A Review of Exploring the Distinctive and Contemporary Challenges in Safeguarding Mobile Devices (original) (raw)

Mobile Devices: The Case for Cyber Security Hardened Systems

Mobile devices are becoming a method to provide an efficient and convenient way to access, find and share information; however, the availability of this information has caused an increase in cyber attacks. Currently, cyber threats range from Trojans and viruses to botnets and toolkits. Presently, 96% of mobile devices do not have pre-installed security software while approximately 65% of the vulnerabilities are found within the application layer. This lack in security and policy driven systems is an opportunity for malicious cyber attackers to hack into the various popular devices. Traditional security software found in desktop computing platforms, such as firewalls, antivirus, and encryption, is widely used by the general public in mobile devices. Moreover, mobile devices are even more vulnerable than personal desktop computers because more people are using mobile devices to do personal tasks. This review attempts to display the importance of developing a national security policy created for mobile devices in order to protect sensitive and confidential data.

IJERT-Safeguarding Against Cyber Crimes Spreading Through Mobile Devices

International Journal of Engineering Research and Technology (IJERT), 2014

https://www.ijert.org/safeguarding-against-cyber-crimes-spreading-through-mobile-devices https://www.ijert.org/research/safeguarding-against-cyber-crimes-spreading-through-mobile-devices-IJERTV3IS090396.pdf The use of mobile devices has increased tremendously recently. These mobile devices are no longer tools only for voice calls and messaging services. These devices now come with internet access capability at much higher data transmission rates and other smart features. As more and more people have started using Internet on mobile devices, the number of cyber crimes and cyber attacks has also increased. Cyber attacks by hackers and intruders are significantly increasing in India as the penetration of mobile devices is increasing. Moreover Internet capability on such devices makes them easy targets for attackers. The users of such mobile devices are either attackers or victims of cyber crime world. Mobile devices provide flexibility to attackers as well, as they use such devices to plan and commit cyber crimes from anywhere. In addition to that, most of the mobile device users are not aware about the security issues related to such devices. This fact makes them soft target for cyber attackers. Attackers use various techniques to reach to these target mobile devices. Lack of awareness about cyber attacks and preventive measures among people is a major concern. This paper highlights different cyber attacks possible on or through mobile devices. Critical factors which make attackers showing interest in mobile devices are identified. This paper also suggests the guidelines for safeguarding mobile devices against various cyber attacks.

Reviews on Cybercrime Affecting Portable Devices

The popularity of mobile devices in the market is impressive, but this influx of different products has made it difficult for users to secure their infrastructures from potential data breaches. As the number of exposures and attacks increase, there has been a corresponding rise in security solutions offered by researchers. This article reviews the literature to prevent the cybercrime affecting portable devices especially smartphones running Android OS. Extant researches are analyzed and opportunities for future research are identified. Four research questions have been developed and out of 493 articles retrieved, 33 articles have been selected to be analyzed. From the analysis, we have found that Data leakage resulting from device loss or theft, unintentional disclosure of data and phishing attacks are most common between attackers. With no doubt, security investigators have stressed the grandness of protecting classified personal data residing in Android portable devices. They have suggested to use the permission-based security model and behavior-based detection method for protecting classified information. In result we found that Android OS can handle and apply the integrated protection model but still there are opportunities for us to improve the security of personal data.

Computer Security and Mobile Security Challenges

Computer security, also known as cybersecurity or IT security, is the protection of information systems from theft or damage to the hardware, the software, and to the information on them, as well as from disruption or misdirection of the services they provide.[1] It includes controlling physical access to the hardware, as well as protecting against harm that may come via network access, data and code injection,[2] and due to malpractice by operators, whether intentional, accidental, or due to them being tricked into deviating from secure procedures.[3] The field is of growing importance due to the increasing reliance on computer systems in most societies.[4] Computer systems now include a very wide variety of "smart" devices, including smartphones, televisions and tiny devices as part of the Internet of Things – and networks include not only the Internet and private data networks, but also Bluetooth, Wi-Fi and other wireless networks.

Mobile Device Cyber Security

Springer Series in Wireless Technology, 2019

In 21st century, we all live a fast life as we are surrounded by the technology which made our lives easy and comfortable. A mobile device is a huge invent of technology. In this era, we are totally dependent on mobile devices. Mobile devices have gained lot of popularity because of its portability and high performance. It is a handheld device which occupies everything in it like entertainment, business, shopping and many more. As human beings are continuously using these devices so to make the significant use of these devices is our utmost priority. We store confidential data on it but at the same time security of this device is very important. So in this chapter we will discuss about the major threats and solutions to overcome threats.

Cyber Security and Mobile Threats: The Need for Antivirus Applications for Smart Phones

Journal of Information Systems Technology and Planning, 2012

"Smartphones are becoming a vehicle to provide an efficient and convenient way to access, find and share information; however, the availability of this information has caused an increase in cyber attacks. Currently, cyber threats range from Trojans and viruses to botnets and toolkits. Presently, 96% of smartphones do not have pre-installed security software. This lack in security is an opportunity for malicious cyber attackers to hack into the various devices that are popular (i.e. Android, iPhone and Blackberry). Traditional security software found in personal computers (PCs), such as firewalls, antivirus, and encryption, is not currently available in smartphones. Moreover, smartphones are even more vulnerable than personal computers because more people are using smartphones to do personal tasks. Nowadays, smartphone users can email, use social networking applications (Facebook and Twitter), buy and download various applications and shop. Furthermore, users can now conduct monetary transactions, such as buying goods, redeeming coupons and tickets, banking and processing point-of-sale payments. Monetary transactions are especially attractive to cyber attackers because they can gain access to bank account information after hacking a user’s smartphone. Lastly, smartphones are small and are easy to carry anywhere. Unfortunately, the convenience of using smartphones to do personal task is the loophole cyber attackers need to gain access to personal data. Thus, this paper examines the importance of developing a national security policy created for mobile devices in order to protect sensitive,personal data."

The 4 th International Conference on Electrical Engineering and Informatics ( ICEEI 2013 ) Reviews on Cybercrime Affecting Portable Devices

2014

The popularity of mobile devices in the market is impressive, but this influx of different products has made it difficult for users to secure their infrastructures from potential data breaches. As the number of exposures and attacks increase, there has been a corresponding rise in security solutions offered by researchers. This article reviews the literature to prevent the cybercrime affecting portable devices especially smartphones running Android OS. Extant researches are analyzed and opportunities for future research are identified. Four research questions have been developed and out of 493 articles retrieved, 33 articles have been selected to be analyzed. From the analysis, we have found that Data leakage resulting from device loss or theft, unintentional disclosure of data and phishing attacks are most common between attackers. With no doubt, security investigators have stressed the grandness of protecting classified personal data residing in Android portable devices. They have...

Mobile Security Threats: A Survey on Protection and Mitigation Strategies

International conference KNOWLEDGE-BASED ORGANIZATION

The spectacular growth in the use of mobile devices is a natural consequence of the benefits they offer. However, most mobile users grant little importance to the security of information stored, processed and transmitted. Even more, the last two years can be considered years of reference for the mobile security industry - ranging from virulent mobile ransomware attacks to mobile IoT botnets and mobile security breaches through mobile malware, that have redefined security paradigms. It is clear that we are at a point of inflection and transition to another generation of cyber attacks and the tendency is that attacks on mobile devices will expand. The security of mobile devices is a topical issue and the main objective is to educate the user to know the risks to which he/she is exposed to and to offer him/her viable security solutions in order to protect himself/herself against mobile threats. In this article we are going to present some protection and mitigation strategies with recom...

Issues , Solutions and Recommendations for Mobile Device Security

2013

Security is a major concern for any mobile computing device such as Laptop, Notebook, Mobile Phone, Personal Digital Assistant (PDA), Smart phone etc. which contains sensitive data and accesses the Internet. Due to the inherent nature of these devices such as Mobility and Portability, they encounter additional security issues compare to the conventional computing devices. Now-a-days, business applications are going mobile and are using business data of an enterprise in a mobile context in order to improve the revenue by increasing the productivity. So there is a need to secure these devices from the various attacks. This paper presents the issues related to mobile device security in detail, in terms of Physical, Logical, Network and Personnel categories. It also offers simple solutions to overcome these issues and a table contains the recommendations to protect the devices from various problems. A new diagram that depicts the Issues of Mobile device security is also given.

Awareness of Mobile Device Security

International Journal of Mobile Computing and Multimedia Communications, 2016

Mobile devices have become a ubiquitous technology that are also inherently intertwined with modern society. They have enabled a revolution of how people engage and interact with technology, computing and the Internet. However, as their popularity has increased, so have the threats against them. The paper presents the findings of a survey undertaken to examine users' attitudes and opinions towards security for their mobile device. The results are based upon a respondent population of 301 and show a pattern of users being concerned about security for their device (68%), wanting additional security (63%), yet not engaging with the security they are provided with. Only 54% of respondents utilise a PIN for authentication against a backdrop of 46% of respondents experiencing some form of security breach. Interestingly, the results do show a preference for security to be preinstalled and activated out-of-the-box (84%), placing a responsibility on network operators and/or manufacturers...