{"title":"智能手机中的安全:手机和电脑中的病毒和安全漏洞的比较","authors":"Akash Deep, Saikat Gochhait","doi":"10.1109/ICIDCA56705.2023.10100128","DOIUrl":null,"url":null,"abstract":"In today's society, most of the waking hours are spent on mobile phones and personal computing devices; as reliance on technology and online transactions grows, which in turn increases the security risk. S martphones are becoming more accessible and convenient due to rapid technological improvements and cost reductions. The increasing dependence has serious security ramifications, mainly if the users are uninformed of smartphone information security risks. This paper discusses various security threats, viruses, countermeasures, information gathering, and OS, emphasizing open-source software developed to safeguard mobile phones from these attacks. The ease with which cyber attackers may acquire access to personal data is through cell phones to do private tasks. As a result, recommended practices for protecting and securing smart mobile phones were presented in this study.","PeriodicalId":108272,"journal":{"name":"2023 International Conference on Innovative Data Communication Technologies and Application (ICIDCA)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Security In Smartphone: A Comparison of Viruses and Security Breaches in Phones and Computers\",\"authors\":\"Akash Deep, Saikat Gochhait\",\"doi\":\"10.1109/ICIDCA56705.2023.10100128\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In today's society, most of the waking hours are spent on mobile phones and personal computing devices; as reliance on technology and online transactions grows, which in turn increases the security risk. S martphones are becoming more accessible and convenient due to rapid technological improvements and cost reductions. The increasing dependence has serious security ramifications, mainly if the users are uninformed of smartphone information security risks. This paper discusses various security threats, viruses, countermeasures, information gathering, and OS, emphasizing open-source software developed to safeguard mobile phones from these attacks. The ease with which cyber attackers may acquire access to personal data is through cell phones to do private tasks. As a result, recommended practices for protecting and securing smart mobile phones were presented in this study.\",\"PeriodicalId\":108272,\"journal\":{\"name\":\"2023 International Conference on Innovative Data Communication Technologies and Application (ICIDCA)\",\"volume\":\"42 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-03-14\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2023 International Conference on Innovative Data Communication Technologies and Application (ICIDCA)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICIDCA56705.2023.10100128\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 International Conference on Innovative Data Communication Technologies and Application (ICIDCA)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICIDCA56705.2023.10100128","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Security In Smartphone: A Comparison of Viruses and Security Breaches in Phones and Computers
In today's society, most of the waking hours are spent on mobile phones and personal computing devices; as reliance on technology and online transactions grows, which in turn increases the security risk. S martphones are becoming more accessible and convenient due to rapid technological improvements and cost reductions. The increasing dependence has serious security ramifications, mainly if the users are uninformed of smartphone information security risks. This paper discusses various security threats, viruses, countermeasures, information gathering, and OS, emphasizing open-source software developed to safeguard mobile phones from these attacks. The ease with which cyber attackers may acquire access to personal data is through cell phones to do private tasks. As a result, recommended practices for protecting and securing smart mobile phones were presented in this study.