Security Threats on Mobile Devices

Author(s):  
Lukáš Aron

This chapter contains basic introduction into security models of modern operating system like Android, iOS or Windows Phone. There are described the methods of attacks to the mobile devices. Such attacks consist of application based threats and vulnerabilities, network based attacks and internet browser vulnerabilities. The following section contains description of defensive strategies and steps for securing the device. There is also section about securing mobile device for enterprise environment. At the end of this chapter are discussed recommendations for security practices for mobile devices.

Author(s):  
Venus W. Samawi

These days, peoples expected to move around carrying their mobile devices, talking to friends, completing their work, accessing emails etc. His/her pictures, work, study, even relationship (friends, and family) all is in the mobile device. Therefore, mobile devices (especially smart phones) become an ideal target for different attacks. Mobile computing also becomes important in enterprises and organizations. Therefore, it is important to illustrate the state of art on vulnerabilities and threats on mobile device. This chapter is addressed to explain mobile computing concept, features, architecture, operating systems, and risks to mobile devices. Mobile operating system structureand characteristicsare demonstrated. The author also illustrates mobile security issues, and type of threats to mobile devices. Finally, features and security models of two popular smartphone operating systems, Android and iOS, are illustrated. It was found that the security models of these two smartphones is immature and do not meet the enterprises security policies.


Author(s):  
Venus W. Samawi

These days, peoples expected to move around carrying their mobile devices, talking to friends, completing their work, accessing emails etc. His/her pictures, work, study, even relationship (friends, and family) all is in the mobile device. Therefore, mobile devices (especially smart phones) become an ideal target for different attacks. Mobile computing also becomes important in enterprises and organizations. Therefore, it is important to illustrate the state of art on vulnerabilities and threats on mobile device. This chapter is addressed to explain mobile computing concept, features, architecture, operating systems, and risks to mobile devices. Mobile operating system structureand characteristicsare demonstrated. The author also illustrates mobile security issues, and type of threats to mobile devices. Finally, features and security models of two popular smartphone operating systems, Android and iOS, are illustrated. It was found that the security models of these two smartphones is immature and do not meet the enterprises security policies.


2015 ◽  
Vol 23 (5) ◽  
pp. 450-475 ◽  
Author(s):  
Himanshu Srivastava ◽  
Shashikala Tapaswi

Purpose – The purpose of this paper is to propose an approach that helps in acquisition of live data as well as data stored in the internal/external memory of android mobile device considering that the data on the device are not much altered during the extraction process. Also, the emphasis is laid on testing the validity of existing forensic tools against the data obtained manually and by using this approach. Smartphones have spurred the mobile computing technology, and Android is widely used as an Operating System in these devices. These days, users store most of their personal information like emails, images, contacts etc., on Phones/Tablets as their data would be readily accessible and thus convenient for them. Design/methodology/approach – Android Operating System is built on the Linux Kernel and scripts to extract data from Android Mobile Device with the use of Android Debugging Bridge have been written. The approach is more focused on the logical acquisition of data from devices rather than acquisition using physical methods. Findings – Live data of the Facebook application running on the device can be extracted. Also, the password of the LuksManager application (used to create an encrypted volume on the device), which is stored in the internal memory, is also extracted and identified. Research limitations/implications – The study has been conducted in an academic environment, thereby limiting external validity. Another limitation is the limited edition of some of the software forensics tools that are used. The full access to these software tools are restricted by Law enforcement and Investigation policies. The research provides a different approach which could aid in criminal investigation activities on mobile devices. Practical implications – The devices which have the latest versions of Android not only store messages and mails, but a lot of information about GPS, as well as information about popular applications like Facebook, WhatsApp, etc. This could practically help a lot in criminal investigation. Originality/value – This study is important because very few works have been done on recent versions (Jellybean and Kitkat) of Android. The proposed approach could extract large amounts of information as compared to earlier approaches with the newer versions of Android having larger memory and new features.


Author(s):  
Guntur Maulana Zamroni ◽  
Imam Riadi

WhatsApp (WA) is one of the Instant Messaging (IM) applications used by many people. WA and mobile devices cannot be separated from the possibility of misuse such as for criminal purposes. To handle a crime case involving a mobile device, the investigator needs to use suitable forensic tools and mobile forensic methodology so that the results can be approved and accepted by the law. This research conducted a forensic analysis of WA on unrooted Samsung C9 Pro devices using Belkasoft Evidence, Oxygen Forensic, Magnet AXIOM, and WA Key/DB Extractor. This research gives suggestion about forensic tools for conducting forensic analysis related to WA.  From the research can be seen that there is no tool that can be used to obtain all the WA artifact parameters used in the research. The combination of the Magnet AXIOM and WA Key/DB Extractor is known to get the best results and meets the WA artifact parameters.


2020 ◽  
Vol 8 (6) ◽  
pp. 5685-5690

Mobile application use has become increasingly common, particularly android is the most well known working framework being utilized. The portable application is getting developed in all areas like social insurance, individual consideration, Gaming, Business, and so forth, and these applications need the client to give their own information, wherein the client's information are stored on the Mobile gadget, or it is transmitted through the Network as API's. If there are any security, misconfigurations present may lead the hacker to attack the mobile device or the API’s which helps to gain access on the user’s data. Hence, the mobile devices are becoming more prone to security threats. Consequently, the portable applications must ensure to be secure before they are conveyed in the market, and it is the duty of the application proprietor to perform Pentesting on the application to provide security to the client’s information. Pentesting of any android or iOS applications can be performed in two ways, static and dynamic Pentesting. Static Pentesting helps in understating the security threats at the local storage and on the manifest file by reverse engineering the application’s APK or IPA file, whereas dynamic Pentesting helps in finding security threats in the real-time exchange of data through the network. In this paper, the Static Pentesting methodology that can be used for android application Pentesting is described with the use of open-source Pentesting tools and a sample android application. The static Pentesting of any application encourages the engineer to comprehend the security misconfigurations, which ought to be dodged at the development stage of the application itself. This guarantees the security of the client's information at the device level


2016 ◽  
Vol 11 (6) ◽  
pp. 32 ◽  
Author(s):  
Shwu-Ing Wu ◽  
Rou Jyun Chen

<p class="ArticleTitle">In recent years, the increasingly innovative and diverse mobile devices have significantly promoted the mobile device-based shopping. What factors influence this kind of shopping? Will consumers purchase things with mobile devices? These are two topics that need to be explored. Through the literature analysis and the empirical research, this study aims to analyze the quality of information, system, service and mobile devices on the mobile device-based shopping platform. Moreover, it studies the attitude of consumers towards mobile device-based shopping, their willingness to adopt the shopping method and the behavioral relationship model in the actual mobile device-based shopping as well as compares the groups of different frequencies of the Internet use in terms of the relationship model.</p>  With the convenient sampling, this study made an investigation among some of those who had experienced shopping on such mobile devices as tablets or smart phones. The 765 retrieved valid copies of questionnaire were divided into three groups—“often”, “average” and “seldom” according to the frequency consumers undertook mobile device-based shopping and were then compared. The results showed that there were significant differences among the three groups in four relationship paths, including: 1) the information quality of the mobile device-based shopping platform has more significant positive influence on consumers’ attitude path of mobile device-based shopping in the “average” group than in the other two; 2) the service quality of the mobile device-based shopping platform has more significant positive influence on consumers’ attitude path of mobile device-based shopping in the “seldom” group than in the other two; 3) the preference for mobile device-based shopping has much significant positive influence on the behavior path of mobile device-based shopping in the “often” group. According to the research results, different groups have different behavior models. These results can serve as reference information in the decision-making of those who establish mobile device-based shopping platforms and manufacture mobile devices.


2010 ◽  
Vol 7 (4) ◽  
pp. 813-822 ◽  
Author(s):  
Daniel Fuentes ◽  
Juan Álvarez ◽  
Juan Ortega ◽  
Luis Gonzalez-Abril ◽  
Francisco Velasco

This paper focuses on the behavior of Trojan horses in mobile devices. This malicious software tries to steal information from a mobile device while the user is unaware. We describe the communication links through a Trojan horse installed into a mobile device. To demonstrate the effects of a Trojan horse infection we present a practical example on a PDA. Via SMS, the malicious user can access a user?s contacts information through the previous installation of the Trojan horse. The results show that this process means a loss of information and a quantified cost to the attacked user too. This paper proposes different solutions to avoid this malware and its effects.


2010 ◽  
Vol 14 (1) ◽  
pp. 115-124 ◽  
Author(s):  
Weijan Shen ◽  
Fock-Lai Tan

This paper presents the experimental study of using phase change material in the cooling of the mobile devices. It investigates the thermal performance of transient charging and discharging of mobile devices in three different situations; making phone calls frequently, making long duration calls, and making occasional calls. The results show that mobile devices are heated up fastest during the long duration usage. Experiments are also conducted to determine the effect of fins and effect of orientation of the mobile device on its thermal performance.


Sensors ◽  
2021 ◽  
Vol 21 (16) ◽  
pp. 5451
Author(s):  
Loreto Pescosolido ◽  
Emilio Ancillotti ◽  
Andrea Passarella

Optical wireless LANs (OWLs) constitute an emerging networking paradigm for indoor scenarios’ fit to different smart cities’ fields of applications. Commercial products employing this technology have been made available on the market in recent years. In this work, we investigate, through a set of indoor communication experiments based on commercially available products, how different environmental and usage modes affect the performance of the system, addressing the presence of multiple users, the position and mobility of the mobile devices, the handover among adjacent cells and the effect of background lighting. Our finding shows that the system is quite robust with respect to the variation of operational conditions. We show that, in most conditions, the links can reliably sustain a stable throughput, achieving at least 50% of the throughput achieved with using the maximum light intensity of the transmitting lamp, while they are affected in a very mild way by factors like position and height of the mobile device, and virtually unaffected by variations in the background light.


2021 ◽  
Author(s):  
Tarja Heponiemi ◽  
Anu Kaihlanen ◽  
Kia Gluschkoff ◽  
Kaija Saranto ◽  
Sari Nissinen ◽  
...  

BACKGROUND Mobile devices such as tablets and smartphones are increasingly used in health care in many developed countries. Nurses form the largest group in health care that uses electronic health records (EHRs) and their mobile versions. Mobile devices are suggested to promote nurses’ workflow, constant updating of patient information and improve the communication within the health care team. However, little is known about their effect on nurses’ wellbeing. OBJECTIVE The present study aimed to examine the association of mobile device use of the EHR with nurses’ perceived time pressure, stress related to information systems (SRIS) and self-rated stress. Moreover, we examined whether mobile device use modifies the associations of EHR usability (ease of use and technical quality), experience in using EHRs and number of systems in daily use with these wellbeing indicators. METHODS The present study was a cross-sectional population-based survey study among 3,610 Finnish registered nurses gathered in 2020. The associations were examined using analyses of covariance and logistic regression adjusted for age, gender and employment sector (hospital, primary care, social service and other). RESULTS Those who used mobile version of their EHR had higher levels of time pressure ( F(1)= 14.96, p < .001) and SRIS ( F(1)= 6.11, p = .01) compared to those who did not use mobile versions. Moreover, the interactions of mobile device use with experience in using EHRs (F(1) = 14.93, p < .001), ease of use (F(1) = 10.16, p = .001) and technical quality (F(1) = 6.45, p = .01) were significant for SRIS. Inexperience in using EHRs, low levels of ease of use and technical quality were associated with higher SRIS and this association was more pronounced among those who used mobile devices. That is, the highest levels of SRIS were perceived among those who used mobile devices and were inexperienced EHR users, perceived low levels of ease of use or low levels of technical quality of their EHR. CONCLUSIONS According to our results it seems that at the moment mobile device use is not beneficial for the nurses’ wellbeing. In addition, mobile device use seems to intensify the negative effects of usability problems of the EHRs. Especially inexperienced users of EHRs seem be at disadvantage when using mobile devices. Thus, we suggest that EHRs and their mobile versions should be improved in a manner that they would be easier to use and would better support the nurses’ workflow. For example, improvements to problems related to small display, user interface and difficult data entry of mobile versions might be useful. Moreover, more training related to EHRs, their mobile versions and workflow related to these should be provided to nurses.


Sign in / Sign up

Export Citation Format

Share Document