Powered by OpenAIRE graph
Found an issue? Give us feedback
image/svg+xml art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos Open Access logo, converted into svg, designed by PLoS. This version with transparent background. http://commons.wikimedia.org/wiki/File:Open_Access_logo_PLoS_white.svg art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos http://www.plos.org/ Recolector de Cienci...arrow_drop_down
image/svg+xml art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos Open Access logo, converted into svg, designed by PLoS. This version with transparent background. http://commons.wikimedia.org/wiki/File:Open_Access_logo_PLoS_white.svg art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos http://www.plos.org/
image/svg+xml art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos Open Access logo, converted into svg, designed by PLoS. This version with transparent background. http://commons.wikimedia.org/wiki/File:Open_Access_logo_PLoS_white.svg art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos http://www.plos.org/
versions View all 2 versions
addClaim

Estudio de dispositivos móviles, vulnerabilidades y auditoría de seguridad de aplicaciones móviles

Authors: González Morte, David;

Estudio de dispositivos móviles, vulnerabilidades y auditoría de seguridad de aplicaciones móviles

Abstract

The current society lives within a large number of mobile devices. The information on the use and possible vulnerabilities that can have is an important issue. The knowledge of this concepts is too important and it's explained on this work. The purpose of this document is to inform of the current situation of mobile technologies and the surrounding security. That is why a study has been carried out on a theoretical way and also on a practical way of new technologies and mobile applications. In addition, through a brief survey, statistics have been extracted to corroborate the use that users do of mobile technologies and the type of problems they observed. It has been found and has been concluded that mobile applications can have malicious code but also applications with ethical purposes can also take advantage of vulnerabilities. An insufficient divulgation of this information approach on mobile security has also been observed, and it's vital to have make an adaptation to the users of this information.

En este trabajo se estudiarán las tecnologías móviles poniendo su foco de atención en la seguridad de las mismas. Se realizará un estudio del estado histórico y actual de los dispositivos móviles y en concreto se profundizará más detalladamente en aquellos con sistema operativo Android. Se analizarán las vulnerabilidades, problemas de privacidad y los programas maliciosos que existen en la actualidad. Estos conceptos se enfocarán teniendo en cuenta como el usuario interactúa con la tecnología móvil y con las posibles infecciones de malware. En relación a esto, se analizará cómo se realiza la divulgación informativa de la seguridad móvil y se realizará un estudio estadístico con las afirmaciones realizadas por una muestra de usuarios. Finalmente, se realizará una auditoria de seguridad a una aplicación Android generando su correspondiente informe final. Esta gestión ayudará a comprender las entrañas de las aplicaciones móviles y la sensibilidad en seguridad móvil que puede tener una aplicación.

En aquest treball s'estudiaran les tecnologies mòbils posant el seu focus d'atenció en la seguretat de les mateixes. Es realitzarà un estudi de l'estat històric i actual dels dispositius mòbils i en concret s'aprofundirà més detalladament en aquells amb sistema operatiu Android. S'analitzaran les vulnerabilitats, problemes de privacitat i els programes maliciosos que existeixen en l'actualitat. Aquests conceptes s'enfocaran tenint en compte com l'usuari interactua amb la tecnologia mòbil i amb les possibles infeccions de malware. En relació a això, s'analitzarà com es realitza la divulgació informativa de la seguretat mòbil i es realitzarà un estudi estadístic amb les afirmacions realitzades per una mostra d'usuaris. Finalment, es realitzarà una auditoria de seguretat a una aplicació Android generant la seva corresponent informe final. Aquesta gestió ajudarà a comprendre les entranyes de les aplicacions mòbils i la sensibilitat en seguretat mòbil que pot tenir una aplicació.

Country
Spain
Related Organizations
Keywords

mobile apps, audit, seguretat informàtica, Computer security -- TFM, aplicacions mòbils, aplicaciones móviles, auditoria, Seguridad informática -- TFM, Android, auditoría, Seguretat informàtica -- TFM, seguridad informática, computer security

  • BIP!
    Impact byBIP!
    selected citations
    These citations are derived from selected sources.
    This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
    0
    popularity
    This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network.
    Average
    influence
    This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
    Average
    impulse
    This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network.
    Average
Powered by OpenAIRE graph
Found an issue? Give us feedback
selected citations
These citations are derived from selected sources.
This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
BIP!Citations provided by BIP!
popularity
This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network.
BIP!Popularity provided by BIP!
influence
This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
BIP!Influence provided by BIP!
impulse
This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network.
BIP!Impulse provided by BIP!
0
Average
Average
Average
Green