Mobile Security: A Review

Abstract

Nowadays, we have a tendency to use mobile devices in our everyday lives since they permit us to access an outsized form of services. The expansion of mobile devices provides scope for attacker’s to attack exploitation malware like viruses, botnets, Viruses that became a priority to users exploitation mobile devices since they leak sensitive info keep at or transmitted by mobile devices. Moreover, at now, we have a tendency to argue that understanding the factors touching users’ intentions and motivations to simply accept and use explicit technologies is crucial to leverage the safety of mobile applications during this work, we have a tendency to purpose this survey to gift the most privacy and security challenges in cloud and info domain, that have big abundant interest among the analysis community.

Country : India

1 Kresha Shah2 Jiya Agrawal3 Radhika Patwardhan

  1. Student, Information Technology Department, Shri Bhagubhai Mafatlal Polytechnic, Mumbai, Maharashtra, India
  2. Student, Information Technology Department, Shri Bhagubhai Mafatlal Polytechnic, Mumbai, Maharashtra, India
  3. Lecturer, Information Technology Department, Shri Bhagubhai Mafatlal Polytechnic, Mumbai, Maharashtra, India

IRJIET, Volume 6, Issue 1, January 2022 pp. 15-18

doi.org/10.47001/IRJIET/2022.601004

References

  1. PMD Nagarjun1 and Shaik Shakeel Ahamad2, “Review of mobile security problems and defensive methods”, International Journal of Applied Engineering Research ISSN 0973-4562, Volume 13, Number 12 (2018), pp. 10256-10259.
  2. P. K. Paul1, P. S. Aithal2,” MOBILE APPLICATIONS SECURITY: AN OVERVIEW AND CURRENT TREND”, IQAC 2019, ISBN No.: 978-81-941751-0-0
  3. Mariantonietta La Polla, Fabio Martinelli, and Daniele Sgandurra, “A Survey on Security for Mobile Devices”,” IEEE COMMUNICATIONS SURVEYS & TUTORIALS.
  4. Shefali Sachdeva, Romuald Jolivot, and Worawat Choensawat,” Android Malware Classification based on Mobile Security Framework”, IAENG International Journal of Computer Science, 45:4, IJCS_45_4_03 (Advance online publication: 7 November 2018).
  5. Lei Zhang, “Mobile Security Threats and Issues - A Broad Overview of Mobile Device Security”.
  6. Paweł Weichbroth 1 and Łukasz Łysik 2, “Mobile Security: Threats and Best Practices”, https://doi.org/10.1155/2020/8828078
  7. Imen Merdassi, Cherif Ghazel, Leila Saidane, “Surveying and Analyzing Security Issues in Mobile Cloud Computing”.
  8. Parviz Ghorbanzadeh, Aytak shaddeli, Roghieh Malekzadeh, Zoleikha Jahanbakhsh, “A Survey of Mobile Database Security Threats and Solutions for It”.
  9. Van-Linh Nguyen, Po-Ching Lin, Bo-Chao Cheng, Ren-Hung Hwang, Ying-Dar Lin, “Security and privacy for 6G: A survey on prospective technologies and challenges”, IEEE Communications Surveys & Tutorials.