Enter your keyword

2-s2.0-84966552181

[vc_empty_space][vc_empty_space]

Confidentiality and privacy information security risk assessment for Android-based mobile devices

Irwana, Asnar Y.a, Hendradjaya B.a

a School of Electrical Engineering and Informatics, Institut Teknologi Bandung (ITB), Bandung, Indonesia

[vc_row][vc_column][vc_row_inner][vc_column_inner][vc_separator css=”.vc_custom_1624529070653{padding-top: 30px !important;padding-bottom: 30px !important;}”][/vc_column_inner][/vc_row_inner][vc_row_inner layout=”boxed”][vc_column_inner width=”3/4″ css=”.vc_custom_1624695412187{border-right-width: 1px !important;border-right-color: #dddddd !important;border-right-style: solid !important;border-radius: 1px !important;}”][vc_empty_space][megatron_heading title=”Abstract” size=”size-sm” text_align=”text-left”][vc_column_text]© 2015 IEEE.Increasing use of smartphones for work and private purposes have mingled both the valuable personal data to work data unintentionally. Android permission-based security model are used to restrict the ability of applications to access device resources, but it failed to provide an adequate control for users and a visibility of how third party applications using personal data of users. The permission warnings when installing applications do not help most users in taking right security decisions. This research aims at developing a risk assessment method to determine security posture, at Android smartphone The method can help users to increase the security level of a device, especially against sensitive data leakage. The design of risk assessment uses two approaches, security configuration level assessment and sensitive data risk assessment. Security configuration level assessment is based on built-in Android smartphone configurations, while sensitive data risk assessment is based on combination of permissions from all applications installed on the device. Design of risk assessment implemented on Android smartphone called Smartphone Risk Assessment (SRA). The evaluation has been done by a usability testing using the System Usability Scale (SUS) questionnaire. The result shows that the SRA is rated as “Good” by respondents based on SUS score. The SRA is considered to be helpful by users to determine potential threats of their smartphones and any applications that has potential to leak sensitive data.[/vc_column_text][vc_empty_space][vc_separator css=”.vc_custom_1624528584150{padding-top: 25px !important;padding-bottom: 25px !important;}”][vc_empty_space][megatron_heading title=”Author keywords” size=”size-sm” text_align=”text-left”][vc_column_text]Android,Permission-based security,Risk assessment methods,Security,Security configurations,Sensitive datas,System Usability Scale (SUS),Third party application (Apps)[/vc_column_text][vc_empty_space][vc_separator css=”.vc_custom_1624528584150{padding-top: 25px !important;padding-bottom: 25px !important;}”][vc_empty_space][megatron_heading title=”Indexed keywords” size=”size-sm” text_align=”text-left”][vc_column_text]Android,Risk Assessment,Security,Sensitive Data,Smartphones[/vc_column_text][vc_empty_space][vc_separator css=”.vc_custom_1624528584150{padding-top: 25px !important;padding-bottom: 25px !important;}”][vc_empty_space][megatron_heading title=”Funding details” size=”size-sm” text_align=”text-left”][vc_column_text][/vc_column_text][vc_empty_space][vc_separator css=”.vc_custom_1624528584150{padding-top: 25px !important;padding-bottom: 25px !important;}”][vc_empty_space][megatron_heading title=”DOI” size=”size-sm” text_align=”text-left”][vc_column_text]https://doi.org/10.1109/ICODSE.2015.7436972[/vc_column_text][/vc_column_inner][vc_column_inner width=”1/4″][vc_column_text]Widget Plumx[/vc_column_text][/vc_column_inner][/vc_row_inner][/vc_column][/vc_row][vc_row][vc_column][vc_separator css=”.vc_custom_1624528584150{padding-top: 25px !important;padding-bottom: 25px !important;}”][/vc_column][/vc_row]