Smartphones and IoT Security

Ioan Adăscăliţei
{"title":"Smartphones and IoT Security","authors":"Ioan Adăscăliţei","doi":"10.12948/issn14531305/23.2.2019.06","DOIUrl":null,"url":null,"abstract":"Mobile devices (smartphones or IoT devices) threats are all over and come in many ways. Nowadays the number of mobile devices is extremely high and we use them to cover many personal needs like ordering food, buying plane tickets, controlling our home from distance (using IoT devices) and so on. But all of this comes with a cost and that cost is that we have to give personal data to some devices which lead to threats. This paper contains a classification for the threats and vulnerabilities for smartphones and tablets and a short one for IoT devices. Here are described some attack scenarios for IoT and a few representative attacks. As method of research was used a qualitative one by documenting from articles related to this theme, reports realized by companies which operates in this field and other resources.","PeriodicalId":53248,"journal":{"name":"Informatica economica","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2019-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Informatica economica","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.12948/issn14531305/23.2.2019.06","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

Abstract

Mobile devices (smartphones or IoT devices) threats are all over and come in many ways. Nowadays the number of mobile devices is extremely high and we use them to cover many personal needs like ordering food, buying plane tickets, controlling our home from distance (using IoT devices) and so on. But all of this comes with a cost and that cost is that we have to give personal data to some devices which lead to threats. This paper contains a classification for the threats and vulnerabilities for smartphones and tablets and a short one for IoT devices. Here are described some attack scenarios for IoT and a few representative attacks. As method of research was used a qualitative one by documenting from articles related to this theme, reports realized by companies which operates in this field and other resources.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
智能手机和物联网安全
移动设备(智能手机或物联网设备)的威胁无处不在,并且以多种方式出现。如今,移动设备的数量非常多,我们用它们来满足许多个人需求,比如订餐、购买机票、远程控制我们的家(使用物联网设备)等等。但所有这些都是有代价的,这个代价就是我们必须把个人数据提供给一些会导致威胁的设备。本文包含智能手机和平板电脑的威胁和漏洞分类,以及物联网设备的简短分类。以下是物联网的一些攻击场景和一些具有代表性的攻击。由于研究方法是定性的,通过记录与该主题相关的文章,在该领域运营的公司实现的报告和其他资源。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
17
审稿时长
8 weeks
期刊最新文献
A SWOT Analysis of the Role of Artificial Intelligence in Project Management Optimizing Performance of Distributed Web Systems The Chatbots and Their Role in the Progress of Society Cloud Incident Response - a Comprehensive Analysis Internet of Things and Circular Economy: A State-of-the-Art Review
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1