DocumentCode :
3664598
Title :
Constructing Military Smartphone Usage Criterion of Cloud-DEFSOP for Mobile Security
Author :
Tien-Sheng Lin;I. Long Lin;Fang-Yie Leu
Author_Institution :
Dept. of the Marketing &
fYear :
2015
fDate :
7/1/2015 12:00:00 AM
Firstpage :
420
Lastpage :
425
Abstract :
Currently, several cloud security threats on smartphones can be found. They often cause users serious financial loss or bring bad reputation to a company or a institute. To detect malicious behaviors on the smartphones, Taiwan military office sets up a measure on cloud-based instruction detection to prevent mobile devices from possible attacks, for example, phishing and man-in-the-middle attacks. This study designs information security measures which are derived from digital evidence forensics standard operating procedure (DEFSOP) and construct military smartphone usage criterion. In cloud computing, digital forensics on smartphones deals with device-related preservation, identification, collection, record and interpretation of digital evidences. In order to keep the original digital evidences on the smartphone so as to be accepted by court judge, the identification process needs to be legal since the integrity of forensic result will be the major referenced evidences in the court. Basically, the process that we developed in the previous study satisfies the principle of ISO 27001. But our newly developed mobile DEFSOP has met ISO 27037 with IACC principle, including integrity, accuracy, consistency, and compliance.
Keywords :
"Forensics","Information security","Military computing","Mobile handsets","Object recognition","Computers"
Publisher :
ieee
Conference_Titel :
Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS), 2015 9th International Conference on
Type :
conf
DOI :
10.1109/IMIS.2015.90
Filename :
7284987
Link To Document :
بازگشت