CHAPTER 12SMARTPHONE TRIGGERED SECURITY CHALLENGES - ISSUES, CASE STUDIES AND PREVENTION

Saurabh Ranjan Srivastava1, Sachin Dube1, Gulshan Shrivastaya2, Kavita Sharma3

1 Malviya National Institute of Technology, Jaipur, India.

2 National Institute of Technology, Patna, India

3 National Institute of Technology, Kurukshetra, India

Email: gulshanstv@gmail.com

Abstract

In today’s rapidly evolving technological scenario, mobile computing devices are always at an increased risk of being attacked and exploited. Mobile security challenges comprise threats such as physical theft or accidental loss of the device, mobile malware, unauthorized access, mobile-based fraud, espionage and much more. Here, phone calls, SMS, Bluetooth, and web access act as potential security threat channels to a smartphone device. This chapter classifies the various types and details of security threats to a smartphone device. Further case studies about exploits of smartphones by terrorists, user data theft and Smartphone-based fraud are discussed. The chapter concludes with the preventive measures that can be used to improve the security of mobile devices and user data, keeping them from being exploited and attacked.

Keywords: Smartphones, mobile computing, trigger

12.1 Introduction

Today mobile phones have almost replaced personal computers and laptops by merging a combination of technologies, to fulfil the basic computational and communication necessities of today’s generation. The evolution of mobile devices ...

Get Cyber Security in Parallel and Distributed Computing now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.