Change search
ReferencesLink to record
Permanent link

Direct link
Information security threats against mobile phone services (developer's perspective)
2009 (English)Independent thesis Advanced level (degree of Master (One Year)), 10 credits / 15 HE creditsStudent thesis
Abstract [en]

In this study, we have discussed the security of mobile phone services against information security threats during development process. The use of internet has increased on the mobile phones which makes the mobile phone and its services open for threats. These services are being attacked by different malicious software, or attackers. In our study, we have discussed how developers can secure mobile phone services against potential security threats and also we studied the vulnerabilities developers left during the development process. To achieve the goal of improving security in development process, we have discussed four major factors, development methodologies, IS awareness in developing process, vulnerability methodology and IS awareness training for developers. The awareness and training program helps to make changes in developers’ attitude, and also enforce them to consider and involve IS during development process. Further, the vulnerability methodology helps them to find flaws in services and secure it from attacks. Developer’s training and awareness program ends up with development of secure mobile phone services. Qualitative research approach with case study is being used as strategy. While data is collected with in-depth interviews. Before reading this thesis, a person should have background knowledge in the field of telecommunication because some part of this thesis contains some technical terms related to this field.

Place, publisher, year, edition, pages
Keyword [en]
Social Behaviour Law, Information security threats, mobile phones, services, developer's perspective, software development, process, vulnerability methodology, attitude system, IS, awareness, training, improve security, confidentiality, integrity, availability, CIA, cellular phones, malicious, software, viruses, worms, Trojan Horse, Mumtaz, Maqsood, Ali Faiz
Keyword [sv]
Samhälls-, beteendevetenskap, juridik
URN: urn:nbn:se:ltu:diva-42677ISRN: LTU-PB-EX--09/046--SELocal ID: 0a719e83-c82d-40e7-aa45-206aff241a70OAI: diva2:1015901
Subject / course
Student thesis, at least 15 credits
Educational program
Computer and Information Systems Science, master's level
Validerat; 20101217 (root)Available from: 2016-10-04 Created: 2016-10-04Bibliographically approved

Open Access in DiVA

fulltext(603 kB)0 downloads
File information
File name FULLTEXT01.pdfFile size 603 kBChecksum SHA-512
Type fulltextMimetype application/pdf

Search outside of DiVA

GoogleGoogle Scholar
The number of downloads is the sum of all downloads of full texts. It may include eg previous versions that are now no longer available

ReferencesLink to record
Permanent link

Direct link