Malware mobile devices in Indonesia

The number of mobile devices and information technology supporting applications is currently very diverse. Ranging from expensive to cheap, even new and used. On the other hand, the increase in connections needed every year always increases along with its development. Both of these are always accomp...

Full description

Bibliographic Details
Main Authors: Drajad, Wiryawan, Joni, Suhartono, Surjandy, ., Fernando, Yudi, Idris, Gautama So, Gui, Anderes
Format: Conference or Workshop Item
Language:English
Published: KnE Social Sciences 2019
Subjects:
Online Access:http://umpir.ump.edu.my/id/eprint/25880/
http://umpir.ump.edu.my/id/eprint/25880/
http://umpir.ump.edu.my/id/eprint/25880/1/Malware%20mobile%20devices%20in%20Indonesia.pdf
id ump-25880
recordtype eprints
spelling ump-258802019-11-19T07:28:17Z http://umpir.ump.edu.my/id/eprint/25880/ Malware mobile devices in Indonesia Drajad, Wiryawan Joni, Suhartono Surjandy, . Fernando, Yudi Idris, Gautama So Gui, Anderes HD Industries. Land use. Labor QA76 Computer software TK Electrical engineering. Electronics Nuclear engineering TS Manufactures The number of mobile devices and information technology supporting applications is currently very diverse. Ranging from expensive to cheap, even new and used. On the other hand, the increase in connections needed every year always increases along with its development. Both of these are always accompanied by increasing crime in cyberspace so that the level of risk and threats that arise will also always spread threats from time to time. Many people do not understand what cyber risk is, its impact and how minimal handling is needed to overcome the above. This research was conducted to provide an overview of cybersecurity information to anyone about the amount of malware on existing and scattered devices and the user behavior itself. It starts with scanning network traffic, type of malware, then the patterns and its characteristics. On the other hand, this also provides input on how to make minimal handling as a way to control cybersecurity. The aim of the work is to focus on establishing the basic behavior of a user on mobile malware for user profiling analysis. KnE Social Sciences 2019-08-18 Conference or Workshop Item PeerReviewed pdf en cc_by_4 http://umpir.ump.edu.my/id/eprint/25880/1/Malware%20mobile%20devices%20in%20Indonesia.pdf Drajad, Wiryawan and Joni, Suhartono and Surjandy, . and Fernando, Yudi and Idris, Gautama So and Gui, Anderes (2019) Malware mobile devices in Indonesia. In: KnE Social Sciences: FGIC 2nd Conference on Governance and Integrity 2019, 19-20 August 2019 , Yayasan Pahang, Kuantan, Pahang, Malaysia. pp. 259-267.. ISSN 2518-668X https://doi.org/10.18502/kss.v3i22.5055
repository_type Digital Repository
institution_category Local University
institution Universiti Malaysia Pahang
building UMP Institutional Repository
collection Online Access
language English
topic HD Industries. Land use. Labor
QA76 Computer software
TK Electrical engineering. Electronics Nuclear engineering
TS Manufactures
spellingShingle HD Industries. Land use. Labor
QA76 Computer software
TK Electrical engineering. Electronics Nuclear engineering
TS Manufactures
Drajad, Wiryawan
Joni, Suhartono
Surjandy, .
Fernando, Yudi
Idris, Gautama So
Gui, Anderes
Malware mobile devices in Indonesia
description The number of mobile devices and information technology supporting applications is currently very diverse. Ranging from expensive to cheap, even new and used. On the other hand, the increase in connections needed every year always increases along with its development. Both of these are always accompanied by increasing crime in cyberspace so that the level of risk and threats that arise will also always spread threats from time to time. Many people do not understand what cyber risk is, its impact and how minimal handling is needed to overcome the above. This research was conducted to provide an overview of cybersecurity information to anyone about the amount of malware on existing and scattered devices and the user behavior itself. It starts with scanning network traffic, type of malware, then the patterns and its characteristics. On the other hand, this also provides input on how to make minimal handling as a way to control cybersecurity. The aim of the work is to focus on establishing the basic behavior of a user on mobile malware for user profiling analysis.
format Conference or Workshop Item
author Drajad, Wiryawan
Joni, Suhartono
Surjandy, .
Fernando, Yudi
Idris, Gautama So
Gui, Anderes
author_facet Drajad, Wiryawan
Joni, Suhartono
Surjandy, .
Fernando, Yudi
Idris, Gautama So
Gui, Anderes
author_sort Drajad, Wiryawan
title Malware mobile devices in Indonesia
title_short Malware mobile devices in Indonesia
title_full Malware mobile devices in Indonesia
title_fullStr Malware mobile devices in Indonesia
title_full_unstemmed Malware mobile devices in Indonesia
title_sort malware mobile devices in indonesia
publisher KnE Social Sciences
publishDate 2019
url http://umpir.ump.edu.my/id/eprint/25880/
http://umpir.ump.edu.my/id/eprint/25880/
http://umpir.ump.edu.my/id/eprint/25880/1/Malware%20mobile%20devices%20in%20Indonesia.pdf
first_indexed 2023-09-18T22:39:59Z
last_indexed 2023-09-18T22:39:59Z
_version_ 1777416849605001216