Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Mobile Malware

Mobile Malware
View Sample PDF
Author(s): Geogen G. (SRM University, India) and Poovammal E. (SRM University, India)
Copyright: 2020
Pages: 17
Source title: Securing the Internet of Things: Concepts, Methodologies, Tools, and Applications
Source Author(s)/Editor(s): Information Resources Management Association (USA)
DOI: 10.4018/978-1-5225-9866-4.ch006


View Mobile Malware on the publisher's website for pricing and purchasing information.


Why should everyone know about mobile malware? With the introduction of Internet of Things (IoT) and Cloud, you can't survive in a disconnected world. Thus from your home appliances to your window curtains, everything is connected to Internet which can be accessed through your hand held mobile device. Unlike Personal Computers, these devices give Hackers a greater attack landscape. Back in 2004, when the first mobile malware was introduced, we never thought that it would get such a big threat space, as we see today. So, we discuss the History of Mobile malwares and its categories with its motives. We also discuss few signs that indicate the presence of a mobile malware. To conclude we categorize the battle against malware into two namely prevention and response, which is forensically analysed using Static/Dynamic Methods/Tools.

Related Content

Kijpokin Kasemsap. © 2020. 20 pages.
Tommy Prayoga, Juneman Abraham. © 2020. 25 pages.
Jasmine Norman, Paul Joseph. © 2020. 15 pages.
Sungwook Kim. © 2020. 9 pages.
Abhijeet Chandrakant Dabre, Sandesh Shivaji Mahamure, Snehal Pandurang Wadibhasme. © 2020. 22 pages.
Geogen G., Poovammal E.. © 2020. 17 pages.
Nachiket Athavale, Shubham Deshpande, Vikash Chaudhary, Jatin Chavan, S. S. Barde. © 2020. 15 pages.
Body Bottom