Mobile Security Threats: A Survey on Protection and Mitigation Strategies

  • Mitrea T
  • Borda M
N/ACitations
Citations of this article
36Readers
Mendeley users who have this article in their library.

Abstract

The spectacular growth in the use of mobile devices is a natural consequence of the benefits they offer. However, most mobile users grant little importance to the security of information stored, processed and transmitted. Even more, the last two years can be considered years of reference for the mobile security industry - ranging from virulent mobile ransomware attacks to mobile IoT botnets and mobile security breaches through mobile malware, that have redefined security paradigms. It is clear that we are at a point of inflection and transition to another generation of cyber attacks and the tendency is that attacks on mobile devices will expand. The security of mobile devices is a topical issue and the main objective is to educate the user to know the risks to which he/she is exposed to and to offer him/her viable security solutions in order to protect himself/herself against mobile threats. In this article we are going to present some protection and mitigation strategies with recommendations for improvement.

Cite

CITATION STYLE

APA

Mitrea, T., & Borda, M. (2020). Mobile Security Threats: A Survey on Protection and Mitigation Strategies. International Conference KNOWLEDGE-BASED ORGANIZATION, 26(3), 131–135. https://doi.org/10.2478/kbo-2020-0127

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free