Ongoing Aims
- Install and try out Vulnerable Mobile Applications
- Find papers and start Lit Review - Started
- Plan Introduction - Started
- Gather Questions to Fuel Research - Completed
- Analyse trusted sources - partially completed
--------------------------------------------------------------------------------------------------------------------------
Todays blog is all about the analysis of the trusted journals i've collected and why I trust them and what they information they can provide me. The articles have been split into categories regarding my research questions. The categories are:
7. Journal Article - Android Malware and Mitigation - 2
Other Trusted Resources Include:
Todays blog is all about the analysis of the trusted journals i've collected and why I trust them and what they information they can provide me. The articles have been split into categories regarding my research questions. The categories are:
- Mobile Application Security
- Android
- iOS
- Risk Assessment
- Mobile Protection
By the side of each article title i will put numbers of the categories the article relates to.
1. Journal Articles - Emerging Threats from a Mobile Platform - 1,2,3
Journal - MIPRO
Year - 2011
Brief Description - Provides an overview of the challenges and threats to mobile platforms. The articles focus's on iOS, Android and Symbian mobile devices. Also reviews the similarities between Mobile and desktop malware.
Cited - 2
URL - http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5967292
- This journal is trusted because it was used during an international conference on IT Security, the authors also all work at respectable establishments, such as various universities.
2. Journal Article - A Survey On Security for Mobile devices - 1
Journal - Communications Surveys & Tutorials, IEEE
Year - 2013
Brief Description - The paper surveys the state of art threats, vulnerabilities and solutions of mobile devices from 2004-2011.
Cited - N/A
URL - http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6170530
- This journal is trusted because the authors are both from respectable companies, e.g. telefonica, and would be able to get access to the data required to come to a trusted and accepted solution. It was also posted in a Journal that was created by IEEE which was published very recently.
3. Journal Article - Mobile Security: A look ahead - 1,2,3,5
Journal - Security & Privacy, IEEE
Year - 2013
Brief Description - This article reviews the challenges faces by employee owned mobile devices and compares iOS and Android security solutions. It also takes a look at various security solutions, some of which are application based and some are through the use of IDS's
Cited - N/A
URL -http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6427812
- Also the citing wasn't available for this article i feel is still extremely trustworthy as the authors are both from prestigious backgrounds and have written other articles in areas similar to this. The article was also published in a journal all about security and privacy which means it had to beat of some heavy competition to get into the journal.
4. Journal Article - Vetting Mobile Apps - 1,2,3
Journal - IT Professional
Year - 2011
Brief Description - Talks about why vetting mobile applications from 3rd parties is so important and discusses various vetting techniques.
Cited - 1
URL -http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5960018
- I feel that due to the authors and that it was in a Journal all about insecure IT that the source is trusted. The authors work at the national institute for Technology.
5. Report - Symantec International Security Threat Report - 1,5
Year - 2011
Brief Description - Report focusing on Threats from a range of devices, and focus's on threats from mobile devices. Provides lots of key figures.
Cited - N/A
URL - http://book.itep.ru/depository/security/symantec/Symantec%20-%20April%202011%20threat%20report.pdf
- This source is trusted because it is from one of the largest IT Security companies in the world, the used a wide sample for all of the key figures which proves the information can be trusted.
6. Journal Article - Android Architecture: Attacking the weak points - 2
Journal - Network Security
Year - 2012
Brief Description - This article talks about threats posed to android devices and why there so insecure.
Cited - 4
URL - http://www.sciencedirect.com/science/article/pii/S1353485812700922
- This article was written by a freelance journalist who specialises in Information Security. He produces a lot of respected journals which have been cited several times.
7. Journal Article - Android Malware and Mitigation - 2
Journal - 2012
Year - 2012
Brief Description - This article focus's on Malware attacks on Android devices and the mitigation techniques available
Cited - 2
URL - http://www.sciencedirect.com/science/article/pii/S1353485812701046
- This article was written by a freelance journalist who specialises in Information Security. He produces a lot of respected journals which have been cited several times.
Other Trusted Resources Include:
- FOD Security user guide - Manual for tool used by the application security team
- FOD mobile security review for the company - outlines the processes provided to the company by their 3rd part application testers
- Software Security: Building Security In, Gary McGraw - Gary's book on application security.
So far i've gathered a wide variety of trusted resources, but only in certain area. I need to focus and find more in the areas of iOS, Risk assessment and mobile protection. I'll be looking into design policies, frameworks for risk assessment and various protection mechanisms over the next few days.
Thank you very much for reading!! Stayed tune for more. You Stay Classy Bournemouth.
No comments:
Post a Comment