期刊文献+

智能手机安全隐患分析与对策 被引量:9

Smartphone security hidden trouble analysis and countermeasures
原文传递
导出
摘要 随着智能手机的普及应用和互联网技术的发展,智能手机面临的安全形势也日益严峻。本文阐述了当前智能手机操作系统的安全隐患、应用软件的漏洞以及对手机病毒进行了分类,并对智能手机的安全防护方法做了探讨。 With the popularity of smart phones and development of Internet technology, smart phones are also increasingly Facing the grim security situation. This paper describes security risks of current smart phone operating system and loopholes of application software, also, makes a classification about phone virus and studies smart phone' s security protection methods.
作者 马颜军
出处 《网络安全技术与应用》 2013年第10期94-95,共2页 Network Security Technology & Application
关键词 智能手机 手机病毒 分析 安全防护 smart phone phone virus analysis security protection
  • 相关文献

参考文献3

二级参考文献20

  • 1Carey Nachenberg. A Window Into Mobile Device Security[J]. Symantec Security Response, 2011:4-9.
  • 2Miguel Helft, Kevin J.O' Brien. Inquiriew Grow Over Apple's Data Collection Practices[EB/OL].http://www.nytimes.com/2011/04/22/ technology/22data.html?_r=2&ref= global-home, 2011-04-21/2011-11 - 12.
  • 3Jean. Analysis of the jailbreakme v3 font exploit[EB/OL], http://esec- lab.sogeti.com/ post/Analysis-of-the-jailbreakme-v3- font-exploit, 2011-07-18/2011-11-12.
  • 4iPhone中文网.改iPhone默认密码SSH蠕虫病毒教程[EB/OL].http://iphone.tgbus.com/tutorial/use/200911/20091111105045shtml,2009-11-11/2011-11-12.
  • 5日本计算机安全公司.iPhone上网有感染病毒危险,用尸需要立即更新OS[EB/OL].http://big5.nikkeibp.corn.cn/news/digi/52792—20100813.hmll.2010-12-08/2011-11-12.
  • 6PANDYA V R. iPhone Security Analysis[R]. USA : Departmentof Computer Science, San Jose State University, 2008.
  • 7CEDRIC Halbmnn, SIGWALD Jean. iPhone Security Model & Vulnerabilities[R]. France Sogeti: ESEC, 2010.
  • 8BEDRUNE J B, SIGWALD J. iPhone Data Protection in Depth[R]. France Sogeti: ESEC, 2010.
  • 9GEOHOT. Jailbreak[EB/OL]. [2012-3-12]. http: // theiphonewiki.eom/wiki/index.php?title=Jailbreak.
  • 10McAfee Labs. McAfee Threats Report: Third Quarter 2011[EB/OL]. (2011-10)[2012-03-12]. http : IIwww. meafee. com/us/resources/reports/rp-quarterly-threat-q3-2011 .pdf.

共引文献24

同被引文献52

  • 1徐杰民,肖云.二维条码技术现状及发展前景[J].计算机与现代化,2004(12):141-142. 被引量:62
  • 2傅民仓,冯立杰,李文波.短距离无线网络通信技术及其应用[J].现代电子技术,2006,29(11):15-17. 被引量:30
  • 3权香兰.韩国推行手机实名制利大于弊[EB/OL].http://newssohu.corn/20100909/n274820484.shtml,2013-5-1.
  • 4A.Cecil Donald, S.Aml Oli, L.Arockiam, Mobile Cloud Security Issues and Challenges, International Journal of Engineering and Innovative Technology ( IJEIT ) Volume 3, Issue 1, July 2013.
  • 5Ronnie D.Caytiles and Sunguk Lee, "Security Considerations for Public Mobile Cloud Computing", International Journal of Advanced Science and Technology, Vol.44, July 2012.
  • 6P.Stephanow and I.Tsvihun, Opportunities Of Security-as-a- Service On Smart Phones, 25th Meeting of the Wireless World Research Forum ( WWRF 25 ) , November 16-t8, 2010, Newbury, UK.
  • 7艾瑞咨询.中国移动电子商务行业报告[EB/OL].http://ee.ire-search.crde-payment/20140401/229416.shtml.
  • 8调查显示网上购物隐私难保,个人信息被泄密[EB/OL].[2010-12-15].
  • 9网秦.网秦发布2013年全球手机安全报告恶意软件同比翻倍[EB/OL].
  • 10陈福莉.移动互联网时代的信息安全[J].通信安全通信保密,2014(1):29-31.

引证文献9

二级引证文献23

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部