Physical vulnerabilities
Device lost
Device defection
Device stolen
Protecting sensitive data
Manipulation of data by end user
Misusing data by other individual through illegal access e.g. Intrusion through malicious App