Smartphones are the new generation of mobile devices which their main objective is to ease connectivity and persistence access to online services. Due to these advantages, Smartphones effectively increase the productivity and provide easy access to personal, client and corporate information.
Nowadays, Smartphones are widely used for communication purposes but more importantly they are used to carry sensitive business data and provide remote access to resources across the network. As the power and functionality of Smartphones increases, these devices attract more people and companies.
In the past 2 years over 50 million Smartphone users have been spotted in the US. Mobile devices have many platforms and are using different operating systems that are installed on various types of hardware platforms which indicate a large number of challenges to be faced , in particullar developing a security measure or a common forensics investigation procedure that supports all kinds of mobile phones.
In addition, hardware and software used in mobile devices are constantly changing which creates more issues with data security compared to other platforms such as desktop environments.
There are a number of technologies that can be implemented on mobile devices to provide some level of security such as encryption, VPN, firewall and anti-malware scanners.
Clearly malware and viruses are not the only threat to mobile devices. Mobile devices are frequently lost or stolen, they will be misused by employees and management is not willing to establish the required policy to ensure the security of mobile devices is enforced. All of these factors are making mobile devices more vulnerable than other types of platforms such as desktops and laptops.
In this paper a data-centric model is suggested to protect all the vulnerabilities and prevent application and malware threats. This approach allows a system to use multiple and different sets of methods in order to defend against any attack. In this data-centric security model data is protected by putting in place different layers of security. Each level of security protects and restricts access to data in different ways.
The model is able to ensure confidentiality, integrity and availability of data stored on mobile devices.
To read this external content in full, download the complete paper from the author archives online at AICIT.org.