unsecurekaspersky.com

kaspersky.com  时间:2021-03-23  阅读:()
IssuesinInformationSystemsVolume15,IssueII,pp.
116-123,2014116MOBILEMALWARE:COMINGTOASMARTPHONENEARYOUKarenPaullet,RobertMorrisUniversity,paullet@rmu.
eduJamiePinchot,RobertMorrisUniversity,pinchot@rmu.
eduABSTRACTThisstudyexploredawarenessandconcernaboutmobilemalwareaswellasusagehabitsrelatedtopreventativemeasuresusedtomitigatemobilemalwareriskfactors.
Severalmobilemalwareriskfactorswereexplored,includingconnectingtounsecuredWi-Finetworks,settingmobiledevicestoautomaticallyconnecttoWi-Finetworks,leavingBluetoothconnectivityon,readingreviewsbeforedownloadingmobileapps,usinganti-malwaresoftwareorapps,frequencyofdatabackups,anddevicelocksusingpasswords,PINs,orfingerprints.
Atotalof187participantsweresurveyed,includingundergraduatesanddoctoralstudentsandalumniatamid-Atlanticuniversity.
Thestudyfoundthatamongtheriskfactorsexplored,participantswerenotasawareofthedangersassociatedwithconnectingmobiledevicestounsecuredWi-Finetworksandalsowerelargelyunfamiliarwithanti-malwaresoftwareandapps.
Asetofrecommendationsforincreasingawarenessofpreventativesecuritymeasuresformobilemalwarewerealsopresented.
Keywords:mobilemalware,mobilesecurity,smartphone,Bluetooth,Wi-FiINTRODUCTIONMobilephoneshavebecomeubiquitouswithinoursociety,andmanywouldnowconsiderthemanecessityratherthanaconvenience.
Wearelivinginaworldwherepeoplearestayingconnectedviamobiletechnologymorethaneverbefore.
Technologywhichwasonceonlyfoundondesktopcomputerscannowbecarriedinthepalmofourhands.
Thenumberofmobilephoneusersattheendof2012wasapproximately5.
9billionworldwide[8].
Mobiledevicesallowpeopletohaveaconstantconnectiontofriends,family,andinformation.
Aswemoveaboutourday,onewillnoticepeopleusingtheirmobiledevicesalmosteverywhere.
Usersarestayingconnectedwhilewaitinginlines,atthebusstop,whendiningoutwithfamilyandfriends,andinthecar.
Thisnoticeableconstantconnectiontoourmobiledevicesisbringingtotheforefrontanareaofconcerninregardtosecurity.
WhatsecuritymechanismsdowehaveinplacetodealwithmobilesecuritythreatsMostaveragecomputerusershavesometypeofanti-virusoranti-malwaresoftwareinstalledontheircomputers,butwhatabouttheirmobiledevicesMalwareisanycomputerprogramdesignedtoinfiltrate,use,ordamageadevicewithouttheowner'sconsent.
Thetermmalwareisoftencharacterizedashostile,intrusive,malicious,orannoying[11].
Infact,thetermitselfisderivedfrom"malicioussoftware,"andincommonusageithasbecomeanumbrellatermtodescribemanydifferenttypesofmaliciouscomputerprograms.
Mobilemalwareisanytypeofmalwarethatisspecificallytargetedtowardsmartphones,tabletsandothermobiledevices.
Mobilemalwareisontheriseandisprojectedtocontinueitsupwardtrajectory,propelledbythelargeandcontinuallygrowingsmartphoneuserbaseandanincreasinglymobileworkforcewhichprovideenticingtargetsforhackers[12].
Leavitt[12]describesthisphenomenonsuccinctly,"Intheworldofcomputersandcommunications,themorewidelyatechnologyisused,themorelikelyitistobecomethetargetofhackers"(p.
11).
Themaingoalsofmostmobilemalwareincludetheftofprivateinformation,incurringchargestopremiumnumbers,orgainingaccesstoauser'sbankaccountsorcredit[5,11,15].
Mobilemalwareposesaseriousthreatandisevolvingintoacomplexlandscapethatwilllikelysoonrivalthatoftraditionalcomputermalware[5].
Thenumberofsecuritybreachestopersonaldevicesisdifficulttomeasure,andfewstudieshaveexploredthisareatodate.
Ourresearchseekstoexploreawareness,concernandhabitsregardingnumerousmobiledevicesecurityissues.
RELATEDLITERATUREInordertobeabletoaddresstheriskfactorsassociatedwithmobilemalware,itisimperativetofirstunderstandthethreats[7].
Theincreasedusageofmobiledeviceshasintroducednewsecurityrisks[20].
Mobiledevicesarebecominganewtargettogainuserinformation,asmobiledevicesecurityhasnotkeptupwithtraditionalcomputersecurity.
Cybercriminalsarebeginningtoattackmobiledevicesduetothelackofsecuritymeasuresinplace.
Attackingmobiledeviceshasbecomeextremelyattractivetocriminalsduetotheplethoraofinformationthatishttps://doi.
org/10.
48009/2_iis_2014_116-123IssuesinInformationSystemsVolume15,IssueII,pp.
116-123,2014117storedonthedevice.
Suchinformationincludesemailaccounts,phonenumbers,calendarinformation,networkorlogincredentials,confidentialnotesorfiles,andcontactliststonameafew.
Fischer,Kuo,andHuang[6],discussthreeshiftsinmobiledevicesecurity.
Thefirstismobility,whichcreateduncertaintyaboutthemobiledevicesurroundings.
Mobiledevicescanbeusedonbothsecureandunsecureenvironments.
Forinstance,connectingtopublicWi-Fiathotelisanexampleofanunsecurenetwork,whereas,connectingtoaworkorpersonalnetworkareusuallysecure.
Whenusersconnecttoanunsecurenetwork,devicesareopenforattack.
Thesecondshiftinsecuritydealswithsensorsthatareinstalledonthedevice.
Mostmobiledeviceshavelocationtracking,Bluetooth,RFID,andcamerasbuilt-in.
Theautomaticinstallationofsensorsonmobiledeviceshasledtoanewareaforattack.
Thefinalshiftisconstantconnectivity.
MobiledeviceshaveconstantaccesstotheInternetandotherdevices,whichisalsoattractivetocybercriminals.
Thefactthatmobiledevicesareportablemakesthemeasytosteal.
Theownerofastolenphonecanactuallylosealloftheirpersonaldata[16].
Peopletakethetimetolockthedoorstotheirhomesandcarsinordertoprovidesecuritysothattheirpersonalpropertyisnotburglarized.
Butwhenitcomestosecuringmobiledevices,thatsamecareisoftenignored.
Mostpeoplewouldnotwalkdownthestreetandhandtheirpurseorwallettoacompletestrangertoholdfor60secondsormore.
Yetthesamepeoplethatwouldnotturnovertheirpurseorwalletwillthinknothingofaskingastrangertotakeapictureofthemusingtheirpersonalmobiledevicethatcontainsaplethoraofprivateinformation.
Peoplemusttakethetimetoimplementphysicalsecurityfeaturesaswellasvirtualsecurityfeaturesinordertostaysecure.
Tobegintostudymobilemalware,itisusefultounderstandthecategorygroupingsusedtodescribedifferenttypesofmalwareprograms.
Thoughdifferentauthorsdefinethesegroupingsindifferentways,severalcommoncategoriesappearthroughouttheliterature.
Thesecategoriesincludeviruses,worms,rootkits,botnets,phishing,spyware,Wi-FiandBluetoothhijacking,andmaliciousapps[11,12,13].
Eachofthesecommoncategorieswillbebrieflydescribed.
Avirusisacomputerprogramthatcanreplicateitself.
Virusesareoftenprogrammedtoinfectotherprogramsorfilesbyattachingtothem.
Awormisavirusthatcopiesitselfandattemptstospreadtootherdevices,typicallythroughemailmessagesinthedesktoplandscape,butalsothroughShortMessageService(SMS)orMultimediaMessageService(MMS)messages,hereafterjointlyreferredtoas"textmessages"inordertotravelfromonemobiledevicetoanother[10].
Awormissimilartoavirus,butdoesnothavetoattachitselftoaprogramorfile.
Rather,itusescomputernetworks,includingWi-Fi,tospreadtootherdevices,typicallycapitalizingonsecurityflawsonthereceivingdeviceinordertoaccessit.
Rootkitsinfecttheoperatingsystem(OS)ofadevicetoallowvirusesandothermalwaretohideinplainsight,stealthilydisablingsecurityfeaturesoroverwritingOSfilesinordertoremainundetectedonthedeviceforlongerperiodsoftime[11].
Abotnetreferstoagroupofdevicesthathavebeencompromisedbymalwarethatgivesahackertheabilitytocontrolthedevicesremotely.
Ahackertypicallyactivatesthese"zombie"devicesinconcerttosendspam,carryoutDenial-of-Service(DoS)attacks,orperformothermaliciousacts.
Attackerscanalsousemobile"zombie"networkstosendtextmessagestopremiumnumbers,incurringchargestotheuserforeachmessagesent.
Hackersoftenworkwithpremiumnumberserviceownersandreceiveapercentageofthemoneygeneratedthroughthesescams[11,12,14,15].
Phishingscams,inwhichscammersposeaslegitimatecompaniesinordertoswindleunsuspectingusersintopayingmoneyorrevealingprivateinformation,aremuchthesameonmobiledevicesastheyareondesktopplatforms.
However,inadditiontoemailandsocialmediaposts,mobilephishingscamsutilizetextmessagesaswell.
Smishingisatermusedtodescribetheexploitationoftextmessagesonmobiledevicesforphishingscams[19].
Spywareapplicationsarebecomingcommongroundforcybercriminalstocaptureinformation.
Aspreviouslymentioned,criminalshavemuchtogainfromaccessingtheinformationstoredonmobiledevices.
Spywareapplicationsmonitordevicecommunications,suchasphoneconversations,emails,textmessages,inboundandoutboundcalllogsanduserlocations.
Itisevenpossibleforanattackertolistenremotelytophoneconversations[9]orreadtextmessagesandemails.
Infact,mobilespywarecanalsoturnonacompromisedsmartphonewithoutringing,essentiallyturningitintoahiddenmicrophonetoeavesdroponnearbyconversations.
TheGPSfunctionsofIssuesinInformationSystemsVolume15,IssueII,pp.
116-123,2014118thedevicecanalsobeusedtotrackitscurrentlocation[12].
Mostspywareapplicationscanusuallybedetectedprovidedthatanti-malwareapplicationsareinstalledonthedevice.
Wi-FihijackingorWi-FisnoopingoccurswhenhackersareabletointerceptcommunicationsbetweensmartphonesandunsecuredWi-Fihotspots,justastheycanwithdesktoporlaptopcomputers.
Thisapproachiscalledaman-in-the-middleattack,becauseeverythingthatyoutypeandtransmitisinterceptedbythehacker(themiddleman)beforeitgetstowhereitwasintended.
Thismeansthatahackercouldeasilygainaccesstousernames,passwords,andevencreditcardinformationifauserlogsintowebsitesorpurchasesitemsonlinewhilebeingmonitored[2,3].
Forconvenience,manysmartphoneshavesettingstoallowthedevicetoautomaticallyconnecttoavailableWi-Finetworks,makingthedevicevulnerable.
Bluetooth,oneofthemostcommonshort-rangewirelessprotocols,isoftenusedtoallowconnectivitybetweenmobiledevices.
ThereareafewdifferenttypesofvulnerabilitiesthatcanbeexploitedwhenBluetoothconnectivityisturnedonforamobiledevice.
Bluejackingisatypeofpracticaljokeakintospam.
ABluejackercansendane-contactcardtoanotherBluetoothdeviceindiscoverablemode,aslongasitiswithinapproximatelya30-footradiusoftheirowndevice.
However,insteadofaddingarealcontactintotheunsuspectingrecipient'ssmartphone,theBluejackerexploitsthee-contactcardtoreplacethe"From"sectionwithamessage.
Whentherecipientreceivesthis"Bluetoothspam,"itcanoftenscarethepersonintorealizingthattheyareundersurveillance,whichistypicallytheintentionoftheBluejacker.
Bluebuggingallowsahackertogainaccesstoanotheruser'sdevicethroughBluetoothandcontrolsomeofitsfunctions,includingmakingphonecallsorsendingtextmessagestopremiumnumbersoreavesdroppingoncallsmadebytheuser[18].
Hackerscanalsocompromisesmartphonesandothermobiledevicesbyembeddingmalwareintomobileappsthatusersthendownloadandinstall.
Thesemaliciousappsareoftenfreeinordertoenticeuserstodownloadthem,andonceinstalledtheycanstealprivateinformationfromthedeviceandsenditbacktoahacker.
Theymayalsoinstallotherappsoropen"backdoors"onthedevice,allowingahackertotakeremotecontrolofthedeviceatalatertime[12].
PURPOSEOFSTUDYTheliteratureexaminedmakesitclearthatmobilemalwareisontherise.
Italsopointsoutavarietyofwaysinwhichmobiledevicesecuritymeasuresparallelthesecuritymeasuresofstandardcomputers.
Forexample,mobilemalwarespreadsinmuchthesamewayasvirusesspreadbetweencomputers:viaemailattachments,phishingwebsites,exploitationviapublicWi-Finetworks,infectionofseeminglyofficialprograms(apps),textmessages,Bluetoothconnectivity,andphysicaltheftorintrusion.
Simplestepscanbetakentoprotectmobiledevicesfrommuchofthethreatofmobilemalware,ifpeopleareawarethatasmartphonemustbeprotectedfrommalware.
Thisexploratorystudysoughttoexploreawareness,concernandusagehabitsofmobilesecurityprotectionmeasuresamonguniversitystudentsandalumni.
Thefollowingresearchquestionswereaddressed:RQ1:DouniversitystudentsandalumnidemonstrateawarenessofmobilemalwareriskfactorsbyusingpreventativesecuritymeasurestomitigatemobilemalwareriskfactorsformobiledevicesRQ2:IstherearelationshipbetweenconcernaboutmobilemalwareandpreventativesecuritymeasuresusedbyuniversitystudentsandalumniIssuesinInformationSystemsVolume15,IssueII,pp.
116-123,2014119RESEARCHMETHODOLOGYThisexploratorystudyexaminedawareness,concernanduseofsecuritymeasuresforprotectingmobiledevicesagainstmobilemalwareamonguniversitystudentsandalumni.
Anelectronicsurveywasdistributedtoaconveniencesampleofundergraduatestudents,doctoralstudents,anddoctoralalumniatamid-AtlanticuniversityduringMarchandApril2014.
UndergraduatestudentsinthesamplewereselectedfromcoursesectionsintheComputerInformationSystemsdepartmentthatwererequiredaspartoftheuniversitycoreorwereelectivesknowntobetakenoftenbynon-majorsaswellasmajorswithinthedepartment.
Theseselectionsweremadetoattempttocaptureacross-sectionofstudentsfromvariousfieldsofstudywithintheuniversitywithintheconveniencesample.
Doctoralstudentsanddoctoralalumnioftheuniversitywerealsoincludedinthesample,astheseindividualsareadiversegroupintermsofage,ethnicity,location,occupationalaffiliations.
Again,theseparticipantswereselectedpurposefullyinordertocaptureacross-sectionofindividualsfromavarietyofindustriesandbackgrounds.
Asthisresearchisexploratoryinnature,andveryfewpreviousstudiesaddressingmobilemalwareandsecurityawarenesswerefound,theresearcherswishedtoincludeasmuchdiversityinthesampleaspossible.
Thesurveywasadministeredto138undergraduatesand76doctoralstudentandalumni.
Participantswerefirstaskediftheyownedasmartphoneortablet.
Anyparticipantswhodidnotownasmartphoneortabletexitedthesurvey,andtheseresponseswerediscarded.
Afterparticipantswithoutamobiledevicewereremovedfromthedataset,therewere114undergraduateand73doctoralstudentandalumniresponses,foratotalof187participants.
Priortosurveyadministration,apilottestwasconductedwith61adultparticipantstotestthevalidityandreliabilityofthesurveyquestions.
Thesurveyquestionnaireconsistedofavarietyofquestionsrelatingtomobilesecurityprotectionmeasures.
Participantswerefirstaskedsomebasicdemographicquestionsincludingage,gender,andoccupationalaffiliation.
Next,participantswereaskedaboutthetypesofsmartphonesandtabletsthattheyown,includingdeviceplatformssuchasiOS,Android,BlackBerry,WindowsPhone,SymbianandOtherforsmartphonesandiOS,Android,KindleandOtherfortablets.
Then,participantswereaskedabouttheirhabitsregardingthedownloadingofmobileapps,includingwhethertheyhadeverdownloadedanapp,howoftentheydownloadfreeandpaidapps,andhowoftentheydownloadfinancial,health-related,socialmedia,andproductivityapps.
Thesefourcategoriesofappswerechosenbecauseofthesensitivenatureofthedatathatistypicallystoredinthesetypesofapps.
Thenextsetofquestionswastargetedtowardunderstandingtheparticipants'usagehabitsregardingseveralmobilesecurityriskfactorsidentifiedfromtheliterature.
Participantswereaskediftheytypicallyreadreviewsbeforedownloadingapps,whichcanbeasignificantdeterrenttodownloadingmaliciousapps[4].
Theywerealsoaskediftheyhadeverusedananti-virusoranti-malwareappontheirdevice,whichcanworkmuchliketheirdesktopcomputercounterpartstoscanforvirusesandmalware[12].
NexttheywereaskediftheytypicallyleaveBluetooth"on"ontheirmobiledevice,iftheirdeviceissettoautomaticallyconnecttoWi-FinetworksandhowoftentheyconnecttopublicWi-Fihotspots,allofwhichareriskfactorsforhijackingandman-in-the-middleattacks[2,3,16,18].
Nextthequestionnairecoveredsecuritymeasuresforprotectingagainstunauthorizedphysicaldeviceaccess,damageorloss.
Participantswereaskediftheirdeviceislockedwithapassword,PINorfingerprintandalsoaboutthefrequencywithwhichtheybackupdatafromtheirdevice.
Physicallocksandbackupsareimportantsecuritymeasures,asthemostcommonmethodofinformationtheftfromamobiledeviceinvolvesphysicaltheftofthedevice[17].
Carewastakenthatsomeofthequestionswerenegativelywordedwhileotherswerenot,soastonotskewtheresults.
Forinstance,onequestionwasworded"Doyoutypicallyreadreviewsorotherwiseresearchamobileappbeforedownloadingandinstallingit"A"Yes"answertothisquestionrevealsthattheuserdoesnothaveariskfactorinthiscategorybecausereadingreviewscanbeasignificantdeterrenttodownloadingmaliciousapps.
Anotherquestionwasworded,"IsyourmobiledevicesettoautomaticallyconnecttoWiFihotspots"A"Yes"answertothisquestionrevealsthattheuserdoeshaveariskfactorashisorherdevicecouldautoconnecttounsecuredWi-Finetworks.
Thenextsetofquestionswasfocusedonparticipants'awarenessofmobilesecurityriskfactors.
Participantswereaskediftheyhadeverexperiencedavirusormalwareontheirmobiledevice,andalsowhethertheywereconcernedaboutvirusesormalwareinregardtotheirmobiledevice.
Lastly,severalquestionsrelatingtoinformationprivacyconcernswereasked,butnotutilizedforthisstudy.
IssuesinInformationSystemsVolume15,IssueII,pp.
116-123,2014120FINDINGSOfthe187participants,66%weremaleand34%werefemale.
Theagerangeofparticipantsspannedfrom18to72,withameanof32.
Thelargestagegrouprepresentedincluded18-20year-olds,at31%ofthesample.
Participantsaged21-30madeup25%ofthesample,thoseaged31-40madeup11%,thoseaged41-50madeup18%,thoseaged51-60madeup10%,andtheremaining5%includedparticipantsaged61-72.
Theslightskewtowardtheyoungerendoftheagespectrumcanbelargelyattributedtothe114undergraduatesincludedinthesample.
Intermsofoccupationalaffiliation,36%ofparticipantsworkedinindustry(forprofit),3%workedforanon-profitorganization,10%workedforgovernment(local,stateorfederal),4%workedinhealthcare,30%workedineducation,and17%indicated"other.
"Nearlyalloftheresponsesinthe"other"categorycamefromundergraduatesandcanperhapsbeattributedtothefactthatmanyundergraduateswerenotworkingwhileattendingschool.
Inretrospect,a"notapplicable"categorywouldhavebeenusefultoaddtothisquestion.
Allparticipantswhowerekeptinthedatasetownedatleastonemobiledevice.
Amajorityoftheparticipants,94%ownedasmartphoneand63%ownedatablet.
Nearlyalloftheparticipants,96%,haddownloadedamobileapptotheirdevice.
Ofthosewhohaddownloadedamobileapp,themajoritytendedtodownloadfreeappsmorefrequentlythanpaidapps.
Morethanhalf,53%,downloadedfreeappsfrequentlyorveryfrequently,40%occasionally,6%rarely,and1%never.
Only7%downloadedpaidappsfrequentlyorveryfrequently,19%occasionally,43%rarely,and31%neverdownloadedapaidapp.
Regardingtypesofappsdownloaded,participantswhohaddownloadedanappwereaskedhowoftentheydownloadedfinancial,health-related,socialmedia,andproductivityapps,sincethesecategoriesofappsarethemostlikelytoinvolvetheuseofprivateinformation.
Forfinancialapps,39%downloadedthemfrequentlyorveryfrequently,17%occasionally,15%rarely,and29%never.
Forhealth-relatedapps,21%downloadedfrequentlyorveryfrequently,28%occasionally,17%rarely,and34%never.
Forsocialmediaapps,71%downloadedfrequentlyorveryfrequently,13%occasionally,10%rarely,and6%never.
Andlastlyforproductivityapps,36%downloadedfrequentlyorveryfrequently,28%occasionally,18%rarely,and18%never.
Participantsweredirectlyaskedwhethertheywereconcernedaboutmobilemalwareinregardtotheirmobiledevices.
Thesamplewasnearlysplitevenly,with46%respondingthattheywereconcerned,50%respondingthattheywerenotconcerned,and4%responding"Idon'tknow,"whichcouldindicatealackofawarenessofthetopic.
Theconcernaboutmobilemalwarewasrelativelyhighgiventhatveryfewoftheparticipants,2%,hadexperiencedmobilemalwareontheirowndevice.
Themajority,88%,indicatedthattheyhadnotexperiencedmobilemalware.
However,10%responded"Idon'tknow"tothisquestion,whichcanbeconstruedasagenerallackofawarenessregardingmobilemalware.
ThesepercentagesaredepictedinFigure1.
Figure1.
Percentageofparticipantswhoexperiencedandareconcernedaboutmobilemalware2%46%88%50%10%4%0%20%40%60%80%100%ExperiencedmobilemalwareConcernedaboutmobilemalwareYesNoIdon'tknowIssuesinInformationSystemsVolume15,IssueII,pp.
116-123,2014121RQ1asked,"Douniversitystudentsandalumnidemonstrateawarenessofmobilemalwareriskfactorsbyusingpreventativesecuritymeasurestomitigatemobilemalwareriskfactorsformobiledevices"Toanswerthisquestion,theresearcherslookedattheresponsestosevenquestionsonthequestionnairethateachdemonstratedariskybehaviorintermsofpreventativemeasuresformitigatingexposuretomobilemalware.
ThesesevenquestionsincludedaskingparticipantshowoftentheyusepublicWi-Fi,whethertheirdeviceissettoautoconnecttoWi-Finetworks,whethertheytypicallyleaveBluetoothconnectivitysettoon,whethertheyreadreviewsbeforedownloadingapps,iftheyhaveeverusedanti-malwareontheirdevice,howoftentheybackupdataontheirdevice,andwhethertheylocktheirdevicewithapassword,PINorfingerprint.
ThemajorityofparticipantsdisplayedriskybehaviorintermsofconnectingtopublicWi-Finetworks,with73%indicatingthattheyconnecttopublicWi-Fioccasionallyormorefrequently,while26%indicatedthattheyrarelyorneverconnecttopublicWi-Fi.
WhenaskediftheirmobiledeviceissettoautomaticallyconnecttoWi-Fihotspots,themajorityofparticipants,70%,displayednon-riskybehaviorbyindicatingthattheydonotallowtheirdevicetoautomaticallyconnecttoWi-Fi.
Oftheparticipantsdisplayingriskybehaviorforthisquestion,26%indicatedthattheydohavethissetting,while4%answered"Idon'tknow.
"Thirty-onepercent(31%)ofparticipantsindicatedthattheydoleaveBluetoothonorthattheydidnotknow,bothindicatingriskybehavior.
Theremaining69%respondedthattheydonotleaveBluetoothon.
Themajorityofparticipants,72%,indicatedthattheydoreadreviewsorotherwiseresearchamobileappbeforedownloadingandinstallingit,displayingnon-riskybehavior.
Theremaining28%didnotreadreviews,thusmakingtheirdevicesmorevulnerabletodownloadingmaliciousapps.
However,mostparticipants,75%,displayedriskybehaviorbyfailingtouseanti-malwaresoftwareorapps.
Sixty-sixpercent(66%)hadneverusedanti-malware,while9%indicatedthattheydidnotknowiftheyhadornot,alsoariskybehaviorindicatingalackofawarenessofanti-malware.
Only25%ofparticipantshadusedanti-malware.
Intermsofphysicalsecuritypreventativemeasures,73%ofparticipantsrespondedthattheybackupdataontheirmobiledevicesoccasionallyormorefrequently,while27%backuprarelyornever.
Themajorityofparticipants,77%,protecttheirdeviceswithapassword,PIN,orfingerprintwhiletheremaining23%donot.
RQ2asked,"Istherearelationshipbetweenconcernaboutmobilemalwareandpreventativesecuritymeasuresusedbyuniversitystudentsandalumni"Toanswerthisquestion,theresearcherscreatedaMobileMalwareRiskFactorIndexbasedonthesevenmobilemalwareriskfactorsquestionsutilizedtoanswerRQ1.
Thedevelopmentofanindexisasupportedwaytomeasureaconstructusinganaccumulationofscoresfromavarietyofrelatedbutindividualitems[1],andisoftendonetotransformdataintoaformthatcanbeusedinotherstatisticalanalyses.
Tobuildtheindex,theresponsetoeachofthesesevenquestionswasscoredone(1)iftheresponseindicatedariskybehaviorincludingusingpublicWi-Fioccasionallyormorefrequently,leavingtheirdevicesettotypicallykeepBluetoothconnectivityon,usingadevicesettingtoallowautoconnectingtoWi-Finetworks,notreadingreviewsorresearchingappsbeforedownloadingthem,notusinganti-malwareontheirdevice,backinguptheirdevicedatararelyornever,ornotlockingtheirdevicewithapassword,PINorfingerprint.
Responsesthatdemonstratednon-riskybehaviors(theoppositesofthosementioned)werescoredazero(0).
ThescoreswerethensummedtobuildaMobileMalwareRiskFactorIndexthatrangedfromzero(theleastrisky)toseven(themostrisky).
Therelationshipbetweenconcernaboutmobilemalwareandmobilemalwareriskfactors(asmeasuredbytheMobileMalwareRiskFactorIndex)wasinvestigatedusingthePearsonproduct-momentcorrelationcoefficient.
Preliminarytestswereperformedtoensurethattheassumptionsofnormality,linearityandhomoscedasticitywerenotviolated.
Therewasasignificant,negativecorrelationbetweenthetwovariableswithasmalleffectsize,r=-.
191,n=177,pkaspersky.
com/bluetooth-security/19.
USCERT.
(2010,April15).
US-CERTTechnicalInformationPaper–TIP-10-105-01.
RetrievedonMay3,2014fromhttps://www.
us-cert.
gov/sites/default/files/publications/TIP10-105-01.
pdf20.
Webroot.
(2013).
MobileThreatsareRealandCostly.
Acommissionedstudy.
RetrievedonApril16,2014fromhttp://www.
webroot.
com/shared/pdf/byod-mobile-security-study.
pdf

百纵科技,美国独立服务器 E52670*1 32G 50M 200G防御 899元/月

百纵科技:美国高防服务器,洛杉矶C3机房 独家接入zenlayer清洗 带金盾硬防,CPU全系列E52670、E52680v3 DDR4内存 三星固态盘阵列!带宽接入了cn2/bgp线路,速度快,无需备案,非常适合国内外用户群体的外贸、搭建网站等用途。C3机房,双程CN2线路,默认200G高防,3+1(高防IP),不限流量,季付送带宽美国洛杉矶C3机房套餐处理器内存硬盘IP数带宽线路防御价格/月套...

GreenCloudVPS$20/年多国机房可选,1核@Ryzen 3950x/1GB内存/30GB NVMe/10Gbps端口月流量2TB

GreencloudVPS此次在四个机房都上线10Gbps大带宽VPS,并且全部采用AMD处理器,其中美国芝加哥机房采用Ryzen 3950x处理器,新加坡、荷兰阿姆斯特丹、美国杰克逊维尔机房采用Ryzen 3960x处理器,全部都是RAID-1 NVMe硬盘、DDR4 2666Mhz内存,GreenCloudVPS本次促销的便宜VPS最低仅需20美元/年,支持支付宝、银联和paypal。Gree...

Virmach$7.2/年,新款月抛vps上线,$3.23/半年,/1核640M内存/10 GB存储/ 1Gbps/1T流量

Virmach自上次推出了短租30天的VPS后,也就是月抛型vps,到期不能续费,直接终止服务。此次又推出为期6个月的月抛VPS,可选圣何塞和水牛城机房,适合短期有需求的用户,有兴趣的可以关注一下。VirMach是一家创办于2014年的美国商家,支持支付宝、PayPal等方式,是一家主营廉价便宜VPS服务器的品牌,隶属于Virtual Machine Solutions LLC旗下!在廉价便宜美国...

kaspersky.com为你推荐
外挂购买自动充值软件.cn域名cn域名和com域名有啥区别?各有啥优点?百度商城百度知道一般一天能挣多少钱?原代码什么是原代码百花百游迎得春来非自足,百花千卉共芬芳什么意思长尾关键词挖掘工具外贸长尾关键词挖掘工具哪个好用336.com求那个网站 你懂得 1552517773@qqpartnersonline国外外贸平台有哪些?www.idanmu.com万通奇迹,www.wcm77.HK 是传销么?www4399com4399是什么网站啊???
域名备案查询 重庆网站空间 美国虚拟主机购买 工信部域名备案 赵容 服务器监测 Updog 服务器硬件防火墙 视频服务器是什么 网购分享 网页加速 成都主机托管 免费稳定空间 vim 遨游论坛 赵荣博客 主机声音大 免费网络电视直播 qq空间登入 宿迁服务器托管 更多