{"id":9822,"date":"2020-11-19T19:22:33","date_gmt":"2020-11-19T19:22:33","guid":{"rendered":"http:\/\/onlineclassesguru.com\/?p=9822"},"modified":"2020-11-19T19:22:33","modified_gmt":"2020-11-19T19:22:33","slug":"emerging-threats-paper-smartphones-risks-and-vulnerabilities","status":"publish","type":"post","link":"https:\/\/onlineclassesguru.com\/index.php\/2020\/11\/19\/emerging-threats-paper-smartphones-risks-and-vulnerabilities\/","title":{"rendered":"Emerging Threats Paper: Smartphones risks and vulnerabilities"},"content":{"rendered":"<style type=\"text\/css\"><\/style><p>Smartphones risks and vulnerabilities:<\/p>\n<p>As per Su, Wang, Liu, Choi &amp; Choi, (2018), the threats of the security in the smartphones have found to be constantly changing as per to the circumstances and also of the technological advancements that consist of the technical support like the specifications in the smartphone devices and also of the network infrastructures. Therefore from preventing the damage from the focus of the emerging threat have been given by the researchers to develop alternative solutions. It had been observed that our world is turning into the society which depends upon the smartphones. The users utilize the smartphones for their regular activities like for online banking services, purchasing things, for sending texts and also surfing the internet for gathering knowledge.<\/p>\n<p>Emerging security threats:<\/p>\n<p>With the rise in the uses of smartphones by the user\u2019s individuals used to carry out their personal services by logging through the ID password in any place from their smartphones. However, there found to rise in an emerging threat about security within the smartphones. The risks and vulnerabilities which the smartphone faces are of two types such as owner side and device side. In context to the owner side, the individual errors are the issues which occur by the individual mistakes. Basically, the users used to utilize the smartphones without getting aware of the intruders thereby the intruders get the chances for gathering the valuable information. On the other hand in regard to the device side, the smartphones possess the AMOLED or LED screen size of 4 or 5 inches. Hence the touchscreen uses to provide the input devices for communicating with the owner and the owner used to put details through the touchscreen for communicating with smartphones. Thus through this way, the vulnerabilities used to occur. The intruders used to attack smartphones through recording. This attack has been caused by observing the secret information of the users by non-direct and direct optical devices. In addition, most of the security issues occur for the smartphones by attacking the sensor of the devices by the intruders. The intruders also attack the smartphones by guessing with the embedded sensors. Simulating of the similar devices the hackers used to guess the accurate shape of the pattern lock for leaking out of the information.<\/p>\n<p>Effective counter measures:<\/p>\n<p>For ensuring the safety of the attacks on the smartphones the researchers have proposed various mechanisms as well as ideas. Hence the various countermeasures which the researchers have researched for securing the threats are by pattern password, graphical password, and keystroke dynamics. Through the conventional authentication of the password procedure that mainly based on the QWERTY structure of the keypad. So with the utilization of the graphical passwords, the users do not require in remembering the sequences and also of the text information. In order to cope with the attacks of the intruders the pattern authentication procedure have been utilized and it is also a graphic based hence it provides the benefits of the users about the graphical password. Apart from this the keystroke authentication could be used for safeguarding the data of the smartphones.<\/p>\n<p>References:<\/p>\n<p>Su, X., Wang, Z., Liu, X., Choi, C., &amp; Choi, D. (2018). Study to improve security for IoT smart device controller: drawbacks and countermeasures. Security and Communication Networks, 2018.<\/p>\n<p><center><a href=\"http:\/\/onlineclassesguru.com\/orders\/ordernow\"><img decoding=\"async\" src=\"https:\/\/encrypted-tbn0.gstatic.com\/images?q=tbn:ANd9GcTyj99p60XCLyLk1htB7-1neRt8-2QdnenNlQ&usqp=CAU\"target=\"_http:\/\/onlineclassesguru.com\/orders\/ordernow\"\/><\/center><p>","protected":false},"excerpt":{"rendered":"<p>Smartphones risks and vulnerabilities: As per Su, Wang, Liu, Choi &amp; Choi, (2018), the threats of the security in the smartphones have found to be constantly changing as per to the circumstances and also of the technological advancements that consist of the technical support like the specifications in the smartphone devices and also of the&#8230;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-9822","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.0 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Emerging Threats Paper: Smartphones risks and vulnerabilities - onlineclassesguru<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"http:\/\/onlineclassesguru.com\/index.php\/2020\/11\/19\/emerging-threats-paper-smartphones-risks-and-vulnerabilities\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Emerging Threats Paper: Smartphones risks and vulnerabilities - onlineclassesguru\" \/>\n<meta property=\"og:description\" content=\"Smartphones risks and vulnerabilities: As per Su, Wang, Liu, Choi &amp; Choi, (2018), the threats of the security in the smartphones have found to be constantly changing as per to the circumstances and also of the technological advancements that consist of the technical support like the specifications in the smartphone devices and also of the...\" \/>\n<meta property=\"og:url\" content=\"http:\/\/onlineclassesguru.com\/index.php\/2020\/11\/19\/emerging-threats-paper-smartphones-risks-and-vulnerabilities\/\" \/>\n<meta property=\"og:site_name\" content=\"onlineclassesguru\" \/>\n<meta property=\"article:published_time\" content=\"2020-11-19T19:22:33+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin_admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/onlineclassesguru.com\/#website\",\"url\":\"https:\/\/onlineclassesguru.com\/\",\"name\":\"onlineclassesguru\",\"description\":\"Cheap Professional coursework and reaction papers help\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/onlineclassesguru.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"http:\/\/onlineclassesguru.com\/index.php\/2020\/11\/19\/emerging-threats-paper-smartphones-risks-and-vulnerabilities\/#webpage\",\"url\":\"http:\/\/onlineclassesguru.com\/index.php\/2020\/11\/19\/emerging-threats-paper-smartphones-risks-and-vulnerabilities\/\",\"name\":\"Emerging Threats Paper: Smartphones risks and vulnerabilities - onlineclassesguru\",\"isPartOf\":{\"@id\":\"https:\/\/onlineclassesguru.com\/#website\"},\"datePublished\":\"2020-11-19T19:22:33+00:00\",\"dateModified\":\"2020-11-19T19:22:33+00:00\",\"author\":{\"@id\":\"https:\/\/onlineclassesguru.com\/#\/schema\/person\/1831fa4d28e47b468621cf27932f5742\"},\"breadcrumb\":{\"@id\":\"http:\/\/onlineclassesguru.com\/index.php\/2020\/11\/19\/emerging-threats-paper-smartphones-risks-and-vulnerabilities\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"http:\/\/onlineclassesguru.com\/index.php\/2020\/11\/19\/emerging-threats-paper-smartphones-risks-and-vulnerabilities\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"http:\/\/onlineclassesguru.com\/index.php\/2020\/11\/19\/emerging-threats-paper-smartphones-risks-and-vulnerabilities\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/onlineclassesguru.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Emerging Threats Paper: Smartphones risks and vulnerabilities\"}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/onlineclassesguru.com\/#\/schema\/person\/1831fa4d28e47b468621cf27932f5742\",\"name\":\"admin_admin\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/onlineclassesguru.com\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/429c8d043f7a770af242b0031e8b9f2b?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/429c8d043f7a770af242b0031e8b9f2b?s=96&d=mm&r=g\",\"caption\":\"admin_admin\"},\"url\":\"https:\/\/onlineclassesguru.com\/index.php\/author\/admin_admin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Emerging Threats Paper: Smartphones risks and vulnerabilities - onlineclassesguru","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"http:\/\/onlineclassesguru.com\/index.php\/2020\/11\/19\/emerging-threats-paper-smartphones-risks-and-vulnerabilities\/","og_locale":"en_US","og_type":"article","og_title":"Emerging Threats Paper: Smartphones risks and vulnerabilities - onlineclassesguru","og_description":"Smartphones risks and vulnerabilities: As per Su, Wang, Liu, Choi &amp; Choi, (2018), the threats of the security in the smartphones have found to be constantly changing as per to the circumstances and also of the technological advancements that consist of the technical support like the specifications in the smartphone devices and also of the...","og_url":"http:\/\/onlineclassesguru.com\/index.php\/2020\/11\/19\/emerging-threats-paper-smartphones-risks-and-vulnerabilities\/","og_site_name":"onlineclassesguru","article_published_time":"2020-11-19T19:22:33+00:00","twitter_card":"summary_large_image","twitter_misc":{"Written by":"admin_admin","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebSite","@id":"https:\/\/onlineclassesguru.com\/#website","url":"https:\/\/onlineclassesguru.com\/","name":"onlineclassesguru","description":"Cheap Professional coursework and reaction papers help","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/onlineclassesguru.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"WebPage","@id":"http:\/\/onlineclassesguru.com\/index.php\/2020\/11\/19\/emerging-threats-paper-smartphones-risks-and-vulnerabilities\/#webpage","url":"http:\/\/onlineclassesguru.com\/index.php\/2020\/11\/19\/emerging-threats-paper-smartphones-risks-and-vulnerabilities\/","name":"Emerging Threats Paper: Smartphones risks and vulnerabilities - onlineclassesguru","isPartOf":{"@id":"https:\/\/onlineclassesguru.com\/#website"},"datePublished":"2020-11-19T19:22:33+00:00","dateModified":"2020-11-19T19:22:33+00:00","author":{"@id":"https:\/\/onlineclassesguru.com\/#\/schema\/person\/1831fa4d28e47b468621cf27932f5742"},"breadcrumb":{"@id":"http:\/\/onlineclassesguru.com\/index.php\/2020\/11\/19\/emerging-threats-paper-smartphones-risks-and-vulnerabilities\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["http:\/\/onlineclassesguru.com\/index.php\/2020\/11\/19\/emerging-threats-paper-smartphones-risks-and-vulnerabilities\/"]}]},{"@type":"BreadcrumbList","@id":"http:\/\/onlineclassesguru.com\/index.php\/2020\/11\/19\/emerging-threats-paper-smartphones-risks-and-vulnerabilities\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/onlineclassesguru.com\/"},{"@type":"ListItem","position":2,"name":"Emerging Threats Paper: Smartphones risks and vulnerabilities"}]},{"@type":"Person","@id":"https:\/\/onlineclassesguru.com\/#\/schema\/person\/1831fa4d28e47b468621cf27932f5742","name":"admin_admin","image":{"@type":"ImageObject","@id":"https:\/\/onlineclassesguru.com\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/429c8d043f7a770af242b0031e8b9f2b?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/429c8d043f7a770af242b0031e8b9f2b?s=96&d=mm&r=g","caption":"admin_admin"},"url":"https:\/\/onlineclassesguru.com\/index.php\/author\/admin_admin\/"}]}},"_links":{"self":[{"href":"https:\/\/onlineclassesguru.com\/index.php\/wp-json\/wp\/v2\/posts\/9822"}],"collection":[{"href":"https:\/\/onlineclassesguru.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/onlineclassesguru.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/onlineclassesguru.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/onlineclassesguru.com\/index.php\/wp-json\/wp\/v2\/comments?post=9822"}],"version-history":[{"count":1,"href":"https:\/\/onlineclassesguru.com\/index.php\/wp-json\/wp\/v2\/posts\/9822\/revisions"}],"predecessor-version":[{"id":9823,"href":"https:\/\/onlineclassesguru.com\/index.php\/wp-json\/wp\/v2\/posts\/9822\/revisions\/9823"}],"wp:attachment":[{"href":"https:\/\/onlineclassesguru.com\/index.php\/wp-json\/wp\/v2\/media?parent=9822"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/onlineclassesguru.com\/index.php\/wp-json\/wp\/v2\/categories?post=9822"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/onlineclassesguru.com\/index.php\/wp-json\/wp\/v2\/tags?post=9822"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}