Security Threats in Mobile Phones: Challenges, Countermeasures, and the Importance of User Awareness
Keywords:
Security of Mobile Application, Cyber-Threats, Countermeasures, User Awareness.Abstract
Mobile phones have become essential tools in everyday life, making them attractive targets for a wide range of security threats. This research aims to review and analyze existing scientific literature related to threats affecting mobile phones in order to identify the most common current threats and the countermeasures used to mitigate them. Through a systematic analysis of relevant studies, the findings reveal that user awareness plays a critical role in confronting mobile phone security threats. Many effective countermeasures depend largely on user behavior, including regularly updating the operating system, downloading applications only from trusted sources, and avoiding interaction with fraudulent links, messages, or calls. The study highlights that mobile phone threats remain a significant and growing security concern, requiring continuous research and improved protective strategies to safeguard both devices and user information. Enhancing user awareness is identified as a key factor in reducing risks and improving overall mobile security.
References
[1] Yesilyurt, M., & Yalman, Y. (2016). Security threats on mobile devices and their effects: estimations for the future. International Journal of Security and Its Applications, 10(2), 13-26.
[2] Bissyandé, T. F., & Sié, O. (2020, February). Analysis of the Impact of Permissions on the Vulnerability of Mobile Applications. In e-Infrastructure and e-Services for Developing Countries: 11th EAI International Conference, AFRICOMM 2019, Porto-Novo, Benin, December 3–4, 2019, Proceedings (Vol. 311, p. 3). Springer Nature.
[3] Zaidi, S. F. A., Shah, M. A., Kamran, M., Javaid, Q., & Zhang, S. (2016). A survey on security for smartphone device. International journal of advanced computer science and applications, 7(4), 206-219.
[4] Hamed, Y. S. I., AbdulKader, S. N. A., & Mostafa, M. S. M. (2019). Mobile malware detection: A survey. International Journal of Computer Science and Information Security (IJCSIS), 17(1).
[5] Mitrea, T., & Borda, M. (2020, June). Mobile security threats: a survey on protection and mitigation strategies. In International Conference Knowledge-Based Organization (Vol. 26, No. 3, pp. 131-135).
[6] Adăscăliţei, I. (2019). Smartphones and IoT Security. Informatica Economica, 23(2).
[7] Wiryawan, D., Suhartono, J., Fernando, Y., So, I. G., & Gui, A. (2019). Malware Mobile Devices in Indonesia. KnE Social Sciences, 259-267.
[8] Ahmad, A., Malik, A. W., Alreshidi, A., Khan, W., & Sajjad, M. (2019). Adaptive security for self-protection of mobile computing devices. Mobile Networks and Applications, 1-20.
[9] Riad, A. B. M., Islam, M. S., Shahriar, H., Zhang, C., Valero, M., Sneha, S., & Ahamed, S. (2021). Plugin-Based Tool for Teaching Secure Mobile Application Development. Information Systems Education Journal, 19(2), 25-34.
[10] Kunda, D., & Chishimba, M. (2018). A survey of android mobile phone authentication schemes. Mobile Networks and Applications, 1-9.
[11] Albakri, A., Fatima, H., Mohammed, M., Ahmed, A., Ali, A., Ali, A., & Elzein, N. M. (2022). Survey on Reverse-Engineering Tools for Android Mobile Devices. Mathematical Problems in Engineering, 2022.
[12] Alsaleh, M., Alomar, N., & Alarifi, A. (2017). Smartphone users: Understanding how security mechanisms are perceived and new persuasive methods. PloS one, 12(3), e0173284.
[13] Kadëna, E. (2017). Smartphone Security Threats. Manag. Enterp. Benchmarking 21st century, 141- 160.
[14] Bubukayr, M. A. S., & Almaiah, M. A. (2021, July). Cybersecurity concerns in smart-phones and applications: A survey. In 2021 International Conference on Information Technology (ICIT) (pp. 725-731). IEEE.
[15] ZAMFIROIU, A., POCATILU, P., & CAPISIZU, S. (2019, May). Mobile data vulnerabilities. In Proceedings of the IE 2019 International Conference (pp. 407-412).
[16] Alhashim, S. S., & Rahman, M. H. (2021, July). Cybersecurity Threats in Line with Awareness in Saudi Arabia. In 2021 International Conference on Information Technology (ICIT) (pp. 314-319). IEEE.
[17] Duisebekova, K. S., Sarsenova, Z. N., Pyagay, V. T., Tuyakova, Z. N., Duzbayev, N. T., Aitmagambetov, A. Z., & Amanzholova, S. T. (2019, June). Environmental monitoring system for analysis of climatic and ecological changes using LoRa technology. In Proceedings of the 5th International Conference on Engineering and MIS (pp. 1-6).
[18] Nikkhah, H. R., Balapour, A., & Sabherwal, R. (2018). Mobile applications security: Role of privacy.
[19] Al Jutail, M., Al-Akhras, M., & Albesher, A. (2019). Associated Risks in Mobile Applications Permissions. Journal of Information Security, 10(02), 69.
[20] Koala, G., Bassolé, D., Bissyandé, T. F., & Sié, O. (2019, December). Analysis of the Impact of Permissions on the Vulnerability of Mobile Applications. In International Conference on e-Infrastructure and e-Services for Developing Countries (pp. 3-14). Springer, Cham.
[21] Zaidi, S. F. A., Shah, M. A., Kamran, M., Javaid, Q., & Zhang, S. (2016). A survey on security for smartphone device. International journal of advanced computer science and applications, 7(4), 206-219.
[22] Zeybek, M., Yılmaz, E. N., & Doğru, İ. A. (2019, November). A study on security awareness in mobile devices. In 2019 1st International Informatics and Software Engineering Conference (UBMYK) (pp. 1-6). IEEE.
[23] Abdurachman, E., Gaol, F. L., & Soewito, B. (2019). Survey on threats and risks in the cloud computing environment. Procedia Computer Science, 161, 1325-1332.
[24] Mamun, T. I., & Alam, L. (2016). Android Security Vulnerabilities Due to User Unawareness and Frameworks for Overcoming Those Vulnerabilities. International Journal of Computer Applications, 975, 8887.
[25] Bassolé, D., Koala, G., Traoré, Y., & Sié, O. (2020, March). Vulnerability analysis in mobile banking and payment applications on android in African Countries. In International Conference on Innovations and Interdisciplinary Solutions for Underserved Areas (pp. 164-175). Springer, Cham.
[26] Butler, M., & Butler, R. (2021, January). The Influence of Mobile Operating Systems on User Security Behavior. In 2021 IEEE 5th International Conference on Cryptography, Security and Privacy (CSP) (pp. 134-138). IEEE.