IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Review on Security Threats for Mobile Devices and Significant Countermeasures on Securing Android Mobiles

Review on Security Threats for Mobile Devices and Significant Countermeasures on Securing Android Mobiles
View Sample PDF
Author(s): Lediona Nishani (University of New York in Tirana, Albania)
Copyright: 2016
Pages: 18
Source title: Automated Enterprise Systems for Maximizing Business Performance
Source Author(s)/Editor(s): Petraq Papajorgji (Universiteti Europian i Tiranes, Albania), François Pinet (National Research Institute of Science and Technology for Environment and Agriculture, France), Alaine Margarete Guimarães (State University of Ponta Grossa, Brazil)and Jason Papathanasiou (University of Macedonia, Greece)
DOI: 10.4018/978-1-4666-8841-4.ch001

Purchase

View Review on Security Threats for Mobile Devices and Significant Countermeasures on Securing Android Mobiles on the publisher's website for pricing and purchasing information.

Abstract

Security nowadays is not a “nice to have,” but a must-have. Cybercriminals have started a new way of encouraging their activities by selling their services on the deep dark web. They are becoming day by day more persistent and smarter than ever. Therefore, the companies have to be smarter in order to face the diversity of new threats every day. The increase of botnets is responsible for an emerging ransomware attacks through cryptolocker. Another modern malware are APT (Advanced persistent threats, sophisticated threats that undertake missions in cyber space). This chapter is about a summary of the most prominent attacks on security threats regarding android mobile devices. In this review chapter we will disclose and analyze chronicles of attack, which cover researching period from 2004 when was discovered the first mobile malware, until 2014. Our research will narrow down just in the two last years because of tremendous surge of android malware that has emerged just in this short period. We have chosen this small research sample in order to provide insights and give significant evidence that in a short period we have to investigate and analyze so many miscellaneous malware and vulnerabilities techniques. In subsequent proceedings, this chapter points out the main threats category we have thought to be more notable or significant to be investigated in this review chapter. Later on, it discusses future trends and some strong recommendation on facing and dealing with the internet technology based area.

Related Content

Vincent Lennard Kraus. © 2023. 32 pages.
Tlou Maggie Masenya. © 2023. 16 pages.
Arzu Tufan, Gurkan Tuna. © 2023. 30 pages.
Wasswa Shafik. © 2023. 19 pages.
Calvin Nobles, Sharon L. Burton, Darrell Norman Burrell. © 2023. 23 pages.
Darrell Norman Burrell, Calvin Nobles, Austin Cusak, Laura Ann Jones, Jorja B. Wright, Horace C. Mingo, Jennifer Ferreras-Perez, Katrina Khanta, Philip Shen, Kevin Richardson. © 2023. 16 pages.
Jorja B. Wright, Darrell Norman Burrell. © 2023. 12 pages.
Body Bottom