首页> 外文会议>SETOP 2012 >Automated Smartphone Security Configuration
【24h】

Automated Smartphone Security Configuration

机译:自动化智能手机安全配置

获取原文

摘要

Smartphones host operating systems that are on a par with modern desktop environments. For example, Google Android is a mobile operating system that is based upon a modified version of the Linux OS. Notwithstanding traditional threats to mobile phones, threats to desktop environments are also applicable to smartphones. Management of security configurations for the end-user has, to date, been complex and errorprone. As a consequence, misconfiguration of and/or a poor understanding of a security configuration may unnecessarily expose a smartphone to known threats. In this paper, a threat-based model for smartphone security configuration is presented. To evaluate the approach, a prototype smartphone security agent that automatically manages security configurations on behalf of the end-user is developed. A case study based on firewall access control demonstrates how automated security configuration recommendations can be made based on catalogues of countermeasures. These countermeasures are drawn from best-practice standards such as NIST 800-124, a guideline on cell phone and PDA security and NIST 800-41-rev1, a guideline on firewall security configuration.
机译:智能手机主机操作系统,与现代桌面环境相提并论。例如,Google Android是一种移动操作系统,基于Linux操作系统的修改版本。尽管对移动电话的传统威胁,但桌面环境的威胁也适用于智能手机。迄今为止,最终用户的安全配置的管理已复杂和错误。因此,对安全配置的错误配置和/或糟糕的理解可能不必要地将智能手机暴露给已知的威胁。本文介绍了智能手机安全配置的基于威胁的模型。为了评估方法,开发了一种原型智能手机安全代理,用于代表最终用户管理安全配置。基于防火墙访问控制的案例研究演示了如何根据对策目录进行自动化安全配置建议。这些对策是从NIST 800-124等最佳实践标准中的,例如手机和PDA安全指南,NIST 800-41-Rev1,防火墙安全配置的指导方针。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号