A Risk Assessment Method for Smartphones
نویسندگان
چکیده
Smartphones are multi-purpose ubiquitous devices, which face both, smartphone-specific and typical security threats. This paper describes a method for risk assessment that is tailored for smartphones. The method does not treat this kind of device as a single entity. Instead, it identifies smartphone assets and provides a detailed list of specific applicable threats. For threats that use application permissions as the attack vector, risk triplets are facilitated. The triplets associate assets to threats and permission combinations. Then, risk is assessed as a combination of asset impact and threat likelihood. The method utilizes user input, with respect to impact valuation, coupled with statistics for threat likelihood calculation. Finally, the paper provides a case study, which demonstrates the risk assessment method in the Android platform.
منابع مشابه
The use of smartphones in clinical practice.
The use of smartphones and applications or 'apps' in clinical practice among nurses and doctors is on the increase. This article discusses the results of a survey undertaken as part of a service improvement project to develop an 'app' for use by junior doctors. The survey asked nurses and doctors to share information about how they used their smartphones at work, what they used them for and how...
متن کاملDetermining Optimal Risk Assessment Model in Construction Projects (Case study: steel plant construction project)
Introduction: Identifying occupational hazards and managing occupational safety and health risks is the most important mission and responsibility of the health and safety management system in organizations and adopting coded plans to achieve this is the key to continuously improving this system and promoting it. Method: This descriptive-analytic research has been written to determine the optim...
متن کاملImplementation Procedures for the Risk in Early Design (RED) Method
Risk assessments performed at the conceptual design phase of a product may offer the greatest opportunity to increase product safety and reliability at the least cost. This is an especially difficult proposition, however, as often the product has not assumed a physical form at this early design stage. This paper introduces the Risk in Early Design (RED) method, a method for performing risk asse...
متن کاملWomen with hereditary breast cancer predispositions should avoid using their smartphones, tablets and laptops at night
Breast cancer is the most common malignancy among women, both in the developed and developing countries. Women with mutations in the BRCA1 and BRCA2 genes have an increased risk of breast and ovarian cancers. Recent studies show that short-wavelength visible light disturb the secretion of melatonin and causes circadian rhythm disruption. We have previously studied the health effects of exposure...
متن کاملFuzzy Risk Assessment Model of Environmentally Triggered Illnesses Occurrence
The article deals with the risk assessment model of environmental illnesses every person comes across. It is suggested to compare ecological information with the dynamics of individual’s regulatory systems functional state. The fuzzy risk assessment model of environmentally triggered illnesses occurrence is presented. This fuzzy model is used in the system of urban air environment ecological mo...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2012