CFP last date
22 April 2024
Reseach Article

Mobile Security: A Literature Review

by Cassandra Beyer
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 97 - Number 8
Year of Publication: 2014
Authors: Cassandra Beyer
10.5120/17025-7315

Cassandra Beyer . Mobile Security: A Literature Review. International Journal of Computer Applications. 97, 8 ( July 2014), 9-11. DOI=10.5120/17025-7315

@article{ 10.5120/17025-7315,
author = { Cassandra Beyer },
title = { Mobile Security: A Literature Review },
journal = { International Journal of Computer Applications },
issue_date = { July 2014 },
volume = { 97 },
number = { 8 },
month = { July },
year = { 2014 },
issn = { 0975-8887 },
pages = { 9-11 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume97/number8/17025-7315/ },
doi = { 10.5120/17025-7315 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:23:33.405839+05:30
%A Cassandra Beyer
%T Mobile Security: A Literature Review
%J International Journal of Computer Applications
%@ 0975-8887
%V 97
%N 8
%P 9-11
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The following paper is a literature review on the topic of Mobile Security. The topic has been chosen due to the rise in mobile applications and the insufficient rise in the topic of the security within those applications. For the purposes of this paper, mobile devices are considered as tablet and cell phones which run a mobile Operating System (OS). More specifically, these are Android (Google), iOS (Apple), or BlackBerry OS (RIM). While it is important to note these terms, this literature review is focused primarily on the Android OS security vulnerabilities. Polymorphic is defined as malware that transforms to be somewhat different than the one before. The automated modifications in code do not modify the malware's functionality, but they can render conventional anti-virus detection technology ineffective against them. An attack vector is most basically described as the approach utilized to assault a specific technology (i. e. a path taken to compromise a system). A botnet is a collection of "zombies" which are remotely controlled for malicious or financial gains [1]. A single botnet often contains hundreds or thousands of devices. When the term "vulnerability" is being utilized within this paper, it is a weak spot which allows an attacker to decrease a system's security. A vulnerability occurs when three elements intersect, including a system weakness or flaw, attacker access to the flaw, and attacker competence to exploit the flaw [2].

References
  1. "Glossary," May 2005. [Online]. Available: http://www. ic. gc. ca/eic/site/ecic-ceac. nsf/eng/gv00333. html. [Accessed 4 November 2012].
  2. "The Three Tenents of Cyber Security," n. d. . [Online]. Available: http://www. spi. dod. mil/tenets. htm. [Accessed 4 November 2012].
  3. T. Blitz, "Decoding mobile device security," Security, vol. 5, no. 42, pp. 46-47, 2005.
  4. Google Mobile Blog, "Android and Security," 2 February 2012. [Online]. Available: http://googlemobile. blogspot. com/2012/02/android-and-security. html. [Accessed 4 November 2012].
  5. M. Finneran, "Mobile security gaps abound," InformationWeek, vol. 1333, pp. 26-29, 2012.
  6. N. Mallat, "Exploring consumer adoption of mobile payment - A qualitative study," The Journal of Strategic Information Systems, vol. 16, no. 4, pp. 413-432, Decmeber 2007.
  7. G. Hurlburt, J. Voas and K. W. Miller, "Mobile-app addiction: Threat to security?," IT Professional Magazine, vol. 6, no. 13, pp. 9-11, 2011.
  8. N. Leavitt, "Mobile security: Finally a serious problem," Computer, vol. 6, no. 44, pp. 11-14, 2011.
  9. K. Marko, "Rise of android botnets. ," Informationweek - Online, 2011.
  10. "More mobile security glitches," Computer Fraud & Security, no. 7, p. 3, 2011.
  11. M. Balanza, "Android malware acts as an SMS relay," Trend Micro Labs, 2011.
  12. ThreatInsight, "Cloned Android Apps: Symbiosis or Parasitic?," F-Secure, 2011.
  13. Hak5, "Extreme android and google auth hacking with kos," Hak5, 2012.
  14. J. Hu, V. Bhagavatula, M. Bennamoun and K. Toh, "Biometric security for mobile computing," Security & Communication Networks, vol. 5, no. 4, pp. 483-486, 2011.
  15. J. E. Bickford, "Rootkits on smart phones: Attacks, implications, and energy-aware defense techniques," Rutgers The State University of New Jersey, New Brunswick, 2012.
  16. K. Raman, "Towards classification of polymorphic malware," University of California, Irvine, 2011.
  17. The Identity Theft Resource Center, "Breaches: Knowing less and less about less and less," The Identity Theft Resource Center, 2012.
Index Terms

Computer Science
Information Sciences

Keywords

Mobile Security polymorphic smartphones Android IOS Blackberry Google Anti-virus BYOD Botnet Vulnerability Information Technology ISA