Skip to main content

2017 | OriginalPaper | Buchkapitel

Security Framework for Adopting Mobile Applications in Small and Medium Enterprises

verfasst von : Basel Hasan, Jorge Marx Gómez

Erschienen in: E-Business and Telecommunications

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Nowadays, people increasingly rely on mobile devices (namely, smartphones and tablets) in their daily life. Beside their private use, mobile devices are also used for work. Hence, companies are motivated to integrate mobile devices into their business processes, and they demand mobility and flexibility of their employees. However, in spite of the advances in mobile technologies, security is still the primary concern that slows down the adoption of mobile applications within Small and Medium Enterprises (SMEs). Companies should first know the potential threats in the mobile environments and then the requirements and measures to mitigate the potential risks. Typically, the existing security tools such as frameworks, guidelines and threat catalogues target IT-professionals, but not business users who mostly lack the technical knowledge to navigate through these tools. This chapter presents a mobile security framework that mainly supports SMEs by adopting mobile applications. Potential threats have been included in a risk catalogue, which forms a main component of the presented framework. This catalogue will help business users in extending their awareness of possible mobile security risks. Moreover, this framework guides business users and helps them by mapping between security requirements, threats and measures when adopting mobile enterprise applications.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Abura’ed, N., Otrok, H., Mizouni, R., Bentahar, J.: Mobile phishing attack for Android platform. In: 10th International Conference on Innovations in Information Technology, Al Ain, United Arab Emirates, pp. 18–23 (2014) Abura’ed, N., Otrok, H., Mizouni, R., Bentahar, J.: Mobile phishing attack for Android platform. In: 10th International Conference on Innovations in Information Technology, Al Ain, United Arab Emirates, pp. 18–23 (2014)
2.
Zurück zum Zitat Adeel, M., Tokarchuk, L.N.: Analysis of mobile P2P malware detection framework through cabir & commwarrior families. In: IEEE Third International Conference on Privacy, Security, Risk and Trust, Boston, MA, USA, pp. 1335–1343 (2011) Adeel, M., Tokarchuk, L.N.: Analysis of mobile P2P malware detection framework through cabir & commwarrior families. In: IEEE Third International Conference on Privacy, Security, Risk and Trust, Boston, MA, USA, pp. 1335–1343 (2011)
9.
Zurück zum Zitat Damopoulos, D., Kambourakis, G., Anagnostopoulos, M., Gritzalis, S., Park, J.H.: User privacy and modern mobile services. Are they on the same path. Pers. Ubiquit. Comput. 17(7), 1437–1448 (2013). doi:10.1007/s00779-012-0579-1 CrossRef Damopoulos, D., Kambourakis, G., Anagnostopoulos, M., Gritzalis, S., Park, J.H.: User privacy and modern mobile services. Are they on the same path. Pers. Ubiquit. Comput. 17(7), 1437–1448 (2013). doi:10.​1007/​s00779-012-0579-1 CrossRef
11.
Zurück zum Zitat Euler, M., Hacke, M., Hartherz, C., Steiner, S., Verclas, S.: Herausforderungen bei der Mobilisierung von Business Applikationen und erste Lösungsansätze. In: Verclas, S., Linnhoff-Popien, C. (eds.) Smart Mobile Apps, pp. 107–121. Springer, Heidelberg (2012). doi:10.1007/978-3-642-22259-7_8 CrossRef Euler, M., Hacke, M., Hartherz, C., Steiner, S., Verclas, S.: Herausforderungen bei der Mobilisierung von Business Applikationen und erste Lösungsansätze. In: Verclas, S., Linnhoff-Popien, C. (eds.) Smart Mobile Apps, pp. 107–121. Springer, Heidelberg (2012). doi:10.​1007/​978-3-642-22259-7_​8 CrossRef
16.
Zurück zum Zitat Godber, A., Dasgupta, P.:Secure wireless gateway. In: Maughan, D., Vaidya, N.H. (eds.) The ACM Workshop, Atlanta, GA, USA, pp. 41–46 (2002) Godber, A., Dasgupta, P.:Secure wireless gateway. In: Maughan, D., Vaidya, N.H. (eds.) The ACM Workshop, Atlanta, GA, USA, pp. 41–46 (2002)
17.
Zurück zum Zitat de Gramatica, M., Labunets, K., Massacci, F., Paci, F., Tedeschi, A.: The role of catalogues of threats and security controls in security risk assessment: an empirical study with ATM professionals. In: Fricker, S.A., Schneider, K. (eds.) REFSQ 2015. LNCS, vol. 9013, pp. 98–114. Springer, Cham (2015). doi:10.1007/978-3-319-16101-3_7 de Gramatica, M., Labunets, K., Massacci, F., Paci, F., Tedeschi, A.: The role of catalogues of threats and security controls in security risk assessment: an empirical study with ATM professionals. In: Fricker, S.A., Schneider, K. (eds.) REFSQ 2015. LNCS, vol. 9013, pp. 98–114. Springer, Cham (2015). doi:10.​1007/​978-3-319-16101-3_​7
19.
Zurück zum Zitat Hasan, B., Dmitriyev, V., Marx Gómez, J., Kurzhöfer, J.: A framework along with guidelines for designing secure mobile enterprise applications. In: International Carnahan Conference on Security Technology (ICCST), pp. 1–6. IEEE, Rome (2014) Hasan, B., Dmitriyev, V., Marx Gómez, J., Kurzhöfer, J.: A framework along with guidelines for designing secure mobile enterprise applications. In: International Carnahan Conference on Security Technology (ICCST), pp. 1–6. IEEE, Rome (2014)
20.
Zurück zum Zitat Hasan, B., Rajski, E., Gómez, J.M., Kurzhöfer, J.: A proposed model for user acceptance of mobile security measures – business context. In: Kim, K.J., Wattanapongsakorn, N., Joukov, N. (eds.) Mobile and Wireless Technologies 2016. LNEE, vol. 391, pp. 97–108. Springer, Singapore (2016). doi:10.1007/978-981-10-1409-3_11 Hasan, B., Rajski, E., Gómez, J.M., Kurzhöfer, J.: A proposed model for user acceptance of mobile security measures – business context. In: Kim, K.J., Wattanapongsakorn, N., Joukov, N. (eds.) Mobile and Wireless Technologies 2016. LNEE, vol. 391, pp. 97–108. Springer, Singapore (2016). doi:10.​1007/​978-981-10-1409-3_​11
21.
Zurück zum Zitat Hasan, B., Schäfer, P., Marx Gómez, J., Kurzhöfer, J.: Risk catalogue for mobile business applications. In: Proceedings of the 13th International Joint Conference on e-Business and Telecommunications, pp. 43–53 (2016) Hasan, B., Schäfer, P., Marx Gómez, J., Kurzhöfer, J.: Risk catalogue for mobile business applications. In: Proceedings of the 13th International Joint Conference on e-Business and Telecommunications, pp. 43–53 (2016)
22.
Zurück zum Zitat Hoos, E., Gröger, C., Kramer, S., Mitschang, B.: ValueApping: an analysis method to identify value-adding mobile enterprise apps in business processes. In: Cordeiro, J., Hammoudi, S., Maciaszek, L., Camp, O., Filipe, J. (eds.) ICEIS 2014. LNBIP, vol. 227, pp. 222–243. Springer, Cham (2015). doi:10.1007/978-3-319-22348-3_13 CrossRef Hoos, E., Gröger, C., Kramer, S., Mitschang, B.: ValueApping: an analysis method to identify value-adding mobile enterprise apps in business processes. In: Cordeiro, J., Hammoudi, S., Maciaszek, L., Camp, O., Filipe, J. (eds.) ICEIS 2014. LNBIP, vol. 227, pp. 222–243. Springer, Cham (2015). doi:10.​1007/​978-3-319-22348-3_​13 CrossRef
23.
Zurück zum Zitat Howard, M., Lipner, S.: The Security Development Lifecycle. SDL: A Process for Developing Demonstrably More Secure Software. Microsoft Press, Redmond (2006) Howard, M., Lipner, S.: The Security Development Lifecycle. SDL: A Process for Developing Demonstrably More Secure Software. Microsoft Press, Redmond (2006)
25.
Zurück zum Zitat ISO 31000:2009: Risk Management—Principles and Guidelines. Geneva: International Standards Organisation (2009) ISO 31000:2009: Risk Management—Principles and Guidelines. Geneva: International Standards Organisation (2009)
26.
Zurück zum Zitat ISO/IEC: ISO/IEC 27002: Information technology – Security techniques – Code of practice for information security controls (2013) ISO/IEC: ISO/IEC 27002: Information technology – Security techniques – Code of practice for information security controls (2013)
30.
Zurück zum Zitat Kennedy, M., Sulaiman, R.: Following the Wi-Fi breadcrumbs: network based mobile application privacy threats. In: 2015 International Conference on Electrical Engineering and Informatics (ICEEI), Denpasar, Bali, Indonesia, pp 265–270 (2015) Kennedy, M., Sulaiman, R.: Following the Wi-Fi breadcrumbs: network based mobile application privacy threats. In: 2015 International Conference on Electrical Engineering and Informatics (ICEEI), Denpasar, Bali, Indonesia, pp 265–270 (2015)
31.
Zurück zum Zitat Kizza, J.M.: Mobile Systems and Corresponding Intractable Security Issues. In: Kizza, J.M. (ed.) Guide to Computer Network Security, pp. 491–507. Springer, London (2015)CrossRef Kizza, J.M.: Mobile Systems and Corresponding Intractable Security Issues. In: Kizza, J.M. (ed.) Guide to Computer Network Security, pp. 491–507. Springer, London (2015)CrossRef
32.
Zurück zum Zitat Lacerda, A., Queiroz, R., Barbosa, M.: A systematic mapping on security threats in mobile devices. In: 2015 Internet Technologies and Applications (ITA), Wrexham, UK, pp. 286–291 (2015) Lacerda, A., Queiroz, R., Barbosa, M.: A systematic mapping on security threats in mobile devices. In: 2015 Internet Technologies and Applications (ITA), Wrexham, UK, pp. 286–291 (2015)
37.
Zurück zum Zitat Maan, J.: Enterprise mobility – a future transformation strategy for organizations. In: Wyld, D.C., Zizka, J., Nagamalai, D. (eds.) Advances in Computer Science, Engineering & Applications, vol. 167, pp. 559–567. Springer, Heidelberg (2012)CrossRef Maan, J.: Enterprise mobility – a future transformation strategy for organizations. In: Wyld, D.C., Zizka, J., Nagamalai, D. (eds.) Advances in Computer Science, Engineering & Applications, vol. 167, pp. 559–567. Springer, Heidelberg (2012)CrossRef
38.
Zurück zum Zitat Marble, J.L., Lawless, W.F., Mittu, R., Sibley, C.: The human factor in cybersecurity: robust & intelligent defense. In: Jajodia, S., Shakarian, P., Subrahmanian, V., Swarup, V., Wang, C. (eds.) Cyber Warfare, vol. 56, pp. 173–206. Springer, Cham (2015). doi:10.1007/978-3-319-14039-1_9 Marble, J.L., Lawless, W.F., Mittu, R., Sibley, C.: The human factor in cybersecurity: robust & intelligent defense. In: Jajodia, S., Shakarian, P., Subrahmanian, V., Swarup, V., Wang, C. (eds.) Cyber Warfare, vol. 56, pp. 173–206. Springer, Cham (2015). doi:10.​1007/​978-3-319-14039-1_​9
40.
Zurück zum Zitat Martin, T., Hsiao, M., Ha, D., Krishnaswami, J.: Denial-of-service attacks on battery-powered mobile computers. In: Proceedings of the Second IEEE International Conference on Pervasive Computing and Communications (PerCom 2004), pp. 309–318. IEEE Computer Society, Washington, DC (2004) Martin, T., Hsiao, M., Ha, D., Krishnaswami, J.: Denial-of-service attacks on battery-powered mobile computers. In: Proceedings of the Second IEEE International Conference on Pervasive Computing and Communications (PerCom 2004), pp. 309–318. IEEE Computer Society, Washington, DC (2004)
42.
Zurück zum Zitat Michaelis, P.: Enterprise mobility – a balancing act between security and usability. In: Reimer, H., Pohlmann, N., Schneider, W. (eds.) ISSE 2012 Securing Electronic Business Processes, pp. 75–79. Springer Fachmedien Wiesbaden, Wiesbaden (2012)CrossRef Michaelis, P.: Enterprise mobility – a balancing act between security and usability. In: Reimer, H., Pohlmann, N., Schneider, W. (eds.) ISSE 2012 Securing Electronic Business Processes, pp. 75–79. Springer Fachmedien Wiesbaden, Wiesbaden (2012)CrossRef
43.
Zurück zum Zitat Moonsamy, V., Batten, L.: Mitigating man-in-the-middle attacks on smartphones - a discussion of SSL pinning and DNSSec. In: The 12th Australian Information Security Management Conference, pp. 5–13. Edith Cowan University, Perth (2014) Moonsamy, V., Batten, L.: Mitigating man-in-the-middle attacks on smartphones - a discussion of SSL pinning and DNSSec. In: The 12th Australian Information Security Management Conference, pp. 5–13. Edith Cowan University, Perth (2014)
44.
Zurück zum Zitat Myagmar, S., Lee, A.J., Yurcik, W.: Threat modeling as a basis for security requirements. In: Symposium on Requirements Engineering for Information Security (SREIS) (2005) Myagmar, S., Lee, A.J., Yurcik, W.: Threat modeling as a basis for security requirements. In: Symposium on Requirements Engineering for Information Security (SREIS) (2005)
45.
Zurück zum Zitat Nikbakhsh, S., Manaf, A.B.A., Zamani, M., Janbeglou, M.: A novel approach for rogue access point detection on the client-side. In: 2012 IEEE Workshops of International Conference on Advanced Information Networking and Applications (WAINA), pp. 684–687. IEEE, Fukuoka (2012) Nikbakhsh, S., Manaf, A.B.A., Zamani, M., Janbeglou, M.: A novel approach for rogue access point detection on the client-side. In: 2012 IEEE Workshops of International Conference on Advanced Information Networking and Applications (WAINA), pp. 684–687. IEEE, Fukuoka (2012)
47.
Zurück zum Zitat PCI DSS: PCI DSS Risk Assessment Guidelines (2012) PCI DSS: PCI DSS Risk Assessment Guidelines (2012)
48.
Zurück zum Zitat Pu, S., Chen, Z., Huang, C., Liu, Y., Zen, B.: Threat analysis of smart mobile device. In: URSI General Assembly and Scientific Symposium (URSI GASS), pp. 1–3. IEEE, Beijing (2014) Pu, S., Chen, Z., Huang, C., Liu, Y., Zen, B.: Threat analysis of smart mobile device. In: URSI General Assembly and Scientific Symposium (URSI GASS), pp. 1–3. IEEE, Beijing (2014)
49.
Zurück zum Zitat Ramu, S.: Mobile Malware Evolution, Detection and Defense. EECE 571B, Term Survey Paper (2012) Ramu, S.: Mobile Malware Evolution, Detection and Defense. EECE 571B, Term Survey Paper (2012)
50.
Zurück zum Zitat Rao, U.H., Nayak, U.: Malicious software and anti-virus software. In: Rao, U.H., Nayak, U. (eds.) The InfoSec Handbook, pp. 141–161. Apress, Berkeley (2014) Rao, U.H., Nayak, U.: Malicious software and anti-virus software. In: Rao, U.H., Nayak, U. (eds.) The InfoSec Handbook, pp. 141–161. Apress, Berkeley (2014)
51.
52.
Zurück zum Zitat Eilts, S.: Technische Konzeption und prototypische Umsetzung eines Sicherheitsframeworks für mobile Unternehmensapplikationen. Master thesis, Carl von Ossietzky University of Oldenburg (2016) Eilts, S.: Technische Konzeption und prototypische Umsetzung eines Sicherheitsframeworks für mobile Unternehmensapplikationen. Master thesis, Carl von Ossietzky University of Oldenburg (2016)
54.
Zurück zum Zitat Srinivasan, A., Wu, J.: SafeCode – safeguarding security and privacy of user data on stolen iOS devices. In: Xiang, Y., Lopez, J., Kuo, C.-C.J., Zhou, W. (eds.) CSS 2012. LNCS, vol. 7672, pp. 11–20. Springer, Heidelberg (2012). doi:10.1007/978-3-642-35362-8_2 CrossRef Srinivasan, A., Wu, J.: SafeCode – safeguarding security and privacy of user data on stolen iOS devices. In: Xiang, Y., Lopez, J., Kuo, C.-C.J., Zhou, W. (eds.) CSS 2012. LNCS, vol. 7672, pp. 11–20. Springer, Heidelberg (2012). doi:10.​1007/​978-3-642-35362-8_​2 CrossRef
55.
Zurück zum Zitat Sun, Z., Yang, Y., Zhou, Y., Cruickshank, H.: Agent-based resource management for mobile cloud. In: Rodrigues, J.J., Lin, K., Lloret, J. (eds.) Mobile Networks and Cloud Computing Convergence for Progressive Services and Applications, pp. 118–134. IGI Global (2014) Sun, Z., Yang, Y., Zhou, Y., Cruickshank, H.: Agent-based resource management for mobile cloud. In: Rodrigues, J.J., Lin, K., Lloret, J. (eds.) Mobile Networks and Cloud Computing Convergence for Progressive Services and Applications, pp. 118–134. IGI Global (2014)
58.
Zurück zum Zitat v Do, T., Lyche, F.B., Lytskjold, J.H., van Thuan, D.: Threat assessment model for mobile malware. In: Kim, K.J. (ed.) Information Science and Applications. LNEE, vol. 339, pp. 467–474. Springer, Heidelberg (2015). doi:10.1007/978-3-662-46578-3_55 CrossRef v Do, T., Lyche, F.B., Lytskjold, J.H., van Thuan, D.: Threat assessment model for mobile malware. In: Kim, K.J. (ed.) Information Science and Applications. LNEE, vol. 339, pp. 467–474. Springer, Heidelberg (2015). doi:10.​1007/​978-3-662-46578-3_​55 CrossRef
Metadaten
Titel
Security Framework for Adopting Mobile Applications in Small and Medium Enterprises
verfasst von
Basel Hasan
Jorge Marx Gómez
Copyright-Jahr
2017
DOI
https://doi.org/10.1007/978-3-319-67876-4_4