What is it about?

This paper presents a set of rules and controls that will reduce the risks that threaten smartphone users. Furthermore, this work provides the methods of risk assessment that are related to smartphones. It identifies the assets and lists several different threats that are relevant. Each risk has its impact on the assets, this is described by mapping it with the likelihood of each threat.

Featured Image

Why is it important?

After studying the various types of risks that might affect any smartphone negatively regardless of its operating system, we present some proposed controls that must be taken into account to avoid several of the risk dimensions and their impact on the assets as much as possible.

Perspectives

I hope this research will raise awareness among smartphone users to avoid being hacked and their private data leaked, especially since the smartphone has become relied upon in most aspects of life and work.

Mohammed Nasereddin
Princess Sumaya University for Technology

Read the Original

This page is a summary of: Risk Assessment in Smartphones: Comprehensive Analysis, April 2021, ACM (Association for Computing Machinery),
DOI: 10.1145/3460620.3460737.
You can read the full text:

Read

Contributors

The following have contributed to this page