This article is about security principle of real analysis sc malik pdf to mobile devices. More and more users and businesses use smartphones to communicate, but also to plan and organize their users’ work and also private life.
All smartphones, as computers, are preferred targets of attacks. However, this number is expected to grow. Security countermeasures are being developed and applied to smartphones, from security in different layers of software to the dissemination of information to end users. A smartphone user is exposed to various threats when they use their phone. These threats can disrupt the operation of the smartphone, and transmit or modify user data. Identity: smartphones are highly customizable, so the device or its contents can easily be associated with a specific person. Availability: attacking a smartphone can limit access to it and deprive the owner of its use.
There are a number of threats to mobile devices, including annoyance, stealing money, invading privacy, propagation, and malicious tools. Botnets: attackers infect multiple machines with malware that victims generally acquire via e-mail attachments or from compromised applications or websites. The malware then gives hackers remote control of “zombie” devices, which can then be instructed to perform harmful acts. Malicious applications: hackers upload malicious programs or games to third-party smartphone application marketplaces. The programs steal personal information and open backdoor communication channels to install additional applications and cause other problems. Malicious links on social networks: an effective way to spread malware where hackers can place Trojans, spyware, and backdoors. Spyware: hackers use this to hijack phones, allowing them to hear calls, see text messages and e-mails as well as track someone’s location through GPS updates.