Wednesday, August 14, 2019
A Survey on Mobile User’s Data Privacy Threats
A Survey on Mobile Users Data Privacy Threats ABC EFG 1 , ABC EFG 2* and ABC EFG 3 à 4. Security Challenges for Mobile Devices Mobile device applications offer a level of convenience that the world has never think before it. Everywhere (home. Office, hotel, playground, road, parking, picture palace, travelling in different countries or each place of world) any mobile user can use applications to fulfil their daily needs like communicate, buy, search, payment, sell, entertainment, find general information of their use. This extreme level of comfort has brought with it an extreme number of security risks. Below describing some mobile device challenges, how the vulnerabilities and attackers reducing mobile applications freedom. 4.1 Insecure Data Storage It can result in data loss for a user, after losing mobile devices an application is improperly secured and all user at risk. Some common piece of data store at high risk like personal information (Name, Address, Date of Birth, Banking information, Family information , Family picture, Social networking address, email address) ,working information (company name, working position, related some application, company contact numbers and official documents if any available). 4.2Physical Security Physical security of any mobile devices is too difficult, but when mobile users are constantly using mobile devices, which is in always for 24x7x365 and user lose his mobile device then the task becomes seemingly impossible. Intentionally physical security is most concern for risk free mobile devices. If a person lost and misplaced or theft their mobile devices so it may be misuse userââ¬â¢s sensitive data, personnel information, email correspondence , any unsecured documents, address books, business data and files by the thief . 4.3 Mobile Browsing Mobile browsing is the best feature for any mobile devices for providing best use of internet application but mostly in mobile devices user cannot see the whole URL or web address, least verify whether the web a ddress or URL safe or not and user reach (browse) their way into a phishing related attack. 4.4 Multiple User Logging Due to progressive growth of social media Single sign-on (SSO) in the mobile application ecosystem it is estimated 60% of mobile application insecure by using same login to multiple social networking application. Hackers who got login credentials for website or apps twitter , Facebook can possibly gain access to userââ¬â¢s profile page. Outmost use of social media single sign-on (SSO) is actually to facilitate social interaction at same time the developer also gain access to some of social information related to sign in user. 4.5Client Side Injection The execution of malicious programs on the mobile devices over the internet medium by application or web browsing client side injection occurs. Html injection ,SQL injection or other newer attack(abusing phone dialer, SMS ) comes in the client side injection. Hackers could load text based attack and exploit targeted e xaminer. In this way any source of data can be injected including resource targeted files or application 4.6 Application Isolation Mobile application is just about everything from transaction, business ,personnel and social networking. Before installing any application in your mobile devices clearly see the permission agreement, privacy and how to access your device with that application. It might be any application theft user sensitive data ,financial data, business data ,personnel data and other valuable file.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.