Information Management Security Vulnerabilities in Smartphones Used by University Students: A Case Study in the Southwest of Colombia
Currently, students who use smartphones are affected by theft and information leakage, to address this problem, this research aims to identify security vulnerabilities in these devices. In addition, an application to prevent phishing and information leakage was implemented. Effectiveness and perform...
- Autores:
- Tipo de recurso:
- Fecha de publicación:
- 2022
- Institución:
- Universidad Pedagógica y Tecnológica de Colombia
- Repositorio:
- RiUPTC: Repositorio Institucional UPTC
- Idioma:
- eng
- OAI Identifier:
- oai:repositorio.uptc.edu.co:001/14333
- Acceso en línea:
- https://revistas.uptc.edu.co/index.php/ingenieria/article/view/13957
https://repositorio.uptc.edu.co/handle/001/14333
- Palabra clave:
- Vulnerabilities
Mobile devices
Android
Phising
nformation leak
Vulnerabilidades
Dispositivos moviles
Android
suplantación de identidad
Perdida de información
- Rights
- License
- http://creativecommons.org/licenses/by/4.0
id |
REPOUPTC2_300299b7fcb291d411a2b3b1cf37dcab |
---|---|
oai_identifier_str |
oai:repositorio.uptc.edu.co:001/14333 |
network_acronym_str |
REPOUPTC2 |
network_name_str |
RiUPTC: Repositorio Institucional UPTC |
repository_id_str |
|
dc.title.en-US.fl_str_mv |
Information Management Security Vulnerabilities in Smartphones Used by University Students: A Case Study in the Southwest of Colombia |
dc.title.es-ES.fl_str_mv |
Vulnerabilidades de seguridad en la gestión de la información en teléfonos inteligentes utilizados por estudiantes universitarios: Un estudio de caso en el suroeste de Colombia |
title |
Information Management Security Vulnerabilities in Smartphones Used by University Students: A Case Study in the Southwest of Colombia |
spellingShingle |
Information Management Security Vulnerabilities in Smartphones Used by University Students: A Case Study in the Southwest of Colombia Vulnerabilities Mobile devices Android Phising nformation leak Vulnerabilidades Dispositivos moviles Android suplantación de identidad Perdida de información |
title_short |
Information Management Security Vulnerabilities in Smartphones Used by University Students: A Case Study in the Southwest of Colombia |
title_full |
Information Management Security Vulnerabilities in Smartphones Used by University Students: A Case Study in the Southwest of Colombia |
title_fullStr |
Information Management Security Vulnerabilities in Smartphones Used by University Students: A Case Study in the Southwest of Colombia |
title_full_unstemmed |
Information Management Security Vulnerabilities in Smartphones Used by University Students: A Case Study in the Southwest of Colombia |
title_sort |
Information Management Security Vulnerabilities in Smartphones Used by University Students: A Case Study in the Southwest of Colombia |
dc.subject.en-US.fl_str_mv |
Vulnerabilities Mobile devices Android Phising nformation leak |
topic |
Vulnerabilities Mobile devices Android Phising nformation leak Vulnerabilidades Dispositivos moviles Android suplantación de identidad Perdida de información |
dc.subject.es-ES.fl_str_mv |
Vulnerabilidades Dispositivos moviles Android suplantación de identidad Perdida de información |
description |
Currently, students who use smartphones are affected by theft and information leakage, to address this problem, this research aims to identify security vulnerabilities in these devices. In addition, an application to prevent phishing and information leakage was implemented. Effectiveness and performance tests were carried out to identify vulnerabilities and to alert users about them. The threats identified in Android smartphones used by university students in the southwest of Colombia were based on various techniques (phishing, DNS poisoning, identity theft, Man in the middle, foot-printing, spyware). To reach this result, we defined the problem, then we made a literature review, after that we defined the study population, methods, and instruments; finally, we collected the information and analyzed the results. An application was launched to show the security vulnerabilities of malicious software installation, which extracts information from student’s devices and makes the security of our mobile phones a priority nowadays; and to achieve greater security on Android smartphones. However, it is essential to be aware of the importance of self-care. |
publishDate |
2022 |
dc.date.accessioned.none.fl_str_mv |
2024-07-05T19:12:06Z |
dc.date.available.none.fl_str_mv |
2024-07-05T19:12:06Z |
dc.date.none.fl_str_mv |
2022-03-14 |
dc.type.none.fl_str_mv |
info:eu-repo/semantics/article |
dc.type.coar.fl_str_mv |
http://purl.org/coar/resource_type/c_2df8fbb1 |
dc.type.coarversion.fl_str_mv |
http://purl.org/coar/version/c_970fb48d4fbd8a85 |
dc.type.version.spa.fl_str_mv |
info:eu-repo/semantics/publishedVersion |
dc.type.coarversion.spa.fl_str_mv |
http://purl.org/coar/version/c_970fb48d4fbd8a120 |
status_str |
publishedVersion |
dc.identifier.none.fl_str_mv |
https://revistas.uptc.edu.co/index.php/ingenieria/article/view/13957 10.19053/01211129.v31.n59.2022.13957 |
dc.identifier.uri.none.fl_str_mv |
https://repositorio.uptc.edu.co/handle/001/14333 |
url |
https://revistas.uptc.edu.co/index.php/ingenieria/article/view/13957 https://repositorio.uptc.edu.co/handle/001/14333 |
identifier_str_mv |
10.19053/01211129.v31.n59.2022.13957 |
dc.language.none.fl_str_mv |
eng |
dc.language.iso.spa.fl_str_mv |
eng |
language |
eng |
dc.relation.none.fl_str_mv |
https://revistas.uptc.edu.co/index.php/ingenieria/article/view/13957/11492 https://revistas.uptc.edu.co/index.php/ingenieria/article/view/13957/11677 |
dc.rights.en-US.fl_str_mv |
http://creativecommons.org/licenses/by/4.0 |
dc.rights.coar.fl_str_mv |
http://purl.org/coar/access_right/c_abf2 |
dc.rights.coar.spa.fl_str_mv |
http://purl.org/coar/access_right/c_abf37 |
rights_invalid_str_mv |
http://creativecommons.org/licenses/by/4.0 http://purl.org/coar/access_right/c_abf37 http://purl.org/coar/access_right/c_abf2 |
dc.format.none.fl_str_mv |
application/pdf text/xml |
dc.publisher.en-US.fl_str_mv |
Universidad Pedagógica y Tecnológica de Colombia |
dc.source.en-US.fl_str_mv |
Revista Facultad de Ingeniería; Vol. 31 No. 59 (2022): January-March 2022 (Continuous Publication); e13957 |
dc.source.es-ES.fl_str_mv |
Revista Facultad de Ingeniería; Vol. 31 Núm. 59 (2022): Enero-Marzo 2022 (Publicación Continua); e13957 |
dc.source.none.fl_str_mv |
2357-5328 0121-1129 |
institution |
Universidad Pedagógica y Tecnológica de Colombia |
repository.name.fl_str_mv |
Repositorio Institucional UPTC |
repository.mail.fl_str_mv |
repositorio.uptc@uptc.edu.co |
_version_ |
1839633787527364608 |
spelling |
2022-03-142024-07-05T19:12:06Z2024-07-05T19:12:06Zhttps://revistas.uptc.edu.co/index.php/ingenieria/article/view/1395710.19053/01211129.v31.n59.2022.13957https://repositorio.uptc.edu.co/handle/001/14333Currently, students who use smartphones are affected by theft and information leakage, to address this problem, this research aims to identify security vulnerabilities in these devices. In addition, an application to prevent phishing and information leakage was implemented. Effectiveness and performance tests were carried out to identify vulnerabilities and to alert users about them. The threats identified in Android smartphones used by university students in the southwest of Colombia were based on various techniques (phishing, DNS poisoning, identity theft, Man in the middle, foot-printing, spyware). To reach this result, we defined the problem, then we made a literature review, after that we defined the study population, methods, and instruments; finally, we collected the information and analyzed the results. An application was launched to show the security vulnerabilities of malicious software installation, which extracts information from student’s devices and makes the security of our mobile phones a priority nowadays; and to achieve greater security on Android smartphones. However, it is essential to be aware of the importance of self-care.Actualmente, los estudiantes que utilizan teléfonos inteligentes se ven afectados por el robo y la fuga de información, para abordar este problema, esta investigación tiene como objetivo identificar las vulnerabilidades de seguridad en estos dispositivos. Además, se implementó una aplicación para prevenir el phishing y la fuga de información. Se realizaron pruebas de efectividad y rendimiento para identificar vulnerabilidades y alertar a los usuarios sobre las mismas. Las amenazas identificadas en los teléfonos inteligentes Android utilizados por estudiantes universitarios del suroeste de Colombia se basaron en diversas técnicas (phishing, envenenamiento de DNS, robo de identidad, Man in the middle, foot-printing, spyware). Para llegar a este resultado, definimos el problema, luego hicimos una revisión de la literatura, luego definimos la población de estudio, métodos e instrumentos; finalmente, recolectamos la información y analizamos los resultados. Se lanzó una aplicación para mostrar las vulnerabilidades de seguridad de la instalación de software malicioso, que extrae información de los dispositivos de los estudiantes y hace que la seguridad de nuestros teléfonos móviles sea una prioridad en la actualidad; y para conseguir una mayor seguridad en los smartphones Android. Sin embargo, es fundamental ser conscientes de la importancia del autocuidado.application/pdftext/xmlengengUniversidad Pedagógica y Tecnológica de Colombiahttps://revistas.uptc.edu.co/index.php/ingenieria/article/view/13957/11492https://revistas.uptc.edu.co/index.php/ingenieria/article/view/13957/11677Copyright (c) 2022 Cristian-Camilo Ordoñez-Quintero, Hugo-Armando Ordoñez-Eraso, Jose-Armando Ordoñez-Córdobahttp://creativecommons.org/licenses/by/4.0http://purl.org/coar/access_right/c_abf37http://purl.org/coar/access_right/c_abf2Revista Facultad de Ingeniería; Vol. 31 No. 59 (2022): January-March 2022 (Continuous Publication); e13957Revista Facultad de Ingeniería; Vol. 31 Núm. 59 (2022): Enero-Marzo 2022 (Publicación Continua); e139572357-53280121-1129VulnerabilitiesMobile devicesAndroidPhisingnformation leakVulnerabilidadesDispositivos movilesAndroidsuplantación de identidadPerdida de informaciónInformation Management Security Vulnerabilities in Smartphones Used by University Students: A Case Study in the Southwest of ColombiaVulnerabilidades de seguridad en la gestión de la información en teléfonos inteligentes utilizados por estudiantes universitarios: Un estudio de caso en el suroeste de Colombiainfo:eu-repo/semantics/articlehttp://purl.org/coar/resource_type/c_2df8fbb1info:eu-repo/semantics/publishedVersionhttp://purl.org/coar/version/c_970fb48d4fbd8a120http://purl.org/coar/version/c_970fb48d4fbd8a85Ordoñez-Quintero, Cristian-CamiloOrdoñez-Eraso, Hugo-ArmandoOrdoñez-Córdoba, Jose-Armando001/14333oai:repositorio.uptc.edu.co:001/143332025-07-18 11:53:14.358metadata.onlyhttps://repositorio.uptc.edu.coRepositorio Institucional UPTCrepositorio.uptc@uptc.edu.co |