Fig 1 - uploaded by Nuno Mateus-Coelho
Content may be subject to copyright.
Smartphone OS market share (source: https://www.idc.com).

Smartphone OS market share (source: https://www.idc.com).

Source publication
Conference Paper
Full-text available
Mobile systems abled a way to shorten the distance between Men. With this panorama also came cybercrime, terrorism and other phenomena of a moving society fully globalized, where the land borders are of little importance in the task of limiting the active agents, harmful or not, to these systems. Recently the world discovered by media and scientifi...

Contexts in source publication

Context 1
... highlight the wide range of devices that use this system, this document will only address the smartphone, as it is the mobile device most produced and used by the entire world population. Android is the most widely used operating system on smartphones, as evidenced by the latest data, as illustrated by the graph of Figure 1, prepared by analyst firm IDC (https://www.idc.com). ...
Context 2
... highlight the wide range of devices that use this system, this document will only address the smartphone, as it is the mobile device most produced and used by the entire world population. Android is the most widely used operating system on smartphones, as evidenced by the latest data, as illustrated by the graph of Figure 1, prepared by analyst firm IDC (https://www.idc.com). ...

Similar publications

Article
Full-text available
Introduction: Healthcare organizations maintain patient sensitive data that requires to comply with privacy and security laws. At the same time should provide a system with ease of access. Objective: The main purpose of this research is to develop a mobile application that can manage, and control patients flow at the healthcare by allowing the doct...

Citations

... Moving up Tiers should only be done when it is both cost-effective and beneficial to cybersecurity, according to the National Institute of Standards and Technology (NIST). Upgrading a Tier 3 organization to a Tier 4 organization may not be cost-effective if the additional protection it receives is insignificant in comparison to the cost of achieving that additional level [38] [40] [41]. ...
Article
Full-text available
Security Operation Centers (SOCs) are a crucial service for enterprises looking to face the new global insecure environment, as well as retain compliance and control over threat management. While there are frameworks in place to address the technical aspects of these services, there is currently no comprehensive framework in place to address how to correctly identify whether a threat is real, a false positive, or even a false negative, without relying on artificial intelligence, which has unfortunately already misled several activities in the face of new threats. It would also be advantageous for businesses and constituents to consider using a static framework that might, among other things, clarify the CyberSoc analyst in the event of a misunderstanding. The results of a systematic review were presented in this research in order to comprehend the current state of the art for CyberSoc Frameworks.
... Most importantly, AI systems can pose a potential threat to humans, in particular when using AI in robots [23], [24]. They can generate actions autonomously without manual intervention and can break away from human control due to self-learning capabilities [24], [25], [26]. ...
Article
Full-text available
The present study is based on the analysis of the concepts of Cybersecurity and Artificial Intelligence, focusing on how both relate to each other. The COVID-19 pandemic and the fact that the world was forced into confinement had a huge impact on the increase of cyber-attacks and the birth of new threats. Currently, Cybersecurity is becoming an extremely complicated task, as we can no longer think of blocking an attack only by resorting to humans. The advanced and automated ways in which attacks have been developing mean that the task of defence must also be automated. Artificial Intelligence, due to its particularities, meets this need. This technology has been playing an increasingly important role in Cybersecurity, even though we may still consider it to be at an early stage.
... So, in a short sentence, Serverless is ideally the abstraction of all servers away, which means currently "something" as a service [3]. With a very confusing origin from the early 10's of the current century [4], Serverless architecture, Serverless computing, or Function as a Service (FaaS) are a category of cloud computing services that provides a platform or service, allowing customers to develop, run, manage application functionalities without the complexity of building and maintaining the infrastructure typically associated with developing and launching of a technology product such as an application, website or even a function that will provide a solution when invoked remotely over the web, network or a wireless signal [5,6,7]. Despite the name, servers still exist on this type of architecture, but it means the backend infrastructure is maintained by a third-party provider, and the functionality needed is offered as a service, e.g., database, storage, API. ...
... Scholars can easily prove that mobile applications have a higher impact these days, but there is no need to read this work to learn or know this. Currently, over 4 million applications are vying for the user's attention and replacing the PC in leisure moments [7]. This means that literally, in everybody's pocket lives a gold mine to be mined. ...
... It's most likely the future of high-demand application development (not all but a considerable part). Security is, at this time, not enough to state that Serverless solves all problems and can be used without risks [7]. Above all, a great deal of work needs to be done, and scholars should clear the current panorama of work done, as it mainly relies on a commercial point of view, and most of it is connected to a vendor example. ...
... So, we see an increase, not in attempts to corrupt systems, but in people. These more fragile and susceptible to attacks, as they are not governed by static content or inflexible programming, can be persuaded, coerced, or deceived into providing access to the target information that the attacker wants to access, using apparently normal email or browsing the Internet on a personal smartphone [13] for example. ...
Article
Full-text available
In this paper, there are two questions that we seek to answer, what are the tools used in the industry nowadays regarding its cybersecurity? How is cybersecurity being approached and dealt with by the companies and their greatest difficulties? Along the way it’s observed how the entire interaction with clients is made as also how the investigation on possible threats is conducted and handled, passing through how to detect, analyze and interact with the client team in the mitigation of it, this taking into consideration their infrastructure and capabilities. This paper is taken from the point of view of a junior utilizing free tools to analyze threats and dealing with attempts of infiltrating the network utilizing social engineering tactics as well as more technical skills.
... Maintained and managed by cybersecurity experts, Kali Linux is optimized for penetration testing. But beyond the legal framework, hackers don't care about this framework, so Kali Linux can be considered as a weapon for the network, which, according to those who use it, can mean financial cost [20], [23]. Kali is a specialized Linux distribution for experienced Linux users who need an offensive and secure penetration testing Advanced Research on Information Systems Security, an International Journal (ARIS 2 ) (2022) Volume 1,No 1, 59 platform. ...
Article
Full-text available
Today cybercrime is at a record high, costing businesses and individuals billions of dollars every year. What is even more frightening is that this figure represents just the last five years with no hope of it ever ending. The evolution of technology and the increasing accessibility of smart technologies means that there are many access points to users' homes to exploit. Cybercrime is on the rise in the world of technology today. Criminals using the technologies of the World Wide Web exploit the personal information of Internet users to their advantage. They happily use the dark web to buy and sell illegal products and services. They even manage to gain access to classified government information. While law enforcement tries to address the growing problem, the number of criminals continues to grow, taking advantage of the anonymity of the Internet.
... In the current era, we have achieved the peak of the communication technologies through Internet, which has been considered one of the biggest social and technological achievement after the invention of the wheel and the control of fire [3], [28], offering to the world we know, one of the best forms of communications between technological devices. ...
... Discreetly these equipment sense, process and collect sensitive user information in a continuous manner [17], [28]. ...
... With a Proxy Socks5 and IPTABLES configuration, all traffic is redirect from the layered communications environment, through the internal firewall onto TOR, I2P or proprietary private internet relay system, maintaining secret the physical MAC Address of the network card, the IP, DNS details and other information that might lead to the discovery of the virtual or physical location of a given user [28]. Furthermore, this methodology uses a triple TOR circuit to promote an untraceable location of the user, bypassing modern constrains from IDS/IPS and Firewall systems every 60 seconds [30]. ...
Article
Full-text available
Throughout human evolution, communication has always played a central role in favor of the development and approximation of the species. Within this project, the main objective is to analyze different wearable devices (more specifically fitness tracking devices) with the intention of presenting the strengths and weaknesses related to the security and privacy frameworks that these devices make use of. To reach these objectives some devices will be acquired for testing, starting from the earliest point of the communication (Bluetooth connection) until the latter states (communications through the Internet). “Paranoid” operating systems and methodologies have been developed and studied over the years, both for mobile and desktop systems in order to maintain the security and anonymity of their users, and although related studies have been in existence for some time, this proposal aims to develop an answer to a theme not very distinct, but more specific and modern “Paranoid OS: Wearable Trackers”. It is with this purpose in mind that the path taken by this technology will be presented in this document, considering what are the communication protocols, what data goes through these communication channels and finally where is the user’s data.
... Research into novel operating systems will also grow as data security and consumer data privacy interest grow. New research prototyping novel operating systems designed to secure user data are already being published to create secure mobile platforms, sometimes called "paranoid", as part of their core system design [18]. These new paranoid OSes will pose further challenges to investigators and will also need further study in the future. ...
Article
Full-text available
New smartphones made by small companies enter the technology market everyday. These new devices introduce new challenges for mobile forensic investigators as these devices end up becoming pertinent evidence during an investigation. One such device is the PinePhone from Pine Microsystems (Pine64). These new devices are sometimes also shipped with OSes that are developed by open source communities and are otherwise never seen by investigators. Ubuntu Touch is one of these OSes and is currently being developed for deployment on the PinePhone. There is little research behind both the device and OS on what methodology an investigator should follow to reliably and accurately extract data. This results in potentially flawed methodologies being used before any testing can occur and contributes to the backlog of devices that need to be processed. Therefore, in this paper, the first forensic analysis of the PinePhone device with Ubuntu Touch OS is performed using Autopsy, an open source tool, to establish a framework that can be used to examine and analyze devices running the Ubuntu Touch OS. The findings include analysis of artifacts that could impact user privacy and data security, organization structure of file storage, app storage, OS, etc. Moreover, locations within the device that stores call logs, SMS messages, images, and videos are reported. Interesting findings include forensic artifacts, which could be useful to investigators in understanding user activity and attribution. This research will provide a roadmap to the digital forensic investigators to efficiently and effectively conduct their investigations where they have Ubuntu Touch OS and/or PinePhone as the evidence source.
... With the passing of the times this science grew in importance that is now mandatory everywhere, and there is the actual need of having a system that implements it in an abstract way, hence most developer don't possess cryptography full knowledge. The realization of this project was a great challenge, because the area of cryptography is very extensive and quite rigorous, as it is not at all acceptable to have flaws, there was a large study in the area that helped in the perception of many concepts that helped in the choices made for the realization of the project successfully [20]. ...
Article
Full-text available
Edge Computing, also known as the IoT ecosystem, has recently become a cornerstone of computational evolution. Most recently, challenges emerged in the act of protecting such technology, hence it became increasingly popular in recent years, and with this growth, safety concerns increased due the recent growing number of hacking events. Recent challenges rely in the IoT technologies e.g., virtual interfaces, to deliver solutions to end point terminals and securing this relation is significantly important hence these terminals are commonly in the end user pocket, where other personal information is also present. There are several tools available for developers to protect data, comprising international mandatory rules for security has there is common sense to do it. The purpose of this project was to create one specific and unique framework where the developer has no need to possess knowledge in the subject of cryptography, to be able to perform security operations on files with data encrypted.
... With the passing of the times this science grew in importance that is now mandatory everywhere, and there is the actual need of having a system that implements it in an abstract way, hence most developer don't possess cryptography full knowledge. The realization of this project was a great challenge, because the area of cryptography is very extensive and quite rigorous, as it is not at all acceptable to have flaws, there was a large study in the area that helped in the perception of many concepts that helped in the choices made for the realization of the project successfully [20]. ...
Conference Paper
Full-text available
Edge Computing, also known as the IoT ecosystem, has recently become a cornerstone of computational evolution. Most recently, challenges emerged in the act of protecting such technology, hence it became increasingly popular in recent years, and with this growth, safety concerns increased due the recent growing number of hacking events. Recent challenges rely in the IoT technologies e.g., virtual interfaces, to deliver solutions to end point terminals and securing this relation is significantly important hence these terminals are commonly in the end user pocket, where other personal information is also present. There are several tools available for developers to protect data, comprising international mandatory rules for security has there is common sense to do it. The purpose of this project was to create one specific and unique framework where the developer has no need to possess knowledge in the subject of cryptography, to be able to perform security operations on files with data encrypted.
... The authors identified how to overcome major technical barriers imposed by Internet service providers around the world, by analysing how to access the deep web proxy system. The end result of the analysis of these systems is the creation of a methodology with a set of ground rules and mechanisms applicable to any type operating system, capable of deployment in a desktop, server or mobile device, replicating the same security principals, thus demonstrating that the methodology is practical and executable in different environments, running from the memory, hard drive or as a paranoid mode in an operating system, equal to a debug or safe mode thus obtaining a consolidated answer to the questions and challenges that impose insecurity, while using common operating systems [38]. In this research, two prototypes were developed, one as Live Image (virtual operating system that works from the memory of its host), and the other, the one that will serve as an example for an installation scenario; a mobile distribution that will be used to prove that the methodology is cross platform and usable in an installed environment. ...
Conference Paper
Full-text available
It has recently been discovered that large companies and nations "observe" their customers and citizens, disregarding any remaining moral and technological lines, being able to listen to telephone conversations and monitoring communications, through powerful monitoring and surveillance programs. Elsewhere on the planet, nations in turmoil or wrapped in a cloak of censorship persecute their citizens, controlling them by denying them access to the free Web without the threat of repercussions that threatens their dignity. To support the present research, an analysis of platforms that allow anonymous and secure browsing and a study of technologies and programs with potential privacy breach and computer intrusion were performed. The main objective of this work was to analyse the computer monitoring and surveillance technologies, identifying the available tools, trying to find potential solutions, developing and providing a methodology that enhances any desktop, server or mobile operating system, with characteristics that combat the exposed in this summary.