Proceedings of the 18th International Conference on INFORMATICS in ECONOMY Education, Research and Business Technologies 2019
DOI: 10.12948/ie2019.06.05
|View full text |Cite
|
Sign up to set email alerts
|

Mobile Systems Security

Abstract: Mobile devices threats are all over and come in many ways. Nowadays the number of mobile devices is extremely high, and we use them to cover many personal needs like ordering food, buying plane tickets, controlling our home from distance (using IoT devices) and so on. But all of this comes with a cost and that cost is that we have to give personal data to some devices which lead to threats. This paper is an overview of what we know so far about threats which affects the mobile devices at system and physical le… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2019
2019
2019
2019

Publication Types

Select...
1

Relationship

1
0

Authors

Journals

citations
Cited by 1 publication
(2 citation statements)
references
References 0 publications
0
2
0
Order By: Relevance
“…A vulnerable Wi-Fi connection is an unencrypted one, which become a "secure" way to leak data. The point here is that exists many ways through which attackers can get from devices data like credit card details, transactions, different accounts, call logs and many others without the user's permission in order to harm him or to use that data for personal benefits [10]. At the application level can be a more vulnerabilities like incorrect permission settings, potential functionalities that can access user personal resources and many others [9].…”
Section: Mobile Devicesmentioning
confidence: 99%
See 1 more Smart Citation
“…A vulnerable Wi-Fi connection is an unencrypted one, which become a "secure" way to leak data. The point here is that exists many ways through which attackers can get from devices data like credit card details, transactions, different accounts, call logs and many others without the user's permission in order to harm him or to use that data for personal benefits [10]. At the application level can be a more vulnerabilities like incorrect permission settings, potential functionalities that can access user personal resources and many others [9].…”
Section: Mobile Devicesmentioning
confidence: 99%
“…Parts of this research have been published in the Proceedings of the 18 th International Conference on Informatics in Economy, IE 2019 [10].…”
Section: Acknowledgementsmentioning
confidence: 99%