scholarly journals Analysis of security risk control of mobile application under BYOD scenario using in energy enterprises

Author(s):  
Zhang Wenjie ◽  
Li Wei ◽  
Li Zheng ◽  
Liu Yubo ◽  
Zhang Zhiru
2020 ◽  
Vol 3 (2) ◽  
pp. 31-43
Author(s):  
Michael Bwalya ◽  
Christopher Chembe

Smartphones have become a major part of human’s life. And also it has been seen that new mobile applications are built day by day. Currently mobile applications are playing major role in many areas such as banking, social networking, financial apps, entertainment and many more. With this increasing number of applications, security is an important issue. The growth of android market has increased security risk and thus focus should be given to the security. Security is the biggest issue in the field of mobile technology. Therefore, mobile applications need to be assessed and ensure that secure coding practices have been followed during development. Mobile application security breach can lead to fraudulent transactions through mobile applications, confidentiality and revenue loss through communications services misuse. Data that is shared on an unsecured channel is vulnerable to attacks and to stop unauthorized access to this data, there is need to encrypt the data before it is sent to the server. In this research work, different cryptographic algorithms for encrypting data and secure data sharing in mobile applications across communications channels were examined. Simulation methodology was used to investigate a suitable cryptographic algorithm and to design a security framework for mobile applications to solve mobile application security problems. The proposed framework employs the use of Advanced Encryption Standard (AES) algorithm for encrypting meter readings data being exchanged between a smart phone and the server. The results obtained from the simulation of the security framework, showed that the four fields namely: Account number, image path, meter number and phone number on which AES encryption was applied were in an unreadable format (ciphertext), implying that the fields have been successfully encrypted. This solution allows application users to transfer (upload readings) data between a smart phone and database server in a secure manner without facing the problem of data attack. Data being uploaded to the server is encrypted before it is transferred and decrypted once it reaches the server side. This solution addresses android application security in the application and network communications layers and data transmission. The research paper ensures information security is guaranteed between an organisation and its customers.


Author(s):  
Lin Shi ◽  
Zilong Wang ◽  
Yixuan Zeng

The standardized communication protocol and the universal application of intelligent electronic devices in edge networks provide technical support to the realization of smart cities and also bring network security issues that cannot be ignored. How to analyze and quantitatively assess the vulnerability of the edge network has become an important issue that needs to be solved urgently in the edge network security risk control. Based on the analysis of the vulnerability mechanism, this paper proposes the selection criteria and generation methods of vulnerability indicators and of composite vulnerability indicators, respectively. In addition, this paper proposes an improved vulnerability severity rating method to analyze the vulnerability of the system and potential security threats. This paper describes the security risk status of vulnerable points based on the state transition of the state offensive and defensive graph and implements the description of the security risk status of attacks in terms of attack frequency, attack success rate and harm. Experimental results justify the effectiveness of the proposed solution.


2012 ◽  
Vol 524-527 ◽  
pp. 2971-2976 ◽  
Author(s):  
Hao Yue Peng ◽  
Guo Hao Zhao

The history of Human beings is the one of utilizing natural recourses. With the development of the economic, natural resources industry security risk management increasingly becomes an urgent and international issue. Analyzing the resources industry security under the systematic angle, the resources industry risk control is the complex system. This system is full of energy flowing which can be measured by the entropy. Hopfield neural network is the important neural networks model. The use of Hopfield neural network puts extra systematic directionality restraints on such risk control. It makes the objective function and constraints of resources industry security risk control, in terms of negative entropy, optimized by the Hopfield neural network energy function. Then as an effective try, some conclusions about reducing resources industry security risk also can be got.


Computer ◽  
2018 ◽  
Vol 51 (4) ◽  
pp. 28-38 ◽  
Author(s):  
Zhen Ni ◽  
Qianmu Li ◽  
Gang Liu

Sign in / Sign up

Export Citation Format

Share Document