Yao, M., Chuang, M., Hsu, C.: The kano model analysis of features for mobile security applications. Accessed Ĭardwell, G.: Residual Network Data Structures in Android Devices, Masters, Naval Postgraduate School (2011) Accessed Īllam, S., Flowerday, S., Flowerday, E.: Smartphone information security awareness: a victim of operational pressures. Jones, B.H., Chin, A.: On the efficacy of smartphone security: a critical analysis of modifications in business students’ practices over time. We then study the extent of data that can be recovered, from the three categories of wiping, using two popular commercial mobile forensic software, namely: Mobile Phone Examiner Plus (MPE+) from Accessdata, and MOBILedit from Compelson labs. Specifically, we study two popular wiping apps (i.e., Shreddit – Data Eraser by PalmTronix, and Secure Wipe by Pinellas CodeWorks) and install both apps on three test devices, namely: Samsung S5 (Android 6.0.1), Samsung S5 Active (OS version 6.0.1), and an iPhone 6S (iOS 13.2.2). Hence, in this paper we evaluate the effectiveness of three categories of wiping applications: Factory Reset, Remote Reset, Data Wiping Applications (apps). Given the considerable amount of data (including sensitive and personal information) collected, stored, disseminated by mobile devices, there is a need to ensure that such devices can be securely wiped when they are misplaced, stolen or disposed.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |