Security on Mobile Devices: A Study about the Adoption of Best Practices for Smartphone Protection
Abstract
In recent years, it is remarkable the increase of cybersecurity attacks on mobile devices in Brazil, where was estimated more than 850 thousand attempts aiming at improper access to users' personal data. This paper presents a study about the adoption of security features, tools and best practices at smartphones. After conducting a case study with 222 participants that evaluated technological and psychological aspects of users about their cellphones safety, the results suggest that a considerable portion of the population has little knowledge about the use of resources and practices for efficient protection in mobile devices, making them cybercrime targets.
Keywords:
Information Security, Mobile Devices, Cyber Crimes, Data Protection
References
Amaral, G., Silva, R., Rotondo, G. and Amaral, E. (2017) “Um estudo sobre vulnerabilidades do Android: Ferramentas soluções para usuário”, SULCOMP.
Atkinson, J. S., Mitchell, J., Rio, M. and Matich, G. (2016) “Your Wi-Fi leaking: What do you mobile apps gossip about you?”, In Future Generation Computer Systems.
Bitton, R., Finkelshtein, A., Sidi, L., Puzis, R., Rokach, L. and Shabtai, A. (2017) “Taxonomy of mobile user´s security awareness”, In Computers & Security, v.73.
Cardoso, N. M. A. (2020) “Pandemia do Cibercrime.” In Revista Eletrônica Direito & TI, v.1 n. 12.
Cavalcanti, K. R. P. (2016) “Uma solução integrada para a melhoria da segurança de dispositivos móveis baseada na plataforma Android”.
CERT.br. (2020) “Cartilha de Segurança para Internet.” https://cartilha.cert.br/, December/2020.
Goel, D. and Jain, A. K. (2017) “Mobile phishing attacks and defense mechanisms: State of art and open research challenges”, In Computers & Security, v.73.
Harbach, M., de Luca, A. and Egelman, S. (2016) “The anatomy of smartphone unlocking”, In: Human-Computer Interaction, San Jose, CA, USA.
Khan, M. H. and Shah, M. A. (2016) “Survey on security threats of smartphones in internet of things”, In: 22nd International Conference on Automation and Computing, p. 560-566.
Park, M-W, Choi, Y-H, Eom, J- H and Chung, T-M. (2014) “Dangerous Wi-Fi access point: attacks to benign smartphone applications”, In Pers Ubiquit Comput.
Pennekamp, J., Henze, M. and Wehrle, K. (2017) “A survey on the evolution of privacy enforcement on smartphones and the road ahead”, In Pervasive and Mobile Computing, v. 42.
Pieterse, H., Oliver, M. and Heerden, R. V. (2018) “Smartphone data evaluation model: Identifying authentic smartphone data”, In Digital Investigation, v.24.
Rodrigues, R. (2020) “Ataques a dispositivos móveis cresceram 124% em março, https://www.kaspersky.com.br/blog/phishing-covid-smartphone-pesquisa/14663/, May/2021.
Roshandel, R., Arabshahi, P. and Poovendran, R. (2013) “LIDAR: A Layered Intrusion Detection and Remediation Framework for smartphones”, In Proceedings 4th ACM Sigsoft symposium on Architecting critical systems, p. 27-32.
Stallings, W., Bressan, G. and Barbosa, A. (2015) “Criptografia e segurança de redes”, Pearson Education do Brasil.
Valente, J. (2021) “Número de acessos móveis no Brasil cresce e fecha 2020 com 234 milhões”, https://agenciabrasil.ebc.com.br/geral/noticia/2021-04/numero-de-acessos-moveis-no-brasil-cresce-e-fecha-2020-com-234-milhoes, May/2021.
Wazlawick, R. S. (2014) “Metodologia de pesquisa para ciência da computação”, Elsevier.
Atkinson, J. S., Mitchell, J., Rio, M. and Matich, G. (2016) “Your Wi-Fi leaking: What do you mobile apps gossip about you?”, In Future Generation Computer Systems.
Bitton, R., Finkelshtein, A., Sidi, L., Puzis, R., Rokach, L. and Shabtai, A. (2017) “Taxonomy of mobile user´s security awareness”, In Computers & Security, v.73.
Cardoso, N. M. A. (2020) “Pandemia do Cibercrime.” In Revista Eletrônica Direito & TI, v.1 n. 12.
Cavalcanti, K. R. P. (2016) “Uma solução integrada para a melhoria da segurança de dispositivos móveis baseada na plataforma Android”.
CERT.br. (2020) “Cartilha de Segurança para Internet.” https://cartilha.cert.br/, December/2020.
Goel, D. and Jain, A. K. (2017) “Mobile phishing attacks and defense mechanisms: State of art and open research challenges”, In Computers & Security, v.73.
Harbach, M., de Luca, A. and Egelman, S. (2016) “The anatomy of smartphone unlocking”, In: Human-Computer Interaction, San Jose, CA, USA.
Khan, M. H. and Shah, M. A. (2016) “Survey on security threats of smartphones in internet of things”, In: 22nd International Conference on Automation and Computing, p. 560-566.
Park, M-W, Choi, Y-H, Eom, J- H and Chung, T-M. (2014) “Dangerous Wi-Fi access point: attacks to benign smartphone applications”, In Pers Ubiquit Comput.
Pennekamp, J., Henze, M. and Wehrle, K. (2017) “A survey on the evolution of privacy enforcement on smartphones and the road ahead”, In Pervasive and Mobile Computing, v. 42.
Pieterse, H., Oliver, M. and Heerden, R. V. (2018) “Smartphone data evaluation model: Identifying authentic smartphone data”, In Digital Investigation, v.24.
Rodrigues, R. (2020) “Ataques a dispositivos móveis cresceram 124% em março, https://www.kaspersky.com.br/blog/phishing-covid-smartphone-pesquisa/14663/, May/2021.
Roshandel, R., Arabshahi, P. and Poovendran, R. (2013) “LIDAR: A Layered Intrusion Detection and Remediation Framework for smartphones”, In Proceedings 4th ACM Sigsoft symposium on Architecting critical systems, p. 27-32.
Stallings, W., Bressan, G. and Barbosa, A. (2015) “Criptografia e segurança de redes”, Pearson Education do Brasil.
Valente, J. (2021) “Número de acessos móveis no Brasil cresce e fecha 2020 com 234 milhões”, https://agenciabrasil.ebc.com.br/geral/noticia/2021-04/numero-de-acessos-moveis-no-brasil-cresce-e-fecha-2020-com-234-milhoes, May/2021.
Wazlawick, R. S. (2014) “Metodologia de pesquisa para ciência da computação”, Elsevier.
Published
2021-07-18
How to Cite
CABRAL, Juliana Pereira; PONTES, Herleson Paiva.
Security on Mobile Devices: A Study about the Adoption of Best Practices for Smartphone Protection. In: INTEGRATED SOFTWARE AND HARDWARE SEMINAR (SEMISH), 48. , 2021, Evento Online.
Anais [...].
Porto Alegre: Sociedade Brasileira de Computação,
2021
.
p. 58-68.
ISSN 2595-6205.
DOI: https://doi.org/10.5753/semish.2021.15807.
