2012 the First IEEE Workshop on Enabling Technologies for Smartphone and Internet of Things (ETSIoT) 2012
DOI: 10.1109/etsiot.2012.6311252
|View full text |Cite
|
Sign up to set email alerts
|

Best security practices for android, blackberry, and iOS

Abstract: Mobile operating systems have expanded from running exclusively on smartphones to include tablets and music players as well, making them available to a larger audience. These operating systems are responsible for maintaining a multitude of schedules, messages, calls, music, documents, applications, photos, videos, and other personal data with the goal of increasing efficiency. Because of this, developers of mobile operating systems have built in configuration options to these operating systems to better protec… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
3
0

Year Published

2013
2013
2024
2024

Publication Types

Select...
4
4
1

Relationship

0
9

Authors

Journals

citations
Cited by 19 publications
(4 citation statements)
references
References 1 publication
0
3
0
Order By: Relevance
“…Quite a few guidelines and suggestions have already been prepared for somehow improving the situation in the field. Here is a list of the typical, but still insufficient suggestions identified for Android BYOD users [23]: a) Set a device password (Settings / Location & Security / Set up screen lock), b) Disable Unknown Source to install apps from (Settings / Applications / Unknown sources), c) Install Anti-Virus protection, d) Review application permissions, e) Check for system updates, f) Turn off wireless features (GPS, Bluetooth, Wi-Fi and Portable Hotspot) when not in use, g) Do not Root the device, h) Be aware of Web Security, i) Back-up data on the device, j) Turn off Google location. Despite all these good suggestions, they are not enough to rescue a situation and serve as myths about adequate security.…”
Section: B Byod Threats With Android or How A Mobile Affects Enterpri...mentioning
confidence: 99%
“…Quite a few guidelines and suggestions have already been prepared for somehow improving the situation in the field. Here is a list of the typical, but still insufficient suggestions identified for Android BYOD users [23]: a) Set a device password (Settings / Location & Security / Set up screen lock), b) Disable Unknown Source to install apps from (Settings / Applications / Unknown sources), c) Install Anti-Virus protection, d) Review application permissions, e) Check for system updates, f) Turn off wireless features (GPS, Bluetooth, Wi-Fi and Portable Hotspot) when not in use, g) Do not Root the device, h) Be aware of Web Security, i) Back-up data on the device, j) Turn off Google location. Despite all these good suggestions, they are not enough to rescue a situation and serve as myths about adequate security.…”
Section: B Byod Threats With Android or How A Mobile Affects Enterpri...mentioning
confidence: 99%
“…We have, however, chosen not to implement this technique, as we believe it to be sub-optimal, in that it requires users to accept and install packages from outwith the Play Store, which contradicts standard accepted best-practice for security. [17] Our proposal does require that application developers elect to use this technique when developing their application, which may prove a barrier towards adoption, although likely a much smaller barrier than that experienced with techniques which require users to install a full custom operating system on their mobile device. Especially when considering the integration between Android devices and automobiles through the Android Auto scheme, we believe it is highly desireable for users to have the ability to have control over permissions in an out-ofthe-box scenario.…”
Section: Evaluation Of Proposalmentioning
confidence: 99%
“…Android OS smartphones are widely used, making them a potential target for malware attacks. Another reason Android OS is vulnerable is because it is open-source [5,6]. In 2022, 196,476 banking Trojans and 10,543 ransomware Trojans were anticipated to have been identified, according to the Kaspersky research [7].…”
Section: Introductionmentioning
confidence: 99%