scholarly journals Mobile Security and Penetration Testing

Author(s):  
Harsh Makadia ◽  
Jainish Kotadia

This document offers data involving mobile security exploitation penetration testing. Compared to desktop computers the expansion of mobile devices is tremendous in this years. Mobile de- vices are integrated into daily activities of people’s life. Mobile Applications became a part of our daily lives in order that virtually each internet or desktop application may be executed from a smartphone i.e. social networking, online banking, gaming applications and many others. This document also includes about different types of Mobile security threats, Types of penetration testing, Phases of penetrating testing, Principles of testing and Security risk assessment model. Due to the expansion of mobile devices now a days, it opens vast scope for attackers to steal sensitive information or to perform other kinds of attacks on these devices . The main purpose is to know the vulnerability and technics that ac- customed to find vulnerabilities in mobile applications. In the paper we have studied differing kinds of security risks concerned in mobile devices and mobile applications and regarding varied defensive mechanism to stop these security risk in mobile devices.

Author(s):  
K. LakshmiSupraja

As the numbers of android mobiles are increasing day by day and are used to store sensitive information. So, maintaining security is becoming a difficult thing. Here comes the role of penetration testing. The process of performing a penetration test is to verify that mobile devices are vulnerable to security risk or not. We will exploit the mobile devices by preparing and performing the penetration test using Metasploit. It is a framework for developing and executing exploit code against a remote target machine. The main goal is to provide an understanding of mobile device penetration testing using Metasploit Framework and how to utilize it as a security professional.


Author(s):  
Nuno André Osório Liberato ◽  
João Eduardo Quintela Alves de Sous Varajão ◽  
Emanuel Soares Peres Correia ◽  
Maximino Esteves Correia Bessa

Location-based mobile services (LBMS) are at present an ever growing trend, as found in the latest and most popular mobile applications launched. They are, indeed, supported by the hasty evolution of mobile devices capabilities, namely smart phones, which are becoming truer mobile pocket-computers; by users demand, always searching for new ways to benefit from technology, besides getting more contextualized and user-centred services; and, lastly, by market drive, which sees mobile devices as a dedicated way to reach customers, providing profile-based publicity, products, discounts and events. With e-commerce, products and services started arriving to potential customers through desktop computers, where they can be bought and fast delivered to a given address. However, expressions such as “being mobile”, “always connected”, “anytime anywhere” that already characterize life in the present will certainly continue to do so in the near future. Meanwhile, mobile devices centred commerce services seem to be the next step. Therefore, this paper presents a system architecture designed for location-based e-commerce systems. These systems, where location plays the most important role, enable a remote products/services search, based in user parameters: after a product search, shops with that products are returned in the search results and are displayed in a map, around the user present location; and services like obtaining more information, reserving and purchasing are made available as well. This concept represents a mix between traditional client-oriented commerce and faceless mass-oriented e-commerce, enabling a proximity-based user-contextualized system, being well capable of conveying significant advantages and facilities to both service-providers/retailers and users.


2013 ◽  
Vol 380-384 ◽  
pp. 2534-2538
Author(s):  
Zhao Zhang ◽  
Fang Yong

On the basis of threat analysis, the paper proposes a security risk assessment model for government portal website. Using the model, the paper systematically analyzes the security risk of government portal websites and then explains the reason of them. To enhance the security of government portal websites, both technical and administrative strategies were proposed. Those security strategies help improve the image of the government and it plays an important role in constructing service government.


2014 ◽  
Vol 484-485 ◽  
pp. 210-213
Author(s):  
Jin Hu Li ◽  
Bin Bin Han ◽  
Zhen Yun Chang

For logistics and transport in digital manufacturing environment security status quo, study and proposed transportation security risk evaluation index system; using whitening weight function design specific transportation security risk assessment model; verified by an example, that the evaluation method is more scientific and accurate comprehensive evaluation transportation security situation, with the characteristics of the feasibility and operability.


2018 ◽  
Vol 20 (3) ◽  
pp. 48-69
Author(s):  
Dhanya Pramod ◽  
S. Vijayakumar Bharathi

In the digital era, organization-wide information security risk assessment has gained importance because it can impact businesses in many ways. In this article, the authors propose a model to assess the information security risk using Fuzzy Petri Nets (FPN). Deeply rooted in the OCTAVE framework, this research presents a taxonomy of risk practice areas and risk factors. The authors apply the constituents of the taxonomy to risk assessment through a well-defined FPN model. The primary motive of the article is to extend the usability of FPNs to newer and less explored domains like audit and evaluation of information security risks. The unique contribution of this article is the definition and development of a comprehensive and measurable model of risk assessment and quantification. The model can also serve as a tool to capture the risk perception of the respondents for validating the criticality of risk and facilitate the top management to invest in information security control eco-system judiciously.


Author(s):  
Mouna Jouini ◽  
Latifa Ben Arfa Rabai

Cloud computing technology is a relatively new concept of providing scalable and virtualized resources, software and hardware on demand to consumers. It presents a new technology to deliver computing resources as a service. It offers a variety of benefits like services on demand and provisioning and suffers from several weaknesses. In fact security presents a major obstacle in cloud computing adoption. In this chapter, we will deal with security problems in cloud computing systems and show how to solve these problems using a quantitative security risk assessment model named Multi-dimensional Mean Failure Cost (M2FC). In fact, we present first a deep analysis of security issues related to cloud computing environments and then propose a generic framework that analysis and evaluate cloud security problems and then propose appropriate countermeasures to solve these problems.


2020 ◽  
pp. 489-507
Author(s):  
Ying Xiu ◽  
Jose L. Fulgencio ◽  
Tutaleni I. Asino ◽  
Alesha D. Baker

Globally, those who have traditionally been adversely impacted by the digital divide due to lack of access to computing technologies such as desktop computers, are also the ones who have been shown to have high adoption of mobile devices. If open educational resources (OER) are to have the envisaged wide impact, it is necessary to look at the role mobile applications and mobile app markets play in the OER movement. In this chapter, we link mobile applications and OER and discuss the role mobile app markets play in facilitating open-access learning initiatives. This is done by exploring OER and mobile learning definitions, benefits, and barriers; and comparing and contrasting mobile apps across a set of variables including purpose and resource format.


Sign in / Sign up

Export Citation Format

Share Document