Threats, Attacks, and Mitigations of Smartphone Security

Authors

  • Hewa M. Zangana Department of Computer Science, Nawroz University, Duhok, Kurdistan Region of Iraq
  • Marwan Omar Department of Computer Science, Saint Leo University, Florida, USA

DOI:

https://doi.org/10.25007/ajnu.v9n4a989

Abstract

Mobile devices such as Smart Phones and Personal Assistant Devices (PDA) that are Internet   based are becoming much more capable of handling complex tasks such as online shopping, online banking as well as social media networking; However, the security mechanisms and defense measures that are built into those devices are not commensurate with those powerful communication and computational capabilities. This in turn, creates critical vulnerabilities thus promoting the chance for imminent security threats. The intent of this paper is to take a look into some of the vulnerabilities and risks associated with the use of smart phones that are Internet   based, explore the current security mechanisms and strategies that are in place, and finally propose some proactive defense strategies to ensure appropriate protection of critical information contained in Smart phone devices.

Downloads

Download data is not yet available.

References

1. Antonopoulos, A. (2010). "Mobile malware will test Android and iPhone." Network World 27(2): 18-18.
2. Bose, A 2008. “Propagation, detection and containment of mobile malware”. Ph.D. dissertation, University of Michigan, United States -- Michigan. Retrieved February 7, 2010, from www.phoenic.edu/apololibrary.Full Text.(Publication No. AAT 3328771)
3. Brookshear, J (2009). “Computer science, an overview” . Boston, Addison-Wesley Computing. 10th Edition.
4. Channel (2009). "Hacking Threat Faces Mobile Phone Users, Experts Say." Retrieved Feb 3rd, 2010, from Channel Insider: 1-1.
5. ESET Launched Antivirus For Smart phones. (2008, June 18). Al Bawaba. Retrieved February 21, 2010, from ABI/INFORM Trade & Industry. (Document ID: 1496481391).
6. 6-Kharif, O. (2009). "Smart phones: A Bigger Target for Security Threats." BusinessWeek Online: 11-11.
7. Leavitt (2005), Mobile Phones: “ The Next Frontier for Hackers?”. Retrieved Feb 3rd , 2010, from IEEE Computer 38(4)(2005)20-30.
8. Schmidt & Albayrak (2008). “Malicious Software for Smart phones” retrieved Feb 2nd, 2010, from http://web.ebscohost.com.ezproxy.apollolibrary.com.
9. Schmidt, A.-D., F. Peters, et al. (2009). "Monitoring Smart phones for Anomaly Detection." Retrieved Feb 3rd, 2010, from Mobile Networks and Applications 14(1): 92-106.
10. Epstein, Z. (2015, April 15). 500? 1,000? You'll never guess how many different Android devices are available. Retrieved from https://bgr.com/2015/04/15/android-sales-2015-smartphones-tablets-smartwatches/
11. Google. (2019). Android Open Source Project. Retrieved May 17, 2019, from https://source.android.com/
12. Google. (2019). Devices. Retrieved May 17, 2019, from https://www.android.com/devices/
13. Statista. (2019). Global market share held by smartphone operating systems from 2009 to 2017. Retrieved May 17, 2019, from https://www-statista-com.saintleo.idm.oclc.org/statistics/263453/global-market-share-held-by-smartphone-operating-systems/

Published

2020-12-04

How to Cite

Zangana, H. M., & Omar, M. (2020). Threats, Attacks, and Mitigations of Smartphone Security. Academic Journal of Nawroz University, 9(4), 324–332. https://doi.org/10.25007/ajnu.v9n4a989

Issue

Section

Articles