CFP last date
20 May 2024
Reseach Article

Mobile Device Security: A Survey on Mobile Device Threats, Vulnerabilities and their Defensive Mechanism

by Sujithra M, Padmavathi G
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 56 - Number 14
Year of Publication: 2012
Authors: Sujithra M, Padmavathi G
10.5120/8960-3163

Sujithra M, Padmavathi G . Mobile Device Security: A Survey on Mobile Device Threats, Vulnerabilities and their Defensive Mechanism. International Journal of Computer Applications. 56, 14 ( October 2012), 24-29. DOI=10.5120/8960-3163

@article{ 10.5120/8960-3163,
author = { Sujithra M, Padmavathi G },
title = { Mobile Device Security: A Survey on Mobile Device Threats, Vulnerabilities and their Defensive Mechanism },
journal = { International Journal of Computer Applications },
issue_date = { October 2012 },
volume = { 56 },
number = { 14 },
month = { October },
year = { 2012 },
issn = { 0975-8887 },
pages = { 24-29 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume56/number14/8960-3163/ },
doi = { 10.5120/8960-3163 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:58:49.546367+05:30
%A Sujithra M
%A Padmavathi G
%T Mobile Device Security: A Survey on Mobile Device Threats, Vulnerabilities and their Defensive Mechanism
%J International Journal of Computer Applications
%@ 0975-8887
%V 56
%N 14
%P 24-29
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Mobile communication has become a serious business tool nowadays. Mobile devices are the major platform for the users to transfer and exchange diverse data for communication. These devices are variably used for applications like banking, personal digital assistance, remote working, m-commerce, internet access, entertainment and medical usage. However people are still hesitant to use mobile devices because of its security issue. It is necessary to provide a reliable and easy to use method for securing these mobile devices against unauthorized access and diverse attacks. It is preferred to apply biometrics for the security of mobile devices and improve reliability over wireless services. This paper deals with various threats and vulnerabilities that affect the mobile devices and also it discusses how biometrics can be a solution to the mobile devices ensuring security.

References
  1. Roberta Cozza, "Forecast: Mobile Communications Devices by Open Operating System, Worldwide, 2008-2015," Gartner, April 5, 2011
  2. Flurry (June 2011), Mobile Application Put the Web in Their Rear-view Mirror: http://blog. flurry. com/bid/63907/Mobile- Application-Put-the- Web-in-Their-Rear-view-Mirror
  3. Erica Ogg, "HP: Number of mobile application doesn't matter," CNET News, June 29, 2011
  4. Mavridis I. , Pangalos G "Security Issues in a Mobile Computing Paradigm"2012
  5. Lookout Mobile Threat Report, August 2011
  6. http://en. wikipedia. org/wiki/Vulnerability_(computing)
  7. Anurag Kumar Jain,Devendra Shanbhag "Addressing Security and Risks in Mobile Applications". 2012
  8. Brostoff, S. and Sasse, M. A. Are Pass faces more usable than passwords: a field trial investigation, in People and Computers XIV – Usability or Else: Proceedings of HCI. Sunderland, UK: Springer-Verlag, 2000
  9. http://www. rsasecurity. com/products/securid/Last accessed in January 2008.
  10. Daniel, K. Foiling the Cracker: A Survey of, and Improvements to, Password Security, Proceedings of the 2nd USENIX UNIX Security Workshop, pp. 5-14, August 1990.
  11. Wiedenbeck, S. ,Waters, J. , Birget, J. C. , Brodskiy, A. and Memon, N. Authentication using graphical passwords: Effects of tolerance and image choice, in Symposium on Usable Privacy and Security (SOUPS), at Carnegie-Mellon Univ. , Pittsburgh, 6-8 July 2005.
  12. Paul Ruggiero and Jon Foote "Cyber Threats to Mobile ", Produced for US-CERT, a government organization, Carnegie Mellon University-US, 2011.
Index Terms

Computer Science
Information Sciences

Keywords

Mobile devices Security Threats Vulnerabilities Biometrics