{"title":"移动设备的安全问题:调查","authors":"Gary Helm, M. Chowdhury","doi":"10.1109/EIT51626.2021.9491840","DOIUrl":null,"url":null,"abstract":"Mobile devices are being used more frequently and for more activities in daily life. Cell phones, for example are no longer being used only for communication. They have also become primary tools for business and financial use. Mobile devices are now a major target for attack and many users are unaware that they are even vulnerable. With these devices being used for more tasks involving sensitive information, it is important for users to be aware of these vulnerabilities. This paper aims to identify common attacks on these devices and describe methods to combat them. Bluetooth attacks will have a more in-depth examination covering various attacks on Bluetooth devices and the solutions, if any, to stop them.","PeriodicalId":162816,"journal":{"name":"2021 IEEE International Conference on Electro Information Technology (EIT)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Security Issues of Mobile Devices: A Survey\",\"authors\":\"Gary Helm, M. Chowdhury\",\"doi\":\"10.1109/EIT51626.2021.9491840\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Mobile devices are being used more frequently and for more activities in daily life. Cell phones, for example are no longer being used only for communication. They have also become primary tools for business and financial use. Mobile devices are now a major target for attack and many users are unaware that they are even vulnerable. With these devices being used for more tasks involving sensitive information, it is important for users to be aware of these vulnerabilities. This paper aims to identify common attacks on these devices and describe methods to combat them. Bluetooth attacks will have a more in-depth examination covering various attacks on Bluetooth devices and the solutions, if any, to stop them.\",\"PeriodicalId\":162816,\"journal\":{\"name\":\"2021 IEEE International Conference on Electro Information Technology (EIT)\",\"volume\":\"34 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-05-14\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2021 IEEE International Conference on Electro Information Technology (EIT)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/EIT51626.2021.9491840\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 IEEE International Conference on Electro Information Technology (EIT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/EIT51626.2021.9491840","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Mobile devices are being used more frequently and for more activities in daily life. Cell phones, for example are no longer being used only for communication. They have also become primary tools for business and financial use. Mobile devices are now a major target for attack and many users are unaware that they are even vulnerable. With these devices being used for more tasks involving sensitive information, it is important for users to be aware of these vulnerabilities. This paper aims to identify common attacks on these devices and describe methods to combat them. Bluetooth attacks will have a more in-depth examination covering various attacks on Bluetooth devices and the solutions, if any, to stop them.