Threats, Attacks, and Mitigations of Smartphone Security

المؤلفون

  • Hewa M. Zangana Department of Computer Science, Nawroz University, Duhok, Kurdistan Region of Iraq
  • Marwan Omar Department of Computer Science, Saint Leo University, Florida, USA

DOI:

https://doi.org/10.25007/ajnu.v9n4a989

الملخص

Mobile devices such as Smart Phones and Personal Assistant Devices (PDA) that are Internet   based are becoming much more capable of handling complex tasks such as online shopping, online banking as well as social media networking; However, the security mechanisms and defense measures that are built into those devices are not commensurate with those powerful communication and computational capabilities. This in turn, creates critical vulnerabilities thus promoting the chance for imminent security threats. The intent of this paper is to take a look into some of the vulnerabilities and risks associated with the use of smart phones that are Internet   based, explore the current security mechanisms and strategies that are in place, and finally propose some proactive defense strategies to ensure appropriate protection of critical information contained in Smart phone devices.

التنزيلات

بيانات التنزيل غير متوفرة بعد.

المراجع

1. Antonopoulos, A. (2010). "Mobile malware will test Android and iPhone." Network World 27(2): 18-18.
2. Bose, A 2008. “Propagation, detection and containment of mobile malware”. Ph.D. dissertation, University of Michigan, United States -- Michigan. Retrieved February 7, 2010, from www.phoenic.edu/apololibrary.Full Text.(Publication No. AAT 3328771)
3. Brookshear, J (2009). “Computer science, an overview” . Boston, Addison-Wesley Computing. 10th Edition.
4. Channel (2009). "Hacking Threat Faces Mobile Phone Users, Experts Say." Retrieved Feb 3rd, 2010, from Channel Insider: 1-1.
5. ESET Launched Antivirus For Smart phones. (2008, June 18). Al Bawaba. Retrieved February 21, 2010, from ABI/INFORM Trade & Industry. (Document ID: 1496481391).
6. 6-Kharif, O. (2009). "Smart phones: A Bigger Target for Security Threats." BusinessWeek Online: 11-11.
7. Leavitt (2005), Mobile Phones: “ The Next Frontier for Hackers?”. Retrieved Feb 3rd , 2010, from IEEE Computer 38(4)(2005)20-30.
8. Schmidt & Albayrak (2008). “Malicious Software for Smart phones” retrieved Feb 2nd, 2010, from http://web.ebscohost.com.ezproxy.apollolibrary.com.
9. Schmidt, A.-D., F. Peters, et al. (2009). "Monitoring Smart phones for Anomaly Detection." Retrieved Feb 3rd, 2010, from Mobile Networks and Applications 14(1): 92-106.
10. Epstein, Z. (2015, April 15). 500? 1,000? You'll never guess how many different Android devices are available. Retrieved from https://bgr.com/2015/04/15/android-sales-2015-smartphones-tablets-smartwatches/
11. Google. (2019). Android Open Source Project. Retrieved May 17, 2019, from https://source.android.com/
12. Google. (2019). Devices. Retrieved May 17, 2019, from https://www.android.com/devices/
13. Statista. (2019). Global market share held by smartphone operating systems from 2009 to 2017. Retrieved May 17, 2019, from https://www-statista-com.saintleo.idm.oclc.org/statistics/263453/global-market-share-held-by-smartphone-operating-systems/

منشور

2020-12-04

كيفية الاقتباس

Zangana, H. M., & Omar, M. (2020). Threats, Attacks, and Mitigations of Smartphone Security. المجلة الأكاديمية لجامعة نوروز, 9(4), 324–332. https://doi.org/10.25007/ajnu.v9n4a989

إصدار

القسم

مقالات