IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Security Threats on Mobile Devices

Security Threats on Mobile Devices
View Sample PDF
Author(s): Lukáš Aron (Brno University of Technology, Czech Republic)
Copyright: 2015
Pages: 23
Source title: New Threats and Countermeasures in Digital Crime and Cyber Terrorism
Source Author(s)/Editor(s): Maurice Dawson (Illinois Institute of Technology, USA)and Marwan Omar (Nawroz University, Iraq)
DOI: 10.4018/978-1-4666-8345-7.ch003

Purchase

View Security Threats on Mobile Devices on the publisher's website for pricing and purchasing information.

Abstract

This chapter contains basic introduction into security models of modern operating system like Android, iOS or Windows Phone. There are described the methods of attacks to the mobile devices. Such attacks consist of application based threats and vulnerabilities, network based attacks and internet browser vulnerabilities. The following section contains description of defensive strategies and steps for securing the device. There is also section about securing mobile device for enterprise environment. At the end of this chapter are discussed recommendations for security practices for mobile devices.

Related Content

Hossam Nabil Elshenraki. © 2024. 23 pages.
Ibtesam Mohammed Alawadhi. © 2024. 9 pages.
Akashdeep Bhardwaj. © 2024. 33 pages.
John Blake. © 2024. 12 pages.
Wasswa Shafik. © 2024. 36 pages.
Amar Yasser El-Bably. © 2024. 12 pages.
Sameer Saharan, Shailja Singh, Ajay Kumar Bhandari, Bhuvnesh Yadav. © 2024. 23 pages.
Body Bottom