Academia.eduAcademia.edu

Outline

Smartphone Security and Protection Practices

2021, International Journal of Engineering and Applied Computer Science (IJEACS)

Abstract

The research and communications for detecting mobile security threats with the best protection practices of applications have become essential goals nowadays due to the continuous discoveries of new vulnerabilities. The internet and web-based activities have been increased drastically in recent times by users of all categories. Users have extensively started involved in gaming, banking, frequent bill payment, entertainment, and other network and online activities that are requiring a large number of mobile phone protection and security mechanisms in response to advancements in full-stack applications and wireless networks. The goal of this paper is to uncover the best-applied practices in the domain of mobile security to protect smartphone devices. The main advantages of smartphones are small size with easiness in carrying anywhere and can be a replacement for computing devices in some ways for example emails. Unfortunately, the convenience of using smartphones to do the private task is the loophole cyber attackers need to gain access to personal data. Thus, this paper proposed eight best practices to protect and secure smart mobile phones.

References (21)

  1. Ratul Sikder , Md Shohel Khan , Md Shohrab Hossain , Wazir Zada Khan," A survey on android security: development and deployment hindrance and best practices", TELKOMNIKA Telecommunication, Computing, Electronics and Control, Vol. 18, ISSN: 1693-6930, February 2020.
  2. uSwitch Mobiles, "History of mobile phones," Available: http://bit.ly/2SfFmwu, Accessed: 11 March 2019, April 2018.
  3. ShoutMeLoud, "Top 10 mobile phones operating systems," [Online], Available: http://bit.ly/2Y2KREh, , November 2017
  4. Statista, Smartphones-Statistics & Facts, Statista, Hamburg, Germany, 2020, https://www.statista.com/topics/840/ smartphone
  5. B. Guo, Y. Ouyang, T. Guo, L. Cao, and Z. Yu, "Enhancing mobile app user understanding and marketing with heterogeneous crowdsourced data: a review," IEEE Access, vol. 7, pp. 68557-68571, 2019.
  6. S. Mavoungou, G. Kaddoum, M. Taha, and G. Matar, "Survey on threats and attacks on mobile networks," IEEE Access, vol. 4, pp. 4543-4572, 2016.
  7. Paweł Weichbroth & Łukasz Łysik, "Mobile Security: Threats and Best Practices ",
  8. A. K. Jha, S. Lee, and W. J. Lee, "Developer mistakes in writing android manifests: an empirical study of configuration errors," in Mining Software Repositories (MSR), 2017 IEEE/ACM 14th International Conference on, IEEE, 2017, pp. 25-36.
  9. Amy, "Help keep your android device safe -android help," [Online], Available: https://bit.ly/2DPTqa1, , 2018
  10. Ericsson Mobility Report, https://www.ericsson.com/4acd7e/ assets/local/mobility-report/documents/2019/emr-november2019.pdf, 2020.
  11. 75+ Mobile Marketing Statistics for 2020 and beyond, https:// www.bluecorona.com/blog/mobile-marketing-statistics/, 2020
  12. Mobile Marketing Statistics and Trends for 2020: https:// quoracreative.com/article/mobile-marketing-statistics, 2020.
  13. Ryan Whitwan ," What is bootloader, and why does Verizon want them locked ?",ExtremeTech,2012
  14. Willam Stantan ," How to Check if Your Andriod Phone is Rooted",alphr ,2021
  15. Alice MJ," Top 6 Andriod App Manager : Manage All Apps on your Andriod Device Effortlessly",Wondershare , Jan 2021
  16. Belal Amro ," Malware Detection Techniques For Mobile Devices",IJMNCT, Vol 7 ,Dec 2017.
  17. H.Patel,"14 best practices for your mobile app security," Tristate Technology , 2017, https://www.tristatetechnology.com/blog/best- practices-to-improve-mobile-app-security/.
  18. J.Callaham " The history of Android: The evolution of the biggest mobile OS in the world", Android Authority, May 2021.
  19. Kaur H, Ahamad S, Verma GN. Elements of Legacy Program Complexity. International Journal of Research in Engineering and Technology. 2015; 4(3):501-5.
  20. G. Narayanan, M. S. Ali and S. Ahamad, "Cyber secure consensus of discrete-time fractional-order multi-agent systems with distributed delayed control against attacks," 2021 IEEE International Conference on Systems, Man, and Cybernetics (SMC), 2021, pp. 2191-2196, doi: 10.1109/SMC52423.2021.9658921.
  21. Abdul bari, Mohammed; Ahamad, Shahanawaj. (2011). Process of Reverse Engineering of Enterprise Information System Architecture. International Journal of Computer Science Issues. ISSN (Online): 1694- 0814, Vol. 8, Issue 5, No 3, September 2011.