Malware mobile devices in Indonesia
The number of mobile devices and information technology supporting applications is currently very diverse. Ranging from expensive to cheap, even new and used. On the other hand, the increase in connections needed every year always increases along with its development. Both of these are always accomp...
Main Authors: | , , , , , |
---|---|
Format: | Conference or Workshop Item |
Language: | English |
Published: |
KnE Social Sciences
2019
|
Subjects: | |
Online Access: | http://umpir.ump.edu.my/id/eprint/25880/ http://umpir.ump.edu.my/id/eprint/25880/ http://umpir.ump.edu.my/id/eprint/25880/1/Malware%20mobile%20devices%20in%20Indonesia.pdf |
id |
ump-25880 |
---|---|
recordtype |
eprints |
spelling |
ump-258802019-11-19T07:28:17Z http://umpir.ump.edu.my/id/eprint/25880/ Malware mobile devices in Indonesia Drajad, Wiryawan Joni, Suhartono Surjandy, . Fernando, Yudi Idris, Gautama So Gui, Anderes HD Industries. Land use. Labor QA76 Computer software TK Electrical engineering. Electronics Nuclear engineering TS Manufactures The number of mobile devices and information technology supporting applications is currently very diverse. Ranging from expensive to cheap, even new and used. On the other hand, the increase in connections needed every year always increases along with its development. Both of these are always accompanied by increasing crime in cyberspace so that the level of risk and threats that arise will also always spread threats from time to time. Many people do not understand what cyber risk is, its impact and how minimal handling is needed to overcome the above. This research was conducted to provide an overview of cybersecurity information to anyone about the amount of malware on existing and scattered devices and the user behavior itself. It starts with scanning network traffic, type of malware, then the patterns and its characteristics. On the other hand, this also provides input on how to make minimal handling as a way to control cybersecurity. The aim of the work is to focus on establishing the basic behavior of a user on mobile malware for user profiling analysis. KnE Social Sciences 2019-08-18 Conference or Workshop Item PeerReviewed pdf en cc_by_4 http://umpir.ump.edu.my/id/eprint/25880/1/Malware%20mobile%20devices%20in%20Indonesia.pdf Drajad, Wiryawan and Joni, Suhartono and Surjandy, . and Fernando, Yudi and Idris, Gautama So and Gui, Anderes (2019) Malware mobile devices in Indonesia. In: KnE Social Sciences: FGIC 2nd Conference on Governance and Integrity 2019, 19-20 August 2019 , Yayasan Pahang, Kuantan, Pahang, Malaysia. pp. 259-267.. ISSN 2518-668X https://doi.org/10.18502/kss.v3i22.5055 |
repository_type |
Digital Repository |
institution_category |
Local University |
institution |
Universiti Malaysia Pahang |
building |
UMP Institutional Repository |
collection |
Online Access |
language |
English |
topic |
HD Industries. Land use. Labor QA76 Computer software TK Electrical engineering. Electronics Nuclear engineering TS Manufactures |
spellingShingle |
HD Industries. Land use. Labor QA76 Computer software TK Electrical engineering. Electronics Nuclear engineering TS Manufactures Drajad, Wiryawan Joni, Suhartono Surjandy, . Fernando, Yudi Idris, Gautama So Gui, Anderes Malware mobile devices in Indonesia |
description |
The number of mobile devices and information technology supporting applications is currently very diverse. Ranging from expensive to cheap, even new and used. On the other hand, the increase in connections needed every year always increases along with its development. Both of these are always accompanied by increasing crime in cyberspace so that the level of risk and threats that arise will also always spread threats from time to time. Many people do not understand what cyber risk is, its impact and how minimal handling is needed to overcome the above. This research was conducted to provide an overview of cybersecurity information to anyone about the amount of malware on existing and scattered devices and the user behavior itself. It starts with scanning network traffic, type of malware, then the patterns and its characteristics. On the other hand, this also provides input on how to make minimal handling as a way to control cybersecurity. The aim of the work is to focus on establishing the basic behavior of a user on mobile malware for user profiling analysis. |
format |
Conference or Workshop Item |
author |
Drajad, Wiryawan Joni, Suhartono Surjandy, . Fernando, Yudi Idris, Gautama So Gui, Anderes |
author_facet |
Drajad, Wiryawan Joni, Suhartono Surjandy, . Fernando, Yudi Idris, Gautama So Gui, Anderes |
author_sort |
Drajad, Wiryawan |
title |
Malware mobile devices in Indonesia |
title_short |
Malware mobile devices in Indonesia |
title_full |
Malware mobile devices in Indonesia |
title_fullStr |
Malware mobile devices in Indonesia |
title_full_unstemmed |
Malware mobile devices in Indonesia |
title_sort |
malware mobile devices in indonesia |
publisher |
KnE Social Sciences |
publishDate |
2019 |
url |
http://umpir.ump.edu.my/id/eprint/25880/ http://umpir.ump.edu.my/id/eprint/25880/ http://umpir.ump.edu.my/id/eprint/25880/1/Malware%20mobile%20devices%20in%20Indonesia.pdf |
first_indexed |
2023-09-18T22:39:59Z |
last_indexed |
2023-09-18T22:39:59Z |
_version_ |
1777416849605001216 |