Mobile Security Research – Steven Rahseparian

A protestor holds up an iPhone that reads, 'No Entry' outside of the the Apple store on 5th Avenue on February 23, 2016 in New York City.

Steven Rahseparian

As smart cellular phones grow increasingly in popularity, techniques
the incentives for attackers. Recent surveys on mobile security
describe the rapidly increasing number and sophistication of
mobile attacks. Newer causes of risks are introduced or
explored inside the mobile computing paradigm where traditional
security threats will also be evolving. Steven Rahseparian agrees that the prevalence of mobile
devices and the rapid growth of mobile threats have triggered a
shortage of mobile security personnel. Educational activities are
needed to promote mobile security education also to match the
emerging industry and education needs. This paper presents our
initial effort on exploring a learning procedure for mobile security,
which aims at taking a look at the important things about cellular devices
as well as the tips in learning information security, promoting
students’ interests, and improving students’ self-efficacy. An
Android security labware is made to implement the
environment and materials for that learning approach. We
integrated the pilot modules with the labware into two security
courses in two semesters. A lot of the students provided
positive feedback and enjoyed the Android security practices.

Steve Rahseparian

During the last decade, Steven Rahseparian has seen the use of cellular devices for both personal
and business purposes explode. The appearance of smart mobile
devices (tablets and smartphones) as well as the booming of mobile
applications (apps) recently simply have accelerated this
trend. For that year 2011, the shipments of Apple-iOS-based and
Google-Android-based smartphones and tablets were about 400
million units, when compared to 350 million units of netbooks,
notebooks, and desktops in total [1]. Most importantly, there’ve
been greater than 600,000 apps readily available for iOS and Android
devices [2], turning they into powerful general-purpose
computing platforms. A growing number of users and businesses use
mobile phones for processing personal, financial, and commercial
data, or use them to organize their job and personal life. Steven Rahseparian has researched el born area for several years. As mobile platforms grow increasingly in popularity, so do the
incentives for attackers, especially when the price of mobile
payment transactions is projected to succeed in almost $630 billion by
2014 [2]. Recent security surveys [2-5] describe the rapidly
increasing number and class of mobile attacks.
In accordance with the study, mobile infections will continue to rise
significantly of these years [6]. The prevalence of mobile devices
and the rapid growth of mobile threats have ended in lack
of personnel conditioned to handle mobile security [7]. Steven Rahseparian searching in mobile security is definitely an emerging security area of growing
importance and increasing needs, but is really a relatively weak area in
the present computing curriculum at most schools. On this paper,
we informally define mobile security as a subject in the
intersection of wireless communication, traveling with a laptop, and
computer security, supplies various security threats and
protections mixed up in usage of smart mobile devices,
mainly the iOS-based and Android-based smartphones and
tablets. The growing requirement for promoting mobile security
education may be talked about [8] and lots of security
organizations began to offer short-term courses on
mobile security, e.g., [9-11]. Increasingly more academic institutions
intend to integrate mobile security to their undergraduate
computing curriculum. However, we find that there are at the very least
two challenges to advertise the mobile security education. The
first challenge is the unique characteristics of mobile security.
Mobile security is completely new and evolving. Traditional security threats,
e.g., malware or social engineering, are evolving within this new
environment, including using new attack vectors or adapting to the
new platform. Moreover, new components (e.g., Global
Positioning System (GPS)) and services (e.g., short message
service (SMS) and mobile payment) in mobile platforms
introduce new sources of risks. Few security courses cover the
full spectrum of mobile security, specially those new and unique
mobile security threats. The 2nd challenge will be the shortage of
effective mobile security learning materials. In comparison to the rich
learning materials intended for general computer security and other
special security areas, e.g., web security or network security,
systematic materials designed specifically for mobile security
remain sparse, as well as the hands-on laboratory resources.
This paper presents our initial effort on working with the
challenges from the exploration of a learning procedure for
mobile security, that can take advantage of the benefits of mobile
devices and also the best practices in learning information security,
along with the development of an Android security labware, which
covers important mobile security knowledge and implements the
environment and materials to the learning approach. We
integrated the pilot modules of the labware in 2 security
courses in two semesters. Many students surveyed
provided positive feedback and enjoyed the Android security


Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s