442\u044C \u0442\u0435\u043B\u0435\u0444\u043E\u043D\u043D\u044B\u0435 \u0440\u0430\u0437\u0433\u043E\u0432\u043E\u0440\u044B \u043C\u043E\u0436\u043D\u043E \u043D\u0430 \u0432\u0441\u0435\u043C \u043F\u0440\u043E\u0442\u044F\u0436\u0435\u043D\u0438\u0438 \u0442\u0435\u043B\u0435\u0444\u043E\u043D\u043D\u043E\u0439 \u043B\u0438\u043D\u0438\u0438, \u0430 \u043F\u0440\u0438 \u0438\u0441\u043F\u043E\u043B\u044C\u0437\u043E\u0432\u0430\u043D\u0438\u0438 \u0441\u043E\u0442\u043E\u0432\u043E\u0439 \u0442\u0435\u043B\u0435\u0444\u043E\u043D\u043D\u043E\u0439 \u0441\u0432\u044F\u0437\u0438 \u2014 \u0432\u043E \u0432\u0441\u0435\u0439 \u0441\u043E\u0442\u043E\u0432\u043E\u0439 \u0437\u043E\u043D\u0435. \u0423\u0447\u0438\u0442\u044B\u0432\u0430\u044F \u043D\u044B\u043D\u0435\u0448\u043D\u044E\u044E \u0441\u0442\u043E\u0438\u043C\u043E\u0441\u0442\u044C \u0438\u043D\u0444\u043E\u0440\u043C\u0430\u0446\u0438\u0438, \u0442\u0435\u0445\u043D\u043E\u043B\u043E\u0433\u0438\u0438 \u0438 \u0441\u043F\u043E\u0441\u043E\u0431\u044B \u0437\u0430\u0449\u0438\u0442\u044B \u0442\u0435\u043B\u0435\u0444\u043E\u043D\u043D\u044B\u0445 \u043F\u0435\u0440\u0435\u0433\u043E\u0432\u043E\u0440\u043E\u0432 \u0431\u0443\u0434\u0443\u0442 \u0441\u0442\u0440\u0435\u043C\u0438\u0442\u0435\u043B\u044C\u043D\u043E \u0440\u0430\u0437\u0432\u0438\u0432\u0430\u0442\u044C\u0441\u044F \u0438 \u044D\u0432\u043E\u043B\u044E\u0446\u0438\u043E\u043D\u0438\u0440\u043E\u0432\u0430\u0442\u044C."@ru . . . . . . . . . . . . "\u79FB\u52D5\u5B89\u5168\uFF08\u82F1\u8A9E\uFF1AMobile security\uFF09\u6216\u66F4\u7CBE\u78BA\u7684\u8AAA\u6CD5\u70BA\u79FB\u52D5\u8A2D\u5099\u5B89\u5168\uFF08\u82F1\u8A9E\uFF1AMobile device security\uFF09\uFF0C\u662F\u4E00\u7A2E\u4FDD\u8B77\u667A\u80FD\u624B\u673A\u3001\u5E73\u677F\u96FB\u8166\u548C\u7B46\u8A18\u578B\u96FB\u8166\u4E0D\u7528\u53D7\u5230\u8207\u65E0\u7EBF\u7F51\u7EDC\u76F8\u95DC\u7684\u5A01\u8105\uFF0C\u5B83\u5728\u79FB\u52A8\u8BA1\u7B97\u4E2D\u8B8A\u5F97\u8D8A\u4F86\u8D8A\u91CD\u8981\u3002\u800C\u8F03\u503C\u5F97\u95DC\u6CE8\u7684\u662F\uFF0C\u76EE\u524D\u5132\u5B58\u5728\u667A\u6167\u624B\u6A5F\u4E0A\u7684\u500B\u4EBA\u548C\u5546\u696D\u4FE1\u606F\u7684\u5B89\u5168\u6027\u3002"@zh . "95230"^^ . . . "Mobile security, or mobile device security, is the protection of smartphones, tablets, and laptops from threats associated with wireless computing. It has become increasingly important in mobile computing. The security of personal and business information now stored on smartphones is of particular concern."@en . . .