International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 113 | Views: 356

Survey Paper | Information Technology | Malaysia | Volume 4 Issue 1, January 2015 | Popularity: 6.6 / 10


     

Survey on Mobile and Wireless Security Awareness: User Perspectives

Nadhirah binti Nazri, Noor Azian binti Mohamad Ali, Jamaludin Ibrahim


Abstract: The use of wireless and mobile devices especially smartphones has become the norm nowadays. The emerging and advancement of wireless and mobile devices has brought the issue of security breaches and attacks back into focus. Many users are not aware of the security issues related to wireless and mobile devices. This has resulted in devices becoming attractive targets for malicious attack. In this paper, we discuss and analyze the factors of attack on mobile and wireless platforms and give in-depth overview of the attack mechanism. It is hoped that users will become aware and alert about the security issues and subsequently take the necessary action and precaution to protect themselves.


Keywords: Mobile devices, wireless technologies, behavior, awareness, attacks, threats


Edition: Volume 4 Issue 1, January 2015


Pages: 1287 - 1292



Make Sure to Disable the Pop-Up Blocker of Web Browser




Text copied to Clipboard!
Nadhirah binti Nazri, Noor Azian binti Mohamad Ali, Jamaludin Ibrahim, "Survey on Mobile and Wireless Security Awareness: User Perspectives", International Journal of Science and Research (IJSR), Volume 4 Issue 1, January 2015, pp. 1287-1292, https://www.ijsr.net/getabstract.php?paperid=SUB15466, DOI: https://www.doi.org/10.21275/SUB15466



Similar Articles

Downloads: 0

Informative Article, Information Technology, India, Volume 11 Issue 3, March 2022

Pages: 1597 - 1600

Real - Time Monitoring and Alerting Systems for Fintech

Ankur Mahida

Share this Article

Downloads: 0

Research Paper, Information Technology, India, Volume 11 Issue 3, March 2022

Pages: 1650 - 1657

Zero Trust in Healthcare: Building a Secure Future with DevOps

Vishnu Vardhan Reddy Boda

Share this Article

Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Student Project, Information Technology, India, Volume 11 Issue 10, October 2022

Pages: 959 - 963

Medical Data Security using RSA and Visual Cryptography

Bency Wilson, Jesline Abraham

Share this Article

Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Information Technology, India, Volume 9 Issue 4, April 2020

Pages: 1850 - 1857

Securing Remote Work Environments in Telecom: Implementing Robust Cybersecurity Strategies to Secure Remote Workforce Environments in Telecom, Focusing on Data Protection and Secure Access Mechanisms

Jeevan Manda

Share this Article

Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Information Technology, India, Volume 11 Issue 12, December 2022

Pages: 1382 - 1391

Enhancing Business Continuity through Robust Disaster Recovery Planning: Implementing and Refining BCP / DRP to Ensure Operational Resilience

Wasif Khan

Share this Article



Top