Mobile Devices Technologies: Risks and Security

被引:0
|
作者
Alsaqour, Raed [1 ]
Alharthi, Sultan [1 ]
Aldehaimi, Khalid [1 ]
Abdelhaq, Maha [2 ]
机构
[1] Saudi Elect Univ, Dept Informat Technol, Coll Comp & Informat, Riyadh 93499, Saudi Arabia
[2] Princess Nourah bint Abdulrahman Univ, Coll Comp & Informat Sci, Dept Informat Technol, Riyadh 84428, Saudi Arabia
关键词
Mobile Security; BYOD; Multifactor Authentication; MDM; MSS; Security Policy; ATTACKS;
D O I
10.22937/IJCSNS.2021.21.4.30
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Our society is depending on mobile devices that play a major role in our lives. Utilizing these devices is possible due to their speed power and efficiency in performing basic as well as sophisticated operations that can be found in traditional computers like desktop workstations. The challenge with using mobile devices is that organizations are concerned with the interference between personal and corporate use due to Bring Your Own Device (BYOD) trend. This paper highlights the importance of mobile devices in our daily tasks and the associated risks involved with using these devices. Several technologies and countermeasures are reviewed in this paper to secure the mobile devices from different attempts of attacks. It is important to mention that this paper focuses on technical measures rather than considering different aspects of security measures as recommended by the cybersecurity community.
引用
收藏
页码:249 / 254
页数:6
相关论文
共 50 条
  • [31] Use of mobile devices in the childhood: opportunities and risks
    Gonzalez-Sanmamed, Mercedes
    Losada-Puente, Luisa
    Rebollo-Quintela, Nuria
    Rodriguez-Machado, Eduardo
    [J]. PSYCHOLOGY SOCIETY & EDUCATION, 2023, 15 (03): : 1 - 9
  • [32] Mobile and wireless technologies: security and risk factors
    Urbas, Gregor
    Krone, Tony
    [J]. TRENDS AND ISSUES IN CRIME AND CRIMINAL JUSTICE, 2006, (329):
  • [33] Balancing Security and Usability of Local Security Mechanisms for Mobile Devices
    Yang, Shuzhe
    Bal, Goekhan
    [J]. INFORMATION SECURITY AND PRIVACY RESEARCH, 2012, 376 : 327 - 338
  • [34] Surveillance or Security? The Risks Posed by New Wiretapping Technologies
    Laprise, John
    [J]. TECHNOLOGY AND CULTURE, 2012, 53 (03) : 742 - 743
  • [35] Surveillance or Security?: The Risks Posed by New Wiretapping Technologies
    Monsour, Mitch
    [J]. INFORMATION SOCIETY, 2015, 31 (02): : 225 - 226
  • [36] Surveillance or Security?: The Risks Posed by New Wiretapping Technologies
    Boyle, Philip
    [J]. CONTEMPORARY SOCIOLOGY-A JOURNAL OF REVIEWS, 2012, 41 (02) : 221 - 223
  • [37] Surveillance or Security? The Risks Posed by New Wiretapping Technologies
    McCarthy, Wil
    [J]. MEDIA WAR AND CONFLICT, 2012, 5 (03): : 290 - 293
  • [38] Emerging information technologies in accounting and related security risks
    Rindasu, Sinziana-Maria
    [J]. PROCEEDINGS OF THE 12TH INTERNATIONAL CONFERENCE ACCOUNTING AND MANAGEMENT INFORMATION SYSTEMS (AMIS 2017), 2017, : 151 - 171
  • [39] Passive security intelligence to analyze the security risks of mobile/BYOD activities
    Stoecklin, M. Ph.
    Singh, K.
    Koved, L.
    Hu, X.
    Chari, S. N.
    Rao, J. R.
    Cheng, P. -C.
    Christodorescu, M.
    Sailer, R.
    Schales, D. L.
    [J]. IBM JOURNAL OF RESEARCH AND DEVELOPMENT, 2016, 60 (04)
  • [40] Promoting Mobile Computing and Security Learning Using Mobile Devices
    You, Wanqing
    Qian, Kai
    Lo, Dan Chia-Tien
    Bhattacharya, Prabir
    Chen, Wei
    Rogers, Tamara
    Chern, Johng-Chern
    Yao, Junfeng
    [J]. 2015 5th IEEE Integrated STEM Education Conference (ISEC), 2015, : 205 - 209