智能手机中的安全:手机和电脑中的病毒和安全漏洞的比较

Akash Deep, Saikat Gochhait
{"title":"智能手机中的安全:手机和电脑中的病毒和安全漏洞的比较","authors":"Akash Deep, Saikat Gochhait","doi":"10.1109/ICIDCA56705.2023.10100128","DOIUrl":null,"url":null,"abstract":"In today's society, most of the waking hours are spent on mobile phones and personal computing devices; as reliance on technology and online transactions grows, which in turn increases the security risk. S martphones are becoming more accessible and convenient due to rapid technological improvements and cost reductions. The increasing dependence has serious security ramifications, mainly if the users are uninformed of smartphone information security risks. This paper discusses various security threats, viruses, countermeasures, information gathering, and OS, emphasizing open-source software developed to safeguard mobile phones from these attacks. The ease with which cyber attackers may acquire access to personal data is through cell phones to do private tasks. As a result, recommended practices for protecting and securing smart mobile phones were presented in this study.","PeriodicalId":108272,"journal":{"name":"2023 International Conference on Innovative Data Communication Technologies and Application (ICIDCA)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Security In Smartphone: A Comparison of Viruses and Security Breaches in Phones and Computers\",\"authors\":\"Akash Deep, Saikat Gochhait\",\"doi\":\"10.1109/ICIDCA56705.2023.10100128\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In today's society, most of the waking hours are spent on mobile phones and personal computing devices; as reliance on technology and online transactions grows, which in turn increases the security risk. S martphones are becoming more accessible and convenient due to rapid technological improvements and cost reductions. The increasing dependence has serious security ramifications, mainly if the users are uninformed of smartphone information security risks. This paper discusses various security threats, viruses, countermeasures, information gathering, and OS, emphasizing open-source software developed to safeguard mobile phones from these attacks. The ease with which cyber attackers may acquire access to personal data is through cell phones to do private tasks. As a result, recommended practices for protecting and securing smart mobile phones were presented in this study.\",\"PeriodicalId\":108272,\"journal\":{\"name\":\"2023 International Conference on Innovative Data Communication Technologies and Application (ICIDCA)\",\"volume\":\"42 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-03-14\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2023 International Conference on Innovative Data Communication Technologies and Application (ICIDCA)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICIDCA56705.2023.10100128\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 International Conference on Innovative Data Communication Technologies and Application (ICIDCA)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICIDCA56705.2023.10100128","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

在当今社会,大部分醒着的时间都花在手机和个人电脑设备上;随着对技术和在线交易依赖的增加,这反过来又增加了安全风险。由于技术的快速进步和成本的降低,智能手机正变得越来越容易获得和方便。这种日益增长的依赖会带来严重的安全后果,主要是如果用户不了解智能手机的信息安全风险。本文讨论了各种安全威胁,病毒,对策,信息收集和操作系统,强调开发开源软件来保护手机免受这些攻击。网络攻击者可以通过手机轻松获取个人数据来执行私人任务。因此,本研究提出了保护和保护智能手机的建议做法。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Security In Smartphone: A Comparison of Viruses and Security Breaches in Phones and Computers
In today's society, most of the waking hours are spent on mobile phones and personal computing devices; as reliance on technology and online transactions grows, which in turn increases the security risk. S martphones are becoming more accessible and convenient due to rapid technological improvements and cost reductions. The increasing dependence has serious security ramifications, mainly if the users are uninformed of smartphone information security risks. This paper discusses various security threats, viruses, countermeasures, information gathering, and OS, emphasizing open-source software developed to safeguard mobile phones from these attacks. The ease with which cyber attackers may acquire access to personal data is through cell phones to do private tasks. As a result, recommended practices for protecting and securing smart mobile phones were presented in this study.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信