{"title":"在自带设备(BYOD)工作场所中通过Android应用程序泄露敏感数据的审查","authors":"M. Morolong, Attlee M. Gamundani, F. Bhunu Shava","doi":"10.23919/ISTAFRICA.2019.8764833","DOIUrl":null,"url":null,"abstract":"Researchers reveal that personal computers are not exclusively liable to attacks. Mobile devices have become the very best target due to the fact that, they are largely accustomed to performing numerous activities. Email communication, sending and receiving text messages, installation of monetary applications (apps) such as mobile banking apps and Bring Your Own Device (BYOD) adoption in enterprises for work-related functions are among others. Literature review establishes that attackers of mobile devices gather sensitive user and enterprise data, which they use for blackmailing or for amerceable monetary gains. As the subsequent result of mobile app protection and Android vulnerability concerns, researchers and practitioners are evaluating the impact the security of android mobile device has on enterprise and personal data. This paper reviews the extent of data leakage through android devices in a BYOD enabled environment, android application security model and BYOD benefits and risks using desktop review as the methodology.","PeriodicalId":420572,"journal":{"name":"2019 IST-Africa Week Conference (IST-Africa)","volume":"154 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"Review of Sensitive Data Leakage through Android Applications in a Bring Your Own Device (BYOD) Workplace\",\"authors\":\"M. Morolong, Attlee M. Gamundani, F. Bhunu Shava\",\"doi\":\"10.23919/ISTAFRICA.2019.8764833\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Researchers reveal that personal computers are not exclusively liable to attacks. Mobile devices have become the very best target due to the fact that, they are largely accustomed to performing numerous activities. Email communication, sending and receiving text messages, installation of monetary applications (apps) such as mobile banking apps and Bring Your Own Device (BYOD) adoption in enterprises for work-related functions are among others. Literature review establishes that attackers of mobile devices gather sensitive user and enterprise data, which they use for blackmailing or for amerceable monetary gains. As the subsequent result of mobile app protection and Android vulnerability concerns, researchers and practitioners are evaluating the impact the security of android mobile device has on enterprise and personal data. This paper reviews the extent of data leakage through android devices in a BYOD enabled environment, android application security model and BYOD benefits and risks using desktop review as the methodology.\",\"PeriodicalId\":420572,\"journal\":{\"name\":\"2019 IST-Africa Week Conference (IST-Africa)\",\"volume\":\"154 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2019-05-08\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2019 IST-Africa Week Conference (IST-Africa)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.23919/ISTAFRICA.2019.8764833\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 IST-Africa Week Conference (IST-Africa)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.23919/ISTAFRICA.2019.8764833","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Review of Sensitive Data Leakage through Android Applications in a Bring Your Own Device (BYOD) Workplace
Researchers reveal that personal computers are not exclusively liable to attacks. Mobile devices have become the very best target due to the fact that, they are largely accustomed to performing numerous activities. Email communication, sending and receiving text messages, installation of monetary applications (apps) such as mobile banking apps and Bring Your Own Device (BYOD) adoption in enterprises for work-related functions are among others. Literature review establishes that attackers of mobile devices gather sensitive user and enterprise data, which they use for blackmailing or for amerceable monetary gains. As the subsequent result of mobile app protection and Android vulnerability concerns, researchers and practitioners are evaluating the impact the security of android mobile device has on enterprise and personal data. This paper reviews the extent of data leakage through android devices in a BYOD enabled environment, android application security model and BYOD benefits and risks using desktop review as the methodology.