Abstrakt

Protection of Smartphone, Personal Computer and Other Similar Devices from Virus Infections

Sudhakar Singh, P.K. Khare, J.M. Keller, P. Mor, M.K. Pathak

The smartphones are particularly vulnerable to viruses due to their versatile communication capabilities and intermittent network connectivity. As a result, the viruses can easily spread out and cripple both the smartphone users and the cellular and telephony infrastructures. Once malware enter to the system they start to find the vulnerabilities within the operating system then perform unintended operation in the system. Most of the malwares basically attack on performance of the system, data integrity and privacy. They also play the major role in denial of service attack. These malware are also capable to infect other executable files and data. Malwares depending on their behaviour collect the information about host and harm the host computer without consent of the owner. Generally a computer virus causes damage to the host machine. The damage can be done to a number of different components of the computers operating and file system. These include system sectors, files, macros, companion files and source code. The always connected world of internet is a soft target for viruses. Viruses use internet connectivity to spread across the world faster and create havoc. Smartphones have recently become increasingly popular because they provide all in one convenience by integrating traditional mobile phones with handheld computing devices. However, the exibility of running third party softwares also leaves the smartphones open to malicious viruses. In fact, more than hundreds of smartphone viruses have emerged in the past few years, which can quickly spread through various means such as SMS/MMS, Bluetooth and traditional IP based applications. Therefore, protection of smartphone, user computer or an organization computer network from viruses is very important task.

Haftungsausschluss: Dieser Abstract wurde mit Hilfe von Künstlicher Intelligenz übersetzt und wurde noch nicht überprüft oder verifiziert