期刊名称:International Journal of Security and Its Applications
印刷版ISSN:1738-9976
出版年度:2016
卷号:10
期号:10
页码:89-106
出版社:SERSC
摘要:Ownership of a smartphone has never been easier nowadays, and it is supported by the fact that most of the people around us have a smartphone or an equivalent smart device. What is smartphone and why is it a smart? A smartphone by definition is as the name suggests, it is a phone is smart enough to not only be limited to the features and capabilities of a traditional cellular phone but also perform what a “smart” device can. And in recent years, the device that is deemed as the most intelligent device is the computer as it is the most advance piece of technology that is commercially available to the general public. Why this is so, is because in our opinion it has revolutionized how most if not all of the societies of today work. Hence what makes a smartphone is the mobile operating system that it is built upon, which is similar to a computer. It is becoming more and more of a common sight nowadays and this is because they are being offered at a price where more people are able to afford, hence they are reaching the hands of ceiling of the lower income families, all the way up to the higher income families. Back then, pure play devices were mostly simple in terms of how it function and works, hence if possible, we could suggest that the security aspect was never or rather has never been an issue other than the alteration of data after operation such as the tape of video recorders or images captured but never in the process, in the sense that there were no interruptions during operation, most likely is because it was clear and visible, but nowadays when you combine all of those devices into a complex entity, we tend to leave a hole in the cloth somewhere that we did not or rather can’t see due to the overwhelming amount of other things that we have. In this paper we discuss the current state of the commercially available operating systems of the two biggest names in smart devices, namely iOS and Android; and measure how secure and/or vulnerable (susceptible) are they to malwares and the nature of the mobile ad hoc network. We first analyze the integrity of the core of a smart device, the operating system and then use it to evaluate the effectiveness of their techniques and defenses of preventing and identifying malwares.
关键词:Social Media; Data Extraction; Semantic Analysis