Jakov - Repository of the University of Criminal Investigation and Police Studies
University of Criminal Investigation and Police Studies
    • English
    • Српски
    • Српски (Serbia)
  • English 
    • English
    • Serbian (Cyrillic)
    • Serbian (Latin)
  • Login
View Item 
  •   Jakov
  • Jakov
  • Radovi istraživača / Researchers' publications
  • View Item
  •   Jakov
  • Jakov
  • Radovi istraživača / Researchers' publications
  • View Item
JavaScript is disabled for your browser. Some features of this site may not work without it.

Overview of Some Security Aspectsof Smart Phones

Thumbnail
2018
bitstream_2235.pdf (245.2Kb)
Authors
Čisar, Petar
Rudas, Imre
Conference object (Published version)
Metadata
Show full item record
Abstract
Smart phones or mobile phones with advanced capabilities are used by more people. Their popularity and relatively weaker security level have made them attractive targets for attackers. Mobile phone security in the beginning has not kept pace with traditional computer security. Security methods, such as firewalls, antivirus software and encryption, were insufficiently represented on mobile phones, and mobile operating systems were not updated as frequently as those on personal computers. However, mobile security nowadays is a rapidly growing field in the security area. With the increase in the number of mobile devices and their applications, the need for mobile security has increased extremely over the past several years. This paper gives an overview of some of the security aspects that must be considered when choosing a particular model of a smart phone with a satisfactory level of security: biometrics, encryption, hardware-assisted security, sandboxed user data, VPN possibility etc. A... special accent in the paper is placed on newer types of processors as one of the most important components of the mobile device and their security possibilities. A comparative analysis of the key technical characteristics of the most commonly used newer processors is also given. In addition, the paper also focuses on the use of mobile security software and Android browsers, pointing out its numerous useful features.

Keywords:
smart phones / security / processor / metrics / mobile security software / Android browser
Source:
Thematic conference proceedings of international significance. Vol. 2 / International Scientific Conference "Archibald Reiss Days", Belgrade, 2-3 October 2018, 2018, 383-393
Publisher:
  • Belgrade : Academy of Criminalistic and Police Studies

ISBN: 978-86-7020-405-8

[ Google Scholar ]
URI
http://jakov.kpu.edu.rs/handle/123456789/935
Collections
  • Radovi istraživača / Researchers' publications
Institution/Community
Jakov
TY  - CONF
AU  - Čisar, Petar
AU  - Rudas, Imre
PY  - 2018
UR  - http://jakov.kpu.edu.rs/handle/123456789/935
AB  - Smart phones or mobile phones with advanced capabilities are used by more people. Their popularity and relatively weaker security level have made them attractive targets for attackers. Mobile phone security in the beginning has not kept pace with traditional computer security. Security methods, such as firewalls, antivirus software and encryption, were insufficiently represented on mobile phones, and mobile operating systems were not updated as frequently as those on personal computers. However, mobile security nowadays is a rapidly growing field in the security area. With the increase in the number of mobile devices and their applications, the need for mobile security has increased extremely over the past several years. This paper gives an overview of some of the security aspects that must be considered when choosing a particular model of a smart phone with a satisfactory level of security: biometrics, encryption, hardware-assisted security, sandboxed user data, VPN possibility etc. A special accent in the paper is placed on newer types of processors as one of the most important components of the mobile device and their security possibilities. A comparative analysis of the key technical characteristics of the most commonly used newer processors is also given. In addition, the paper also focuses on the use of mobile security software and Android browsers, pointing out its numerous useful features.
PB  - Belgrade : Academy of Criminalistic and Police Studies
C3  - Thematic conference proceedings of international significance. Vol. 2 / International Scientific Conference "Archibald Reiss Days", Belgrade, 2-3 October 2018
T1  - Overview of Some Security Aspectsof Smart Phones
SP  - 383
EP  - 393
ER  - 
@conference{
author = "Čisar, Petar and Rudas, Imre",
year = "2018",
abstract = "Smart phones or mobile phones with advanced capabilities are used by more people. Their popularity and relatively weaker security level have made them attractive targets for attackers. Mobile phone security in the beginning has not kept pace with traditional computer security. Security methods, such as firewalls, antivirus software and encryption, were insufficiently represented on mobile phones, and mobile operating systems were not updated as frequently as those on personal computers. However, mobile security nowadays is a rapidly growing field in the security area. With the increase in the number of mobile devices and their applications, the need for mobile security has increased extremely over the past several years. This paper gives an overview of some of the security aspects that must be considered when choosing a particular model of a smart phone with a satisfactory level of security: biometrics, encryption, hardware-assisted security, sandboxed user data, VPN possibility etc. A special accent in the paper is placed on newer types of processors as one of the most important components of the mobile device and their security possibilities. A comparative analysis of the key technical characteristics of the most commonly used newer processors is also given. In addition, the paper also focuses on the use of mobile security software and Android browsers, pointing out its numerous useful features.",
publisher = "Belgrade : Academy of Criminalistic and Police Studies",
journal = "Thematic conference proceedings of international significance. Vol. 2 / International Scientific Conference "Archibald Reiss Days", Belgrade, 2-3 October 2018",
title = "Overview of Some Security Aspectsof Smart Phones",
pages = "383-393"
}
Čisar, P.,& Rudas, I.. (2018). Overview of Some Security Aspectsof Smart Phones. in Thematic conference proceedings of international significance. Vol. 2 / International Scientific Conference "Archibald Reiss Days", Belgrade, 2-3 October 2018
Belgrade : Academy of Criminalistic and Police Studies., 383-393.
Čisar P, Rudas I. Overview of Some Security Aspectsof Smart Phones. in Thematic conference proceedings of international significance. Vol. 2 / International Scientific Conference "Archibald Reiss Days", Belgrade, 2-3 October 2018. 2018;:383-393..
Čisar, Petar, Rudas, Imre, "Overview of Some Security Aspectsof Smart Phones" in Thematic conference proceedings of international significance. Vol. 2 / International Scientific Conference "Archibald Reiss Days", Belgrade, 2-3 October 2018 (2018):383-393.

DSpace software copyright © 2002-2015  DuraSpace
About Jakov | Send Feedback

OpenAIRERCUB
 

 

All of DSpaceInstitutions/communitiesAuthorsTitlesSubjectsThis institutionAuthorsTitlesSubjects

Statistics

View Usage Statistics

DSpace software copyright © 2002-2015  DuraSpace
About Jakov | Send Feedback

OpenAIRERCUB