Understanding Cybersecurity on Smartphones: Challenges, Strategies, and Trends

  • 2h 7m
  • Andi Fitriah Abdul Kadir, Arash Habibi Lashkari, Mahdi Daghmehchi Firoozjaei
  • Springer
  • 2024

This book offers a comprehensive overview of smartphone security, focusing on various operating systems and their associated challenges. It covers the smartphone industry's evolution, emphasizing security and privacy concerns. It explores Android, iOS, and Windows OS security vulnerabilities and mitigation measures. Additionally, it discusses alternative OSs like Symbian, Tizen, Sailfish, Ubuntu Touch, KaiOS, Sirin, and HarmonyOS.

The book also addresses mobile application security, best practices for users and developers, Mobile Device Management (MDM) in enterprise settings, mobile network security, and the significance of mobile cloud security and emerging technologies such as IoT, AI, ML, and blockchain. It discusses the importance of balancing innovation with solid security practices in the ever-evolving mobile technology landscape.

About the Author

Dr. Andi Fitriah Abdul Kadir is an Assistant Professor at the Department of Computer Science at International Islamic University Malaysia (IIUM), Malaysia, and an alumna of the Canadian Institute for Cybersecurity (CIC) at the University of New Brunswick, Canada. She received the IIUM Academic Excellence Award and the Tunku Abdul Rahman Award. She also received several awards from international academic conferences, including the Gold Medal, Best Poster, and Best Paper awards. She works closely with industry and the government, focusing on Research and Development (R&D) projects. One of her research projects on privacy engineering is part of the 12th Malaysia Plan (RMK12), a strategy for allocating the national budget in Malaysia to all economic sectors, including cybersecurity. Her current research focus is computer forensics, network security, malware analysis, machine learning, and privacy engineering.

Dr. Arash Habibi Lashkari is a Canada Research Chair (CRC) inCybersecurity. He is a Senior member of IEEE and an Associate Professor at York University, Canada. He is the author of ten published books and more than 110 academic articles on various cybersecurity-related topics. He is the co-author of the national award-winning article series “Understanding Canadian Cybersecurity Laws,” which was recently recognized with a Gold Medal at the 2020 Canadian Online Publishing Awards. Dr. Lashkari has over 26 years of teaching experience spanning several international universities, has received 15 awards at international computer security competitions - including three gold awards - and was recognized as one of Canada’s Top 150 Researchers for 2017. Building on over two decades of concurrent industrial and development experience in network, software, and computer security, Dr. Lashkari’s current work involves the development of vulnerability detection technology to protect network systems against cyberattacks. He simultaneously supervises multiple research and development teams working on several projects related to network traffic analysis, malware analysis, Honeynet, and threat hunting.

Mahdi Daghmehchi Firoozjaei is an Assistant Professor in the Department of Computer Science at MacEwan University, Canada. Prior to this, he was an Assistant Professor at the University of Windsor, Canada, and a postdoctoral research fellow at the University of New Brunswick, Canada. He received a BSc. degree in Telecommunication Engineering and an MSc. degree in Cryptology. Dr. Firoozjaei did his PhD. in Computer Engineering at Sungkyunkwan University, Korea, in 2018. He has 10 years of industry experience in telecommunication systems and cybersecurity. He worked for the Telecommunication Company of Iran (TCI), Babol, Iran, as a senior engineer from 2006 to 2014 and was a research fellow at the Canadian Institute for Cybersecurity (CIC), Canada, from 2018 to 2021. Dr. Firoozjaei led R&D projects in the operational technology (OT)forensics for Siemens Canada and DNS firewall for CIRA. His research interest focuses on persistent malware analysis, digital forensics, network security, privacy-preserving, and blockchain.

In this Book

  • Preface
  • Introduction
  • Android Operating System
  • iPhone Operating System (iOS)
  • Windows Operating System
  • Other Operating Systems
  • Mobile Application Security
  • The Best Security Practices
  • Conclusion

YOU MIGHT ALSO LIKE