Analyzing Cybersecurity Threats on Mobile Phones
Sara Alsahaim ;
Mohammed Maayah
Published: 2023/08/12
Abstract
The widespread digital transformation has deeply integrated mobile devices into the fabric of daily life, making them indispensable tools for communication, education, healthcare, and financial transactions. However, the increasing reliance on mobile technology has also introduced a growing landscape of security threats and vulnerabilities. This research aims to systematically analyze the security risks associated with mobile phone usage, identify their underlying vulnerabilities, and propose effective countermeasures. With many users lacking adequate awareness of cybersecurity practices, mobile devices become susceptible to threats such as malware, phishing, unauthorized data access, and malicious applications. The study focuses on both individual and organizational perspectives, emphasizing that threats at the personal level can propagate to broader domains such as workplaces and educational environments. Utilizing a systematic literature review guided by the PRISMA methodology, relevant studies published between 2016 and 2022 were examined through databases like the Saudi Digital Library and Google Scholar. The research addresses three central questions: (1) what are the prevalent security threats on mobile phones? (2) What vulnerabilities contribute to these threats? (3) What countermeasures are most effective in mitigating them? The findings highlight the urgent need for user education and implementation of security tools, such as antivirus applications and safe downloading practices, to fortify mobile security and reduce potential risks.
Keywords
How to Cite the Article
Alsahaim, S., & Maayah, M. (2023). Analyzing Cybersecurity Threats on Mobile Phones. STAP Journal of Security Risk Management, 2023(1), 3–19https://doi.org/10.63180/jsrm.thestap.2023.1.2
Analyzing Cybersecurity Threats on Mobile Phones is licensed under CC BY 4.0
References
- Yesilyurt, M., & Yalman, Y. (2016). Security threats on mobile devices and their effects: estimations for the future. International Journal of Security and Its Applications, 10(2), 13-26.
- Bissyandé, T. F., & Sié, O. (2020, February). Analysis of the Impact of Permissions on the Vulnerability of Mobile Applications. In e-Infrastructure and e-Services for Developing Countries: 11th EAI International Conference, AFRICOMM 2019, Porto-Novo, Benin, December 3–4, 2019, Proceedings (Vol. 311, p. 3). Springer Nature.
- Zaidi, S. F. A., Shah, M. A., Kamran, M., Javaid, Q., & Zhang, S. (2016). A survey on security for smartphone device. International journal of advanced computer science and applications, 7(4), 206-219.
- Hamed, Y. S. I., AbdulKader, S. N. A., & Mostafa, M. S. M. (2019). Mobile malware detection: A survey. International Journal of Computer Science and Information Security (IJCSIS), 17(1).
- Mitrea, T., & Borda, M. (2020, June). Mobile security threats: a survey on protection and mitigation strategies. In International Conference Knowledge-Based Organization (Vol. 26, No. 3, pp. 131-135).
- Adăscăliţei, I. (2019). Smartphones and IoT Security. Informatica Economica, 23(2).
- Wiryawan, D., Suhartono, J., Fernando, Y., So, I. G., & Gui, A. (2019). Malware Mobile Devices in Indonesia. KnE Social Sciences, 259-267.
- Ahmad, A., Malik, A. W., Alreshidi, A., Khan, W., & Sajjad, M. (2019). Adaptive security for self-protection of mobile computing devices. Mobile Networks and Applications, 1-20.
- Riad, A. B. M., Islam, M. S., Shahriar, H., Zhang, C., Valero, M., Sneha, S., & Ahamed, S. (2021). Plugin-Based Tool for Teaching Secure Mobile Application Development. Information Systems Education Journal, 19(2), 25-34.
- Kunda, D., & Chishimba, M. (2018). A survey of android mobile phone authentication schemes. Mobile Networks and Applications, 1-9.
- Albakri, A., Fatima, H., Mohammed, M., Ahmed, A., Ali, A., Ali, A., & Elzein, N. M. (2022). Survey on Reverse-Engineering Tools for Android Mobile Devices. Mathematical Problems in Engineering, 2022.
- Alsaleh, M., Alomar, N., & Alarifi, A. (2017). Smartphone users: Understanding how security mechanisms are perceived and new persuasive methods. PloS one, 12(3), e0173284.
- Kadëna, E. (2017). Smartphone Security Threats. Manag. Enterp. Benchmarking 21st century, 141- 160.
- Bubukayr, M. A. S., & Almaiah, M. A. (2021, July). Cybersecurity concerns in smart-phones and applications: A survey. In 2021 International Conference on Information Technology (ICIT) (pp. 725-731). IEEE.
- ZAMFIROIU, A., POCATILU, P., & CAPISIZU, S. (2019, May). Mobile data vulnerabilities. In Proceedings of the IE 2019 International Conference (pp. 407-412).
- Alhashim, S. S., & Rahman, M. H. (2021, July). Cybersecurity Threats in Line with Awareness in Saudi Arabia. In 2021 International Conference on Information Technology (ICIT) (pp. 314-319). IEEE.
- Duisebekova, K. S., Sarsenova, Z. N., Pyagay, V. T., Tuyakova, Z. N., Duzbayev, N. T., Aitmagambetov, A. Z., & Amanzholova, S. T. (2019, June). Environmental monitoring system for analysis of climatic and ecological changes using LoRa technology. In Proceedings of the 5th International Conference on Engineering and MIS (pp. 1-6).
- Nikkhah, H. R., Balapour, A., & Sabherwal, R. (2018). Mobile applications security: Role of privacy.
- Al Jutail, M., Al-Akhras, M., & Albesher, A. (2019). Associated Risks in Mobile Applications Permissions. Journal of Information Security, 10(02), 69.
- Koala, G., Bassolé, D., Bissyandé, T. F., & Sié, O. (2019, December). Analysis of the Impact of Permissions on the Vulnerability of Mobile Applications. In International Conference on e-Infrastructure and e-Services for Developing Countries (pp. 3-14). Springer, Cham.
- Zaidi, S. F. A., Shah, M. A., Kamran, M., Javaid, Q., & Zhang, S. (2016). A survey on security for smartphone device. International journal of advanced computer science and applications, 7(4), 206-219.
- Zeybek, M., Yılmaz, E. N., & Doğru, İ. A. (2019, November). A study on security awareness in mobile devices. In 2019 1st International Informatics and Software Engineering Conference (UBMYK) (pp. 1-6). IEEE.
- Abdurachman, E., Gaol, F. L., & Soewito, B. (2019). Survey on threats and risks in the cloud computing environment. Procedia Computer Science, 161, 1325-1332.
- Mamun, T. I., & Alam, L. (2016). Android Security Vulnerabilities Due to User Unawareness and Frameworks for Overcoming Those Vulnerabilities. International Journal of Computer Applications, 975, 8887.
- Bassolé, D., Koala, G., Traoré, Y., & Sié, O. (2020, March). Vulnerability analysis in mobile banking and payment applications on android in African Countries. In International Conference on Innovations and Interdisciplinary Solutions for Underserved Areas (pp. 164-175). Springer, Cham.