Security vulnerabilities in the information management in university student´s smartphones: A case study in south west of Colombia
DOI:
https://doi.org/10.21533/pen.v9.i4.952Abstract
Nowadays university student’s smartphones are affected by the theft and leakage of information, to address this issue, this research aims at identifying security vulnerabilities in these devices. Moreover, an application was developed to prevent phishing and information leaks. Effectiveness and functioning tests were carried out to identify diverse vulnerabilities and alerting users about them.
Objective: Identify vulnerabilities based on diverse techniques (phishing, DNS poisoning, identity theft, Man in the middle, foot-printing, spyware) in Android smartphones used by university students from the south west of Colombia.
Methodology or method: The following phases were carried out: 1. Definition of the problem. 2. Literature review. 3. Planning; In this phase, the study population, and the methods and instruments were defined. 4. Evaluation: we collected the information and analysed the results.
Results: An application was developed to show the security vulnerabilities regarding the installation of malicious software that extracts information from their devices.
Conclusions: The security of our mobile phones is a priority nowadays. We developed an application to achieve greater security in android smartphones, However, it is crucial to be aware of the importance of self-care.
Downloads
Published
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.




