Issues with Various Security Threats on Mobile Phones

被引:0
作者
Nseir, Sana [1 ]
Hirzallah, Nael [1 ]
Aqel, Musbah [1 ]
机构
[1] Zarqa Univ, Fac Sci & IT, Zarqa, Jordan
来源
PROCEEDINGS OF THE 2013 PALESTINIAN INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY (PICICT) | 2013年
关键词
Security; Mobile phones; Smart phone; Threats; AUTHENTICATION;
D O I
10.1109/PICICT.2013.17
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The number of Mobile phones, mainly smart phones, being sold has increased dramatically in recent years. They are becoming more preferred companions to users than desktops or notebooks. This has led to more and more sensitive data being stored on these mobile devices. Unfortunately, applications and data stored on mobile phones are less protected from unauthorized access than on most desktop and mobile computers. In this paper, we will discuss the various security threats that are specific to mobile phones. These threats mainly come from the ports that open the phone to the external world, such as Bluetooth, WiFi and MicroSD memory slots. The paper then concludes that more investigations and innovative techniques are needed to secure the data stored on the removable memory cards, yet creates no further burdensome or bothersome to the users.
引用
收藏
页码:37 / 42
页数:6
相关论文
共 8 条
  • [1] [Anonymous], 2011, ICS IS COM AOSP ANDR
  • [2] [Anonymous], 2008, HDB BIOMETRICS
  • [3] [Anonymous], GARTN SMART PHON MAR
  • [4] Ben-AsherOn Noam, MOBILEHCI 11 P 13 IN
  • [5] From desktop to mobile: Examining the security experience
    Botha, Reinhardt A.
    Furnell, Steven M.
    Clarke, Nathan L.
    [J]. COMPUTERS & SECURITY, 2009, 28 (3-4) : 130 - 137
  • [6] Authentication of users on mobile telephones - A survey of attitudes and practices
    Clarke, NL
    Furnell, SM
    [J]. COMPUTERS & SECURITY, 2005, 24 (07) : 519 - 527
  • [7] Acceptance of subscriber authentication methods for mobile telephony devices
    Clarke, NL
    Furnell, SM
    Rodwell, PM
    Reynolds, PL
    [J]. COMPUTERS & SECURITY, 2002, 21 (03) : 220 - 228
  • [8] Tognazzini B., 2005, SECURITY USABILITY D, P31