首页    期刊浏览 2024年09月19日 星期四
登录注册

文章基本信息

  • 标题:Vulnerabilities in Mobile Devices
  • 本地全文:下载
  • 作者:Dr. Sulaiman Al amro
  • 期刊名称:International Journal of Computer Science and Security (IJCSS)
  • 电子版ISSN:1985-1553
  • 出版年度:2017
  • 卷号:11
  • 期号:3
  • 页码:34-41
  • 出版社:Computer Science Journals
  • 摘要:Mobile devices are no longer just dedicated communication devices and have even exceeded the limits of such, and have become an essential part of our life; they are indispensable. It is through the memory that you can store images and videos and can also connect to social networking; it can also be played by linking to bank accounts. However, we must bear in mind that there are people in this world who are trying, day and night, to get to your private information, to steal from you and either exploit the user or simply to steal his/her money. These people are called hackers, as will be named through our topic for today. We will put in your hands the most important points that make sure that he is spying on your mobile and the mobile penetrative. The biggest obstacle to these investigators, whether spies or hackers' encryption is "full device encryption" or "full data" to be encrypted, and here we must distinguish between the two things, not confusing them. This paper will explain the vulnerabilities of mobile devices and how they can be avoided.
  • 关键词:Mobile Devices; Vulnerabilities; Encryption; Operating Systems; Applications.
国家哲学社会科学文献中心版权所有