Smartphones and IoT Security
نویسندگان
چکیده
منابع مشابه
Security Technology for Smartphones
Service functions are implemented on smartphones by storing on them personal information, network-operator information, corporate information, and so on. Most smartphones use an open source operating system (OS), and anyone can obtain the OS source code; consequently, smartphone users are exposed to the threat of receiving fraudulent information from people with malicious intent. Aimed at count...
متن کاملBiometrics and Security in Smartphones
In this paper we look at the significance of biometrics, specifically fingerprint readers which have been implemented into smartphones, primarily the iPhone 5S. The security of the technology is presented and analyzed while the security breaches and hacks are demonstrated in detail. We look at secure options in Android vs. iOS. And we also look at the future of biometrics and soon to be wearabl...
متن کاملIoT Security: A Survey
The Internet of Things (IoT) is still at the top of the Gartner Hype Cycle as the most hyped technology, which means that it is the hottest topic that has gained the most attraction of the researchers currently. In recent years, there have been huge amount of research that have investigated different aspects and concerns of this field. Meanwhile, supplying privacy and security is an inseparable...
متن کاملData Security and Privacy in the IoT
Deploying existing data security solutions to the Internet of Things (IoT) is not straightforward because of device heterogeneity, highly dynamic and possibly unprotected environments, and large scale. In this paper, after outlining key challenges in data security and privacy, we summarize research directions for securing IoT data, including efficient and scalable encryption protocols, software...
متن کاملEnforcing Security in IoT and Home Networks
Modern home and corporate networks are interconnecting many different devices types other than personal computers and printers. It is pretty common to have surveillance cameras or thermometers and control them through cloud-based services. Security-wise this practice can create potential threats when connected devices are not kept updated or if they can freely access the network. This paper des...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Informatica Economica
سال: 2019
ISSN: 1453-1305,1842-8088
DOI: 10.12948/issn14531305/23.2.2019.06