期刊文献+

浅析移动终端的安全风险及防护建议

Risk assessment and safety protection of smart mobilephone
下载PDF
导出
摘要 随着智能终端和移动通信技术的飞速发展,购物、支付、理财产品等金融业务层出不穷,移动终端的安全性成为了安全攻击的目标也是社会热点问题。本文对移动终端进行了风险分析,辅以使用Kali Linux系统攻击同一个Wi-Fi局域网内的安卓手机作为案例加以说明,并提出了安全防护建议。 With the development of mobile terminal technology and mobile communication technology, smart mobilephones are using in more and more aspect, including shopping, payment, fi nancial products and other fi nancial services, the security of smart mobilephones has become the focus of social security. In this paper, the risk assessment of smart mobilephones is carried out by using Linux Kali system for an example and put forward the suggestion of safty protection for smart mobilephones.
作者 刘苑明
出处 《电信工程技术与标准化》 2016年第3期63-66,共4页 Telecom Engineering Technics and Standardization
关键词 智能终端 安全风险 渗透入侵 安全防护建议 smart mobilephone security risk infi ltration safety protection suggestion
  • 相关文献

参考文献4

二级参考文献27

  • 1王菲飞.浅析智能手机恶意代码的检测与防护技术[J].保密科学技术,2012(4):57-61. 被引量:2
  • 2孙剑,底翔.智能手机的病毒防治[J].信息安全与通信保密,2007,29(1):136-138. 被引量:5
  • 3巫喜红,凌捷.BM模式匹配算法剖析[J].计算机工程与设计,2007,28(1):29-31. 被引量:19
  • 4刘丁.手机恶意代码分析及预防[J].重庆科技学院学报(自然科学版),2007,9(2):105-107. 被引量:5
  • 5Nauman M,Khan S,Zhang X. Apex: extending android permission model and enforcement with user-defined runtime constraints[C]. 2010:328-332.
  • 6吴俊昌,骆培杰,程绍银,等.基于权限分类的Android应用程序的静态分析[c]//第四届信息安全漏洞分析与风险评估大会.北京,2011:61-71.
  • 7Shabtai U, Kanonov,Elovici Y, et al. Andromaly: a behavioral malware detection framework for android devices[J]. Journal of Intelligent Information Systems,2012:l-30.
  • 8Shabtai U, Kanonov Y, Elovici. Detection, Alert and Response to Malicious Behavior in Mobile Devices: Knowledge-Based Approach[C]. 2009:357-358.
  • 9Habtai U,Kanonov Y,Elovici. Intrusion detection for mobile devices using the knowledge-based ,temporal abstraction method [J]. Journal of Systems and Software, 201 O, 83 (8): 1524-1537.
  • 10Shabtai Y,Fledel Y,Elovici,et al. Using the KBTA method for inferring computer and network security alerts from time- stamped, raw system metrics[J]. Journal in Computer Virology, 2010,6(3 ):239.

共引文献11

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部