Affiliation:
1. Netaji Subhas University of Technology, India
Abstract
Modern day smartphones are capable of performing every single task that a desktop computer can do. Smartphones being a new technology with less than a decade in the communication industry are vulnerable to security attacks and data leakage. In the current scenario, Android devices are the majority are the prime target of hackers and criminal organisation. Thus, smartphone security is of utmost priority for software companies. In this chapter, the authors begin by discussing the need for mobile forensic analysis and discussing basic smartphone vulnerabilities. they then discuss the types of attacks and their effects on smartphones followed by the security mechanisms employed to deal with the attacks and threats. they also list and give a brief description of tools used commercially for forensic analysis of smartphones, and two experiment-based case studies are provided to allow the readers to get a better understanding of the merits of existing works and practical application of investigation process.
Reference31 articles.
1. A Survey on Smartphones Security: Software Vulnerabilities, Malware, and Attacks.;M. T.Ahvanooey;International Journal of Advanced Computer Science and Applications,2017
2. Al-Hadadi & AlShidhani. (2013). Smartphone Forensics Analysis: A Case Study. International Journal of Computer and Electrical Engineering, 5(6).
3. Alamin, Babiker, & Mustafa. (2015). A Survey on Mobile Forensic for Android Smartphones. IOSR Journal of Computer Engineering, 17(2), 15-19.
4. Anjali, Geetanjali, Shivlila, Swati, & Kadu. (2013). Data leakage detection. International Journal of Computer Science and Mobile Computing, 2(5).
5. The acceptance and diffusion of the innovative smart phone use: A case study of a delivery service company in logistics