تجاوز إلى المحتوى الرئيسي
User Image

JALALUDDIN KHAN

Lecturer

Lecturer/ Researcher

علوم الحاسب والمعلومات
Building No. #31 Ground floor
المنشورات
مقال فى مجلة
2015

Survey on Mobile User's Data Privacy Threats and Defense Mechanisms

Khan, Jalaluddin . 2015

Mobile Security; Malware; Data Privacy; Threats and Vulnerabilities

Nowadays, mobile devices have become an integral part of our daily life. These have proven to be an advantageous scientific invention that fillspersonal and business needs in a very efficient manner. In this era, the availability of mobile services has significantly increasedbecause of the rich variety of mobile devices and essential applications provided by mobile device manufacturers. At the same time, numerous mobile security issues and data privacy threats are challenging both manufacturers and users. Therefore, mobile devices are an ideal target for various security issues and data privacy threats in a mobile ecosystem. In this paper, we provide a brief survey of the security challenges, threats, and vulnerabilities of amobile ecosystem. Furthermore, we discussed some key points required to ensure mobile security and defend against data privacy threats. The emphasis of the discussion is, strong protection and the restriction of malicious activity at theapplication developer end, application stores end, and operating system and mobile device manufactures end bypreventing the user from usingnon-recommended applications (which may be malicious) and consideringbiometric features for the authentication of real users in the mobile devices. Alsobriefly discussing the defense mechanismsthat are considered to bea relatively better approach for securing personal and business related data or information in the mobile devices.

نوع عمل المنشور
Research Activity
رقم المجلد
Volume 56, 2015,
مجلة/صحيفة
Procedia Computer Science
الصفحات
376–383
مزيد من المنشورات
publications

Here, in this proposed scheme the significant advantage is that the decoding operation is all-optical in nature. The architecture can be used for generalized decoding scheme.

بواسطة Jalaluddin Khan, Abu Sarwar Zamani, Mobin Akhtar
2012
تم النشر فى:
LAP Lambert Academic Publishing
publications

Nowadays, mobile devices have become an integral part of our daily life. These have proven to be an advantageous scientific invention that fillspersonal and business needs in a very efficient…

بواسطة Jalaluddin Khan, Haider Abbas, Jalal Al-Muhtadi
2015
publications
In the present scenario of competitive production, Computer Aided Engineering (CAE) techniques have been applied with great success in metal forming research especially in the…
بواسطة Jalaluddin Khan, Nassir S. Al-Arifi, Abu S. Zamani
2011