{"title":"各种流动电话保安威胁的问题","authors":"S. Nseir, N. Hirzallah, M. Aqel","doi":"10.1109/PICICT.2013.17","DOIUrl":null,"url":null,"abstract":"The number of Mobile phones, mainly smart phones, being sold has increased dramatically in recent years. They are becoming more preferred companions to users than desktops or notebooks. This has led to more and more sensitive data being stored on these mobile devices. Unfortunately, applications and data stored on mobile phones are less protected from unauthorized access than on most desktop and mobile computers. In this paper, we will discuss the various security threats that are specific to mobile phones. These threats mainly come from the ports that open the phone to the external world, such as Bluetooth, WiFi and MicroSD memory slots. The paper then concludes that more investigations and innovative techniques are needed to secure the data stored on the removable memory cards, yet creates no further burdensome or bothersome to the users.","PeriodicalId":320407,"journal":{"name":"2013 Palestinian International Conference on Information and Communication Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"Issues with Various Security Threats on Mobile Phones\",\"authors\":\"S. Nseir, N. Hirzallah, M. Aqel\",\"doi\":\"10.1109/PICICT.2013.17\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The number of Mobile phones, mainly smart phones, being sold has increased dramatically in recent years. They are becoming more preferred companions to users than desktops or notebooks. This has led to more and more sensitive data being stored on these mobile devices. Unfortunately, applications and data stored on mobile phones are less protected from unauthorized access than on most desktop and mobile computers. In this paper, we will discuss the various security threats that are specific to mobile phones. These threats mainly come from the ports that open the phone to the external world, such as Bluetooth, WiFi and MicroSD memory slots. The paper then concludes that more investigations and innovative techniques are needed to secure the data stored on the removable memory cards, yet creates no further burdensome or bothersome to the users.\",\"PeriodicalId\":320407,\"journal\":{\"name\":\"2013 Palestinian International Conference on Information and Communication Technology\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2013-04-15\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2013 Palestinian International Conference on Information and Communication Technology\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/PICICT.2013.17\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2013 Palestinian International Conference on Information and Communication Technology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/PICICT.2013.17","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Issues with Various Security Threats on Mobile Phones
The number of Mobile phones, mainly smart phones, being sold has increased dramatically in recent years. They are becoming more preferred companions to users than desktops or notebooks. This has led to more and more sensitive data being stored on these mobile devices. Unfortunately, applications and data stored on mobile phones are less protected from unauthorized access than on most desktop and mobile computers. In this paper, we will discuss the various security threats that are specific to mobile phones. These threats mainly come from the ports that open the phone to the external world, such as Bluetooth, WiFi and MicroSD memory slots. The paper then concludes that more investigations and innovative techniques are needed to secure the data stored on the removable memory cards, yet creates no further burdensome or bothersome to the users.