computer science journal, engineering journal

computer journal top header
logo empirical research press ltd.
journal engineering and applied computer science
divider
Volume: 03, Issue: 01, December 2021
Content
computer-application
h-index
6
Mohammed Abdul Bari, Shahanawaj Ahamad, Mohammed Rahmat Ali
i10-index
4
Mohammed Abdul Bari, Shahanawaj Ahamad, Mohammed Rahmat Ali, “Smartphone Security and Protection Practices”, International Journal of Engineering and Applied Computer Science, vol. 03, no. 01, pp. 01-06, Dec. 2021.
Impact Factor
Abstract—The research and communications for detecting mobile security threats with the best protection practices of applications have become essential goals nowadays due to the continuous discoveries of new vulnerabilities. The internet and web-based activities have been increased drastically in recent times by users of all categories. Users have extensively started involved in gaming, banking, frequent bill payment, entertainment, and other network and online activities that are requiring a large number of mobile phone protection and security mechanisms in response to advancements in full-stack applications and wireless networks. The goal of this paper is to uncover the best-applied practices in the domain of mobile security to protect smartphone devices. The main advantages of smartphones are small size with easiness in carrying anywhere and can be a replacement for computing devices in some ways for example emails. Unfortunately, the convenience of using smartphones to do the private task is the loophole cyber attackers need to gain access to personal data. Thus, this paper proposed eight best practices to protect and secure smart mobile phones.
2.35