IndexLiterature ReviewReview of Literature SummaryFuture ResearchFile AuthorizationConclusionLiterature ReviewMobile security, or more specifically mobile device security, has become increasingly important in mobile computing. Of particular concern is the security of personal and business information now stored on smartphones. More and more users and companies use smartphones to communicate, but also to plan and organize the work and private lives of their users. Within companies, these technologies are causing profound changes in the organization of information systems and have therefore become a source of new risks. Smartphones, in fact, collect and compile an increasing amount of sensitive information whose access must be controlled to protect the user's privacy and the company's intellectual property. All smartphones, as well as computers, are favorite targets for attacks. These attacks exploit weaknesses inherent in smartphones that can come from communication modes such as Short Message Service (SMS, i.e. text messages), Multimedia Messaging Service) (wifi, Bluetooth and GSM), the global standard for mobile communications. Say no to plagiarism. Get a tailor-made essay on "Why Violent Video Games Shouldn't Be Banned"? Get an original essay There are also exploits that target software vulnerabilities in the browser or operating system. Furthermore, some malicious software relies on the average user's lack of knowledge. According to 2008 McAfee research, 11.6 percent of users had heard of someone else being affected by mobile malware, but only 2.1 percent had personal experience with the issue. However, this number is expected to increase. Security countermeasures are being developed and applied to smartphones, from security in different software layers to dissemination of information to end users. Summary Literature Review Mobile devices often do not have passwords enabled. Mobile devices often lack passwords to authenticate users and control access to data stored on the devices. Many devices have the technical ability to support passwords, personal identification numbers (PINs), or patterned screen locks for authentication. Some mobile devices also include a biometric reader to scan a fingerprint for authentication. However, anecdotal information indicates that consumers rarely use these mechanisms. Additionally, if users use a password or PIN, they often choose passwords or PINs that can be easily determined or bypassed, such as 1234 or 0000. Without a password or PIN to lock the device, there is an increased risk of phone information being stolen or lost unauthorized users could be accessed who could view sensitive information and misuse mobile devices. Future Research Security in Operating Systems The first layer of security in a smartphone is the operating system (OS). In addition to having to manage the usual roles of an operating system (e.g. resource management, scheduling processes) on the device, it must also establish protocols for introducing external applications and data without introducing risks. File Authorization From legacy Linux, there are also file system authorization mechanisms, they help with sandboxing; a process cannot modify any file it wants. It is therefore not possible to change the permissions of the files installed on the SD card from the phone and consequently it is impossible to install applications. Security Software In addition to operating system security, there is a layer of security software. This.
tags