Mobile Security for the modern CEO: Attacks, Mitigations, and Future
Trends
- URL: http://arxiv.org/abs/2207.08105v1
- Date: Sun, 17 Jul 2022 08:19:24 GMT
- Title: Mobile Security for the modern CEO: Attacks, Mitigations, and Future
Trends
- Authors: Marc Schmitt
- Abstract summary: Attacks on mobile devices grow yearly in volume and magnitude causing severe damage.
This paper offers a comprehensive overview of modern mobile attacks categorized into malware, phishing, communication, supply chain, physical, and authentication attacks.
It also provides security design tips to secure the mobile setup and general recommendations to prevent the successful execution of an incoming attack.
- Score: 0.0
- License: http://creativecommons.org/licenses/by-nc-nd/4.0/
- Abstract: Todays world is digital, global, and interconnected and mobile devices are at
the heart of modern communications in business, politics, and civil society.
However, cyber threats are an omnipresent reality in our hyper-connected world.
The world economic forum ranks cyber threats consistently among the global top
security risks. Attacks on mobile devices grow yearly in volume and magnitude
causing severe damage. This paper offers a comprehensive overview of modern
mobile attacks categorized into malware, phishing, communication, supply chain,
physical, and authentication attacks, including a section on mitigations and
limitations. It also provides security design tips to secure the mobile setup
and general recommendations to prevent the successful execution of an incoming
attack. The last section highlights future technology trends and how those will
impact and change the mobile security landscape in the future.
Related papers
- Mobile Application Threats and Security [0.17249361224827534]
This manuscript will focus on security vulnerabilities in the mobile computing industry, especially focusing on tablets and smart phones.
The purpose of this study is to analyze current security risks and threats, and provide solutions that may be deployed to protect against such threats.
arXiv Detail & Related papers (2025-02-08T20:33:57Z) - Navigating the road to automotive cybersecurity compliance [39.79758414095764]
The automotive industry is compelled to adopt robust cybersecurity measures to safeguard both vehicles and data against potential threats.
The future of automotive cybersecurity lies in the continuous development of advanced protective measures and collaborative efforts among all stakeholders.
arXiv Detail & Related papers (2024-06-29T16:07:48Z) - Use of Graph Neural Networks in Aiding Defensive Cyber Operations [2.1874189959020427]
Graph Neural Networks have emerged as a promising approach for enhancing the effectiveness of defensive measures.
We look into the application of GNNs in aiding to break each stage of one of the most renowned attack life cycles, the Lockheed Martin Cyber Kill Chain.
arXiv Detail & Related papers (2024-01-11T05:56:29Z) - Classification of cyber attacks on IoT and ubiquitous computing devices [49.1574468325115]
This paper provides a classification of IoT malware.
Major targets and used exploits for attacks are identified and referred to the specific malware.
The majority of current IoT attacks continue to be of comparably low effort and level of sophistication and could be mitigated by existing technical measures.
arXiv Detail & Related papers (2023-12-01T16:10:43Z) - Graph Mining for Cybersecurity: A Survey [61.505995908021525]
The explosive growth of cyber attacks nowadays, such as malware, spam, and intrusions, caused severe consequences on society.
Traditional Machine Learning (ML) based methods are extensively used in detecting cyber threats, but they hardly model the correlations between real-world cyber entities.
With the proliferation of graph mining techniques, many researchers investigated these techniques for capturing correlations between cyber entities and achieving high performance.
arXiv Detail & Related papers (2023-04-02T08:43:03Z) - Global Pandemics Influence on Cyber Security and Cyber Crimes [5.8010446129208155]
COVID-19 has caused widespread damage across many areas of life and has made humans more dependent on the internet and technology.
This paper examines the different types of security threats and cyber crimes that people faced in the pandemic time and the need for a safe and secure cyber infrastructure.
arXiv Detail & Related papers (2023-02-24T05:26:42Z) - Artificial Intelligence for Cybersecurity: Threats, Attacks and
Mitigation [1.80476943513092]
The surging menace of cyber-attacks got a jolt from the recent advancements in Artificial Intelligence.
The intervention of AI not only automates a particular task but also improves efficiency by many folds.
This article discusses cybersecurity and cyber threats along with both conventional and intelligent ways of defense against cyber-attacks.
arXiv Detail & Related papers (2022-09-27T15:20:23Z) - Fixed Points in Cyber Space: Rethinking Optimal Evasion Attacks in the
Age of AI-NIDS [70.60975663021952]
We study blackbox adversarial attacks on network classifiers.
We argue that attacker-defender fixed points are themselves general-sum games with complex phase transitions.
We show that a continual learning approach is required to study attacker-defender dynamics.
arXiv Detail & Related papers (2021-11-23T23:42:16Z) - A Review on Cyber Crimes on the Internet of Things [4.207621961895129]
The global cybercrime damages predicted to cost up to 6 trillion dollars annually on the global economy by cyber crime.
The reasons for cyber-attacks can be Countries having week cyber securities, Cybercriminals use new technologies to attack.
MSP (Managed Service Providers) face different difficulties in fighting with Cyber-crime.
arXiv Detail & Related papers (2020-09-12T02:56:59Z) - Adversarial Machine Learning Attacks and Defense Methods in the Cyber
Security Domain [58.30296637276011]
This paper summarizes the latest research on adversarial attacks against security solutions based on machine learning techniques.
It is the first to discuss the unique challenges of implementing end-to-end adversarial attacks in the cyber security domain.
arXiv Detail & Related papers (2020-07-05T18:22:40Z) - When Wireless Communication Faces COVID-19: Combating the Pandemic and
Saving the Economy [93.08344893433639]
The year 2020 is experiencing a global health and economic crisis due to the COVID-19 pandemic.
Countries across the world are using digital technologies to fight this global crisis.
We show how these technologies are helping to combat this pandemic, including monitoring of the virus spread.
We discuss the challenges faced by wireless technologies, including privacy, security, and misinformation.
arXiv Detail & Related papers (2020-05-12T12:27:29Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.