[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Weichbroth et al., 2020 - Google Patents

Mobile security: Threats and best practices

Weichbroth et al., 2020

View PDF @Full View
Document ID
2250981569109697653
Author
Weichbroth P
Łysik
Publication year
Publication venue
Mobile Information Systems

External Links

Snippet

Communicating mobile security threats and best practices has become a central objective due to the ongoing discovery of new vulnerabilities of mobile devices. To cope with this overarching issue, the goal of this paper is to identify and analyze existing threats and best …
Continue reading at onlinelibrary.wiley.com (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection
    • G06F21/563Static detection by source code analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/554Detecting local intrusion or implementing counter-measures involving event detection and direct action
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2101Auditing as a secondary aspect
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/77Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/03Indexing scheme relating to G06F21/50, monitoring users, programs or devices to maintain the integrity of platforms

Similar Documents

Publication Publication Date Title
Weichbroth et al. Mobile security: Threats and best practices
US11323464B2 (en) Artifact modification and associated abuse detection
EP3706022B1 (en) Permissions policy manager to configure permissions on computing devices
Braun et al. Security and privacy challenges in smart cities
US20210058395A1 (en) Protection against phishing of two-factor authentication credentials
US10924517B2 (en) Processing network traffic based on assessed security weaknesses
Parsons et al. The predator in your pocket: A multidisciplinary assessment of the stalkerware application industry
Almutairi et al. Investigation of smart home security and privacy: Consumer perception in saudi arabia
Kariuki et al. Cybersecurity threats and vulnerabilities experienced by small-scale African migrant traders in Southern Africa
Amrin The impact of cyber security on SMEs
Aswathy et al. Privacy Breaches through Cyber Vulnerabilities: Critical Issues, Open Challenges, and Possible Countermeasures for the Future
Tounsi Cyber-Vigilance and Digital Trust: Cyber Security in the Era of Cloud Computing and IoT
Herland Information security risk assessment of smartphones using Bayesian networks
Bareh Assessment of the privacy and security practices of the Indian academic websites
Ofusori Three-dimensional security framework for BYOD enabled banking institutions in Nigeria.
Kaushik et al. Advanced Techniques and Applications of Cybersecurity and Forensics
Aswathy et al. 10 Privacy Breaches
Autry Secure IoT Compliance Behaviors Among Teleworkers
Shivakumara et al. Review Paper on Dynamic Mechanisms of Data Leakage Detection and Prevention
Alsmadi et al. IT Risk and Security Management
Almotiri Security & Privacy Awareness & Concerns of Computer Users Posed by Web Cookies and Trackers
Park Mobile device security: young people's awareness and perceptions
Hofer III Evaluating the Relationship Between Mobile Device Users and Their Cybersecurity Behaviors and Attitudes
Hasan et al. Security framework for adopting mobile applications in small and medium enterprises
Jayasekara Privacy: A Critical Evolution of Information Security in the Digital Age