Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Information security threats against mobile phone services (developer's perspective)
2009 (English)Independent thesis Advanced level (degree of Master (One Year)), 10 credits / 15 HE creditsStudent thesis
Abstract [en]

In this study, we have discussed the security of mobile phone services against information security threats during development process. The use of internet has increased on the mobile phones which makes the mobile phone and its services open for threats. These services are being attacked by different malicious software, or attackers. In our study, we have discussed how developers can secure mobile phone services against potential security threats and also we studied the vulnerabilities developers left during the development process. To achieve the goal of improving security in development process, we have discussed four major factors, development methodologies, IS awareness in developing process, vulnerability methodology and IS awareness training for developers. The awareness and training program helps to make changes in developers’ attitude, and also enforce them to consider and involve IS during development process. Further, the vulnerability methodology helps them to find flaws in services and secure it from attacks. Developer’s training and awareness program ends up with development of secure mobile phone services. Qualitative research approach with case study is being used as strategy. While data is collected with in-depth interviews. Before reading this thesis, a person should have background knowledge in the field of telecommunication because some part of this thesis contains some technical terms related to this field.

Place, publisher, year, edition, pages
2009.
Keyword [en]
Social Behaviour Law, Information security threats, mobile phones, services, developer's perspective, software development, process, vulnerability methodology, attitude system, IS, awareness, training, improve security, confidentiality, integrity, availability, CIA, cellular phones, malicious, software, viruses, worms, Trojan Horse, Mumtaz, Maqsood, Ali Faiz
Keyword [sv]
Samhälls-, beteendevetenskap, juridik
Identifiers
URN: urn:nbn:se:ltu:diva-42677ISRN: LTU-PB-EX--09/046--SELocal ID: 0a719e83-c82d-40e7-aa45-206aff241a70OAI: oai:DiVA.org:ltu-42677DiVA: diva2:1015901
Subject / course
Student thesis, at least 15 credits
Educational program
Computer and Information Systems Science, master's level
Supervisors
Examiners
Note
Validerat; 20101217 (root)Available from: 2016-10-04 Created: 2016-10-04Bibliographically approved

Open Access in DiVA

fulltext(603 kB)30 downloads
File information
File name FULLTEXT01.pdfFile size 603 kBChecksum SHA-512
ea2418c5785a7af74dfbbfc6f70bd81e96faf3c48f2ce9b10a9eed91962152fa3439ac17f55775148cb558f1095f01c6004a80ce731f9fad71a7ea1d6e442361
Type fulltextMimetype application/pdf

Search outside of DiVA

GoogleGoogle Scholar
Total: 30 downloads
The number of downloads is the sum of all downloads of full texts. It may include eg previous versions that are now no longer available

Total: 30 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf