Exploration of attack vectors facilitated by mobile devices
Jun Zheng,
Casey Mortensen and
Yang Wang
International Journal of Business Continuity and Risk Management, 2013, vol. 4, issue 4, 371-386
Abstract:
Mobile devices like smartphones and tablets have become an important part of most people's everyday life. As the number of mobile applications (apps) has grown rapidly, there are various apps written with malicious intent raging from passive data gathering to active interference with other people's connection to steal credentials, etc. All these apps could allow attackers to use mobile devices as attacking tools for hacking purpose and cyber criminality. In this paper, we present a broad exploration of possible attack vectors that could be launched through mobile devices. We also offer some advice for countering these attacks.
Keywords: mobile devices; attack vectors; countermeasures; information security; smartphones; tablets; mobile apps; malicious intent; hacking; cyber crime. (search for similar items in EconPapers)
Date: 2013
References: Add references at CitEc
Citations:
Downloads: (external link)
http://www.inderscience.com/link.php?id=58985 (text/html)
Access to full text is restricted to subscribers.
Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.
Export reference: BibTeX
RIS (EndNote, ProCite, RefMan)
HTML/Text
Persistent link: https://EconPapers.repec.org/RePEc:ids:ijbcrm:v:4:y:2013:i:4:p:371-386
Access Statistics for this article
More articles in International Journal of Business Continuity and Risk Management from Inderscience Enterprises Ltd
Bibliographic data for series maintained by Sarah Parker ().