Detail publikace

Security Threats on Mobile Devices

Originální název

Security Threats on Mobile Devices

Anglický název

Security Threats on Mobile Devices

Jazyk

en

Originální abstrakt

This chapter contains basic introduction into security models of modern operating system like Android and iOS. There are described the methods of attacks to the mobile devices. Such attacks consist of application based threats and vulnerabilities, network based attacks and internet browser vulnerabilities. The following section contains description of defensive strategies and steps for securing the device. There is also section about securing mobile device for enterprise environment. At the end of this chapter are discussed recommendation for security practices for mobile devices. 

Anglický abstrakt

This chapter contains basic introduction into security models of modern operating system like Android and iOS. There are described the methods of attacks to the mobile devices. Such attacks consist of application based threats and vulnerabilities, network based attacks and internet browser vulnerabilities. The following section contains description of defensive strategies and steps for securing the device. There is also section about securing mobile device for enterprise environment. At the end of this chapter are discussed recommendation for security practices for mobile devices. 

BibTex


@inbook{BUT119790,
  author="Lukáš {Aron}",
  title="Security Threats on Mobile Devices",
  annote="This chapter contains basic introduction into security models of modern operating
system like Android and iOS. There are described the methods of attacks to the
mobile devices. Such attacks consist of application based threats and
vulnerabilities, network based attacks and internet browser vulnerabilities. The
following section contains description of defensive strategies and steps for
securing the device. There is also section about securing mobile device for
enterprise environment. At the end of this chapter are discussed recommendation
for security practices for mobile devices. ",
  address="IGI Global",
  booktitle="Handbook of Research on New Threats and Countermeasures in Digital Crime and Cyber Terrorism",
  chapter="119790",
  doi="10.4018/978-1-4666-8345-7.ch003",
  edition="NEUVEDEN",
  howpublished="print",
  institution="IGI Global",
  year="2015",
  month="april",
  pages="30--53",
  publisher="IGI Global",
  type="book chapter"
}