Survey On Mobile User’s Data Privacy Threats And Defence Mechanism



EOI: 10.11242/viva-tech.01.05.MCA_10

Download Full Text here



Citation

Prof.Nitesh Kumar, Pritesh Kotian,Aditya Malekar, "Survey On Mobile User’s Data Privacy Threats And Defence Mechanism", VIVA-IJRI Volume 1, Issue 6, Article MCA_10, pp. 1-7, 2023. Published by Computer Engineering Department, VIVA Institute of Technology, Virar, India.

Abstract

The brilliant increase in the use of mobile devices is a herbal consequence of the benefits they provide. but, most cellular customers grant little importance to the safety of information stored, processed, and transmitted. Even extra, the ultimate two years may be considered years of reference for the cell protection industry - ranging from virulent cell ransomware assaults to cellular IoT botnets and cellular safety breaches thru cellular malware, that have redefined protection paradigms. it is clear that we are at a point of inflection and transition to every other technology of cyber-attacks and the tendency is that attacks on cellular gadgets will expand. the security of cellular devices is a topical problem and the major goal is to educate the person to recognize the dangers to which he/she is uncovered and to provide him/her possible protection answers to guard himself/herself against cellular threats. In this article, we are going to present some safety and mitigation techniques with guidelines for development.

Keywords

Cyber Security, Mobile, Protection, Security, Threats.

References

  1. “Mobile Security,” Major Mobile Security Threats That Cause Data Breaches, Sep. 21, 2018. https://www.42gears.com/blog/major-mobile-threats-that-cause-data-breaches/ (accessed Jan. 22, 2023).
  2. “Data Breaches,” Follow the Data: Dissecting Data Breaches and Debunking the Myths, Sep. 22, 2015. https://www.trendmicro.com/vinfo/us/security/news/cyber-attacks/follow-the-data (accessed Jan. 22, 2023).
  3. “THE SPECTRUM OF MOBILE RISK,” lookout mobile risk. https://www.lookout.com/form/mobile-security-the-spectrum-of-mobile-risk (accessed Jan. 22, 2023).
  4. “the mobile threat,” 2022 mobile threat landscape update, May 31, 2022. https://www.threatfabric.com/blogs/h1-2022-mobile-threat-landscape.html (accessed Jan. 22, 2023).
  5. “Smartphone Subscriptions worldwide,” Number of smartphone subscriptions worldwide from 2016 to 2021, with forecasts from 2022 to 2027, Jan. 18, 2023. https://www.statista.com/statistics/330695/number-of-smartphone-users-worldwide/ (accessed Jan. 22, 2023).
  6. “MITM attacks,” Billions of Bluetooth devices vulnerable to takeovers, MITM attacks; no user action required, Sep. 12, 2017. https://www.scmagazine.com/news/architecture/billions-of-bluetooth-devices-vulnerable-to-takeovers-mitm-attacks-no-user-action-required (accessed Jan. 22, 2023).
  7. “improve the security of mobile,” improve the security of mobile, May 10, 2022. https://www.peerbits.com/blog/security-of-mobile-banking-apps.html (accessed Jan. 22, 2023).
  8. “What is Mobile Device Security,” What is Mobile Device Security? https://www.vmware.com/topics/glossary/content/mobile-device-security.html#:~:text=Mobile%20device%20encryption%3A,be%20accessed%20by%20authorized%20users. (accessed Jan. 22, 2023).
  9. “THE GROWING THREAT OF MOBILE DEVICE SECURITY BREACHES,” THE GROWING THREAT OF MOBILE DEVICE SECURITY BREACHES, Apr. 2017. https://blog.checkpoint.com/wp-content/uploads/2017/04/Dimensional_Enterprise-Mobile-Security-Survey.pdf (accessed Jan. 22, 2023).
  10. “Weak server Side controls,” OWASP mobile security risks. https://quixxisecurity.com/blog/top-10-owasp-mobile-security-risks-and-best-solution-on-how-to-minimize-them/ (accessed Jan. 22, 2023).
  11. “Mobile Security: Threats and Best Practices,” Mobile Information System, Dec. 07, 2020. https://www.hindawi.com/journals/misy/2020/8828078/ (accessed Jan. 22, 2023).
  12. “Mobile Security Threats: A Survey on Protection and Mitigation Strategies,” Sciendo.com, Jul. 20, 2020. https://sciendo.com/article/10.2478/kbo-2020-0127?tab=pdf-preview (accessed Jan. 22, 2023).
  13. “Today’s Mobile Security Threats: What Are They and How Can You Prevent Them?,” oakta.com, Oct. 22, 2020. https://www.okta.com/blog/2020/10/mobile-security-threats-and-prevention/ (accessed Jan. 22, 2023).
  14. “Data Protection,” Cloudian. https://cloudian.com/guides/data-protection/data-protection-and-privacy-7-ways-to-protect-user-data/ (accessed Feb. 23, 2023).
  15. “Device threats And vulnerabilities,” semantic scholar. https://www.semanticscholar.org/paper/Mobile-Device-Security%3A-A-Survey-on-Mobile-Device-Sujithra-Padmavathi/982dfcb8993a2b33d37c1e5b34a0c4f90f7b22dd (accessed Feb. 23, 2023).
  16. “Mobile Security Threats,” Okta. https://www.okta.com/blog/2020/10/mobile-security-threats-and-prevention/#:~:text=Mobile%20security%20threats%20are%20attacks,that%20an%20attack%20has%20occurred. (accessed Feb. 23, 2023).
  17. “Mobile Data Security,” ASDA Mobile. https://mobile.asda.com/scoop/mobile-data-security#:~:text=Mobile%20data%20tends%20to%20be,than%20private%20Wi%2DFi%20too. (accessed Feb. 23, 2023).
  18. “Mobile Threats Differences,” Gartner. https://www.gartner.com/reviews/market/mobile-threat-defense (accessed Feb. 23, 2023).
  19. “Device Security Risks And Corporation,” university of north dakota. https://onlinedegrees.und.edu/blog/mobile-device-security-risks-for-corporations/#:~:text=Sensitive%20data%20can%20be%20leaked,then%20access%20secure%20servers%20undetected. (accessed Feb. 23, 2023).
  20. “Preventing Mobile Malware Attacks,” devoteam. https://www.devoteam.com/expert-view/preventing-mobile-malware-attacks/ (accessed Feb. 23, 2023).