Weichbroth et al., 2020 - Google Patents
Mobile security: Threats and best practicesWeichbroth et al., 2020
View PDF- Document ID
- 2250981569109697653
- Author
- Weichbroth P
- Łysik
- Publication year
- Publication venue
- Mobile Information Systems
External Links
Snippet
Communicating mobile security threats and best practices has become a central objective due to the ongoing discovery of new vulnerabilities of mobile devices. To cope with this overarching issue, the goal of this paper is to identify and analyze existing threats and best …
- 238000000034 method 0 description 17
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/562—Static detection
- G06F21/563—Static detection by source code analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/554—Detecting local intrusion or implementing counter-measures involving event detection and direct action
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2101—Auditing as a secondary aspect
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/77—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/03—Indexing scheme relating to G06F21/50, monitoring users, programs or devices to maintain the integrity of platforms
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Weichbroth et al. | Mobile security: Threats and best practices | |
US11323464B2 (en) | Artifact modification and associated abuse detection | |
EP3706022B1 (en) | Permissions policy manager to configure permissions on computing devices | |
Braun et al. | Security and privacy challenges in smart cities | |
US20210058395A1 (en) | Protection against phishing of two-factor authentication credentials | |
US10924517B2 (en) | Processing network traffic based on assessed security weaknesses | |
Parsons et al. | The predator in your pocket: A multidisciplinary assessment of the stalkerware application industry | |
Almutairi et al. | Investigation of smart home security and privacy: Consumer perception in saudi arabia | |
Kariuki et al. | Cybersecurity threats and vulnerabilities experienced by small-scale African migrant traders in Southern Africa | |
Amrin | The impact of cyber security on SMEs | |
Aswathy et al. | Privacy Breaches through Cyber Vulnerabilities: Critical Issues, Open Challenges, and Possible Countermeasures for the Future | |
Tounsi | Cyber-Vigilance and Digital Trust: Cyber Security in the Era of Cloud Computing and IoT | |
Herland | Information security risk assessment of smartphones using Bayesian networks | |
Bareh | Assessment of the privacy and security practices of the Indian academic websites | |
Ofusori | Three-dimensional security framework for BYOD enabled banking institutions in Nigeria. | |
Kaushik et al. | Advanced Techniques and Applications of Cybersecurity and Forensics | |
Aswathy et al. | 10 Privacy Breaches | |
Autry | Secure IoT Compliance Behaviors Among Teleworkers | |
Shivakumara et al. | Review Paper on Dynamic Mechanisms of Data Leakage Detection and Prevention | |
Alsmadi et al. | IT Risk and Security Management | |
Almotiri | Security & Privacy Awareness & Concerns of Computer Users Posed by Web Cookies and Trackers | |
Park | Mobile device security: young people's awareness and perceptions | |
Hofer III | Evaluating the Relationship Between Mobile Device Users and Their Cybersecurity Behaviors and Attitudes | |
Hasan et al. | Security framework for adopting mobile applications in small and medium enterprises | |
Jayasekara | Privacy: A Critical Evolution of Information Security in the Digital Age |