Contemporary Research on Identity Theft Techniques used on Smart Devices
Identifikátory výsledku
Kód výsledku v IS VaVaI
<a href="https://www.isvavai.cz/riv?ss=detail&h=RIV%2F70883521%3A28140%2F16%3A43875195" target="_blank" >RIV/70883521:28140/16:43875195 - isvavai.cz</a>
Výsledek na webu
—
DOI - Digital Object Identifier
—
Alternativní jazyky
Jazyk výsledku
angličtina
Název v původním jazyce
Contemporary Research on Identity Theft Techniques used on Smart Devices
Popis výsledku v původním jazyce
This paper provides a brief introduction concerning trends in modern security threats using online identities. The paper deals with two major modern-day facts: the first fact is the increasing number of active online smart devices; the second fact deals with economic impacts of identity theft, as shown in long- term studies. Many users save online identities in their smart devices. These devices provide improvements and simplify online activities, but very personal information is necessary to operate some types of online identities, which are then reconstructed from online profiles. Smart devices become the user's online identity, which is necessary to protect. However, smart devices provide only very basic and limited protection functions. If there is no security toolkit installed, it is very difficult to protect a user's online identity and identity theft operations become easier. The attacker only needs access to the victim's smart device. This paper shows techniques for infiltrating a victim's smart device and for stealing private data.
Název v anglickém jazyce
Contemporary Research on Identity Theft Techniques used on Smart Devices
Popis výsledku anglicky
This paper provides a brief introduction concerning trends in modern security threats using online identities. The paper deals with two major modern-day facts: the first fact is the increasing number of active online smart devices; the second fact deals with economic impacts of identity theft, as shown in long- term studies. Many users save online identities in their smart devices. These devices provide improvements and simplify online activities, but very personal information is necessary to operate some types of online identities, which are then reconstructed from online profiles. Smart devices become the user's online identity, which is necessary to protect. However, smart devices provide only very basic and limited protection functions. If there is no security toolkit installed, it is very difficult to protect a user's online identity and identity theft operations become easier. The attacker only needs access to the victim's smart device. This paper shows techniques for infiltrating a victim's smart device and for stealing private data.
Klasifikace
Druh
J<sub>x</sub> - Nezařazeno - Článek v odborném periodiku (Jimp, Jsc a Jost)
CEP obor
IN - Informatika
OECD FORD obor
—
Návaznosti výsledku
Projekt
Výsledek vznikl pri realizaci vícero projektů. Více informací v záložce Projekty.
Návaznosti
P - Projekt vyzkumu a vyvoje financovany z verejnych zdroju (s odkazem do CEP)
Ostatní
Rok uplatnění
2016
Kód důvěrnosti údajů
S - Úplné a pravdivé údaje o projektu nepodléhají ochraně podle zvláštních právních předpisů
Údaje specifické pro druh výsledku
Název periodika
International Journal of Scientific Engineering and Applied Science
ISSN
2395-3470
e-ISSN
—
Svazek periodika
2
Číslo periodika v rámci svazku
3
Stát vydavatele periodika
IN - Indická republika
Počet stran výsledku
8
Strana od-do
447-454
Kód UT WoS článku
—
EID výsledku v databázi Scopus
—