Answer: 1.Use of Untrusted Mobile Devices and Networks
2. Interaction with Other Systems
3.Use of Applications Created by Unknown Parties
4. Use of Un-Trusted Content
5. Use of Location Services
6. Technologies for Mobile Device Management
Explanation: