Mobile security: how to implement and test it