Advanced scripting languages By (Name) (Course) (Professor’s Name) (Institution) (State) (Date)
Abstract. Mobile devices have become part and parcel of out today lives, thanks to technology. These devices run on operating systems such as android, windows or IOS with hardware compatibility giving them the ability to connect to each other and to the internet for functions and services such as data sharing, web browsing, email services, social media, entertainment and google maps. The scope of mobile phone security threats covers hardware and software related factors such as storage systems, network access and encryption. Several mobile devices were taken as case studies for this research. The devices were analysed and tested for both their security features and vulnerabilities for unauthorized access. We find that these mobile devices have a lot of security vulnerabilities relating to data privacy, data leaks, unauthorized access and malware. Keywords. Mobile devices, vulnerabilities, internet, encryption, privacy, unauthorized. INTRODUCTION. Mobile devices have evolved to become more efficient and perform computerized capabilities and thus achieve more adoption in the public by the consumers from individual persons, organizations and the governments and as such have become necessary companions for these consumers at work or at home to perform tasks, entertain and socialize. Major improvements have been made in the field relating to the hardware and software compatibilities. These improvements have also enabled accomplishment of more advanced tasks using the mobile devices. As an advantage, the improvements have also made the mobile devices more attractive to attackers, Becher (2011). Mobile devices run on different operating system platforms. Examples include Windows, produced by Microsoft, Google’s Android and Iphone’s iOS. Android is the most used and widely accepted operating system with thousands of companies use the platform to produce and run their mobile devices such as smartphones, smart televisions, portable routers and other physical entities connected to the Internet of Things. Android is an open source project meaning that different users of the platform can edit and use it to suit their business or personal needs and objectives in performing different functions and delivery of services. The open source model has led to it being a prime target to attacks by malicious individuals using
mobile applications or network access using command execution to access and harvest the user’s private data. All the consumers of mobile devices are apprehensive about their data security, accuracy and integrity. This provides a need to the producers of the mobile devices to increase and improve the security features of the devices to meet the security needs of the users. These obligations include data security, reduce data loss and leaks and prevent unauthorized access by third party applications or individuals such as malware and spyware. Stricter levels of security and protection should therefore be implemented more than what the producers of the mobile devices are able to provide. The ever increasing mobile technology to increase user productivity and efficiency puts a need on the producers of mobile devices to properly secure their products. As an example, user store private and confidential data on the hand held devices such as smartphones not limited to bank account details and passwords that in malicious hands can be devastating. The benefits of the mobile devices are numerous and worth however have been thwarted by security risks leading to fraud, loss of privacy and data losses. The scope of the mobile device security investigation. Digital investigation of the mobile system security vulnerabilities includes the scientific techniques and practices used in the determining the functionalities of the device and the security loopholes left behind. The world has shifted from the internet and world wide web to a mobile society where almost all tasks are accomplished using the mobile devices such as smartphones. These mobile devices are used to access information from the internet that was done by the computers in the older days. Most mobile devices consumers use the gadgets in their day to day activities and therefore the devices receive, generate and store more and more of the users’ private data. With the need to protect their data, mobile device security becomes a human need and primary enforcer and not a human want nor secondary enforcer, Ghosh & Swaminatha (2011). This paper reviews to determine the overview of mobile device security including the application layer, data link layers and storage services of the applications installed and running on the devices. The research further focuses on the attack made using third party applications such as web browsers and the mobile application user as an attack enabler. The paper intends to show the main aspects of the security of mobile devices that exposes the users to the risks involved.
The ebb and flow examine proposes, utilizing a benchmarking and exploitative tools technique to enable the planning of a measurable, presentable and applicable examination to cell phones with Android working framework; in view of the chain of care rules, consistence stages, and stages and to identify discoveries, dissentions, find vulnerabilities. In light of this procedure, we can decide the starting point of the main sources of various kinds of occasions or targets directed towards a cell phone as a mobile device. Also, utilizing a choice lattice, the best programming for playing out the scientific examination is picked and utilizing Balanced Scorecard, markers are assessed. The research focused on the different mobile threats prevalently are categorized into three: The threats originating from the installation and use of mobile applications which include adware, malware and spyware. Threats arising from the connection of the mobile device to the internet on different networks such as data loss, unauthorized access, data leaks and “man-in-the-middle” eavesdrop. Physical vulnerabilities of using small, portable handheld devices such as getting lost, water and dust destruction and theft. This paper focuses on the mobile security that is specific to the mobile devices and not how the normal security of other computer systems can be implemented to the field and offer protection to the user data. Literature review. In the paper by Shon & Choi (2017, September). “Mobile Phone Usage Patterns, Security Concerns, and Security Practices of Digital Generation” by Sonya Zhang and Saree Costa, the authors determined the patterns of use of the mobile devices by the students. The randomly selected 262 students, were also interviewed about their mobile device practices and security concerns. The study concluded that mostly the students used their devices for entertainment and productivity purposes. The authors determined that most mobile device consumers are aware of the security threats involved with using the devices from the physical risks of theft to online and application threats. The participants ranked data privacy as the primary threat they were worried of. In so doing, the participants regularly updated the software component of their mobile devices and used passwords and pin codes to secure the
End of preview
Want to access all the pages? Upload your documents or become a member.
Related Documents
Mobile Application Threat Modelinglg...
|14
|3127
|21
Implementation of Bitdefender GravityZone Business Security for IT Security Requirementslg...
|8
|1359
|146
Comparison of Smart Phone OSslg...
|4
|660
|80
Smartphone Operating System and Security: A Comparative Studylg...
|7
|1257
|77
Mobile Device Security NAME OF THE STUDENT NAME OF THElg...
|9
|476
|39
Cyber Defense in Web Based Attacks Report 2022lg...