首页    期刊浏览 2024年07月05日 星期五
登录注册

文章基本信息

  • 标题:Mobile Security and its Application
  • 本地全文:下载
  • 作者:Jun Hou Chan ; Jer Lang Hong
  • 期刊名称:International Journal of Security and Its Applications
  • 印刷版ISSN:1738-9976
  • 出版年度:2016
  • 卷号:10
  • 期号:10
  • 页码:89-106
  • 出版社:SERSC
  • 摘要:Ownership of a smartphone has never been easier nowadays, and it is supported by the fact that most of the people around us have a smartphone or an equivalent smart device. What is smartphone and why is it a smart? A smartphone by definition is as the name suggests, it is a phone is smart enough to not only be limited to the features and capabilities of a traditional cellular phone but also perform what a “smart” device can. And in recent years, the device that is deemed as the most intelligent device is the computer as it is the most advance piece of technology that is commercially available to the general public. Why this is so, is because in our opinion it has revolutionized how most if not all of the societies of today work. Hence what makes a smartphone is the mobile operating system that it is built upon, which is similar to a computer. It is becoming more and more of a common sight nowadays and this is because they are being offered at a price where more people are able to afford, hence they are reaching the hands of ceiling of the lower income families, all the way up to the higher income families. Back then, pure play devices were mostly simple in terms of how it function and works, hence if possible, we could suggest that the security aspect was never or rather has never been an issue other than the alteration of data after operation such as the tape of video recorders or images captured but never in the process, in the sense that there were no interruptions during operation, most likely is because it was clear and visible, but nowadays when you combine all of those devices into a complex entity, we tend to leave a hole in the cloth somewhere that we did not or rather can’t see due to the overwhelming amount of other things that we have. In this paper we discuss the current state of the commercially available operating systems of the two biggest names in smart devices, namely iOS and Android; and measure how secure and/or vulnerable (susceptible) are they to malwares and the nature of the mobile ad hoc network. We first analyze the integrity of the core of a smart device, the operating system and then use it to evaluate the effectiveness of their techniques and defenses of preventing and identifying malwares.
  • 关键词:Social Media; Data Extraction; Semantic Analysis
国家哲学社会科学文献中心版权所有