Publication:
Mobil Cihazlarda Güvenlik Tehditler Temel Stratejiler

dc.contributorFen Edebiyat Fakültesi / Faculty of Letters and Sciences Matematik - Bilgisayar / Mathematics and Computer Sciencetr_TR
dc.contributor.authorZaim, Abdül Halim
dc.contributor.authorAKBULUT, AKHAN
dc.contributor.authorBAYDOĞMUŞ, GÖZDE KARATAŞ
dc.contributor.authorID110942tr_TR
dc.contributor.authorID116056tr_TR
dc.date.accessioned2018-09-06T14:08:31Z
dc.date.available2018-09-06T14:08:31Z
dc.date.issued2016-09-30
dc.description.abstractThe most common form of today’s consumer electronics is the use of mobile devices. The technological developments in this area are increasing in such a way as to affect all aspects of our lives and give direction to our life. The use of mobile devices, which can now have the same hardware features as computers, is not only for communication but also enriched by applications in the areas of internet use, business, hobby and health. Increased usage rate and the need for information and communication security are beginning to be needed and it is necessary to ensure the security of the information carried against the attacks against these devices. Due to security vulnerabilities in mobile devices and malicious software loaded applications by end users, there are situations that threaten personal information and communication security. This study describes security vulnerabilities, attacks in mobile applications and precautions for those problems. It summarizes not only the end-user's recommendations, but also the points to note for app developers. It is evaluated that end users can increase personal security by learning basic info for attack methods of mobile systems.tr_TR
dc.description.abstractThe most common form of today’s consumer electronics is the use of mobile devices. The technological developments in this area are increasing in such a way as to affect all aspects of our lives and give direction to our life. The use of mobile devices, which can now have the same hardware features as computers, is not only for communication but also enriched by applications in the areas of internet use, business, hobby and health. Increased usage rate and the need for information and communication security are beginning to be needed and it is necessary to ensure the security of the information carried against the attacks against these devices. Due to security vulnerabilities in mobile devices and malicious software loaded applications by end users, there are situations that threaten personal information and communication security. This study describes security vulnerabilities, attacks in mobile applications and precautions for those problems. It summarizes not only the end-user's recommendations, but also the points to note for app developers. It is evaluated that end users can increase personal security by learning basic info for attack methods of mobile systems.
dc.identifier.urihttps://hdl.handle.net/11413/2695
dc.language.isotrtr_TR
dc.publisherIstanbul Commerce Universitytr_TR
dc.relationİstanbul Ticaret Üniversitesi Fen Bilimleri Dergisitr_TR
dc.subjectMobil güvenliktr_TR
dc.subjectmobil testlertr_TR
dc.subjectAndroidtr_TR
dc.subjectiOStr_TR
dc.subjectsaldırı yöntemleritr_TR
dc.subjectMobile security
dc.subjectmobile tests
dc.subjectAndroid
dc.subjectiOS
dc.subjectmobile attacks
dc.titleMobil Cihazlarda Güvenlik Tehditler Temel Stratejilertr_TR
dc.titleSecurity in Mobile Devices - Threats and Basic Strategies
dc.typeArticletr_TR
dspace.entity.typePublication
relation.isAuthorOfPublication6ee0b32b-faed-495d-ac4d-8a263d1ff889
relation.isAuthorOfPublication4e820274-4a42-44ba-aced-ca58912c0424
relation.isAuthorOfPublication.latestForDiscovery6ee0b32b-faed-495d-ac4d-8a263d1ff889

Files

Original bundle

Now showing 1 - 1 of 1
No Thumbnail Available
Name:
Mobil Cihazlarda Güvenlik Tehditler Temel Stratejiler..pdf
Size:
576.82 KB
Format:
Adobe Portable Document Format
Description:

License bundle

Now showing 1 - 1 of 1
No Thumbnail Available
Name:
license.txt
Size:
1.71 KB
Format:
Item-specific license agreed upon to submission
Description: