CFP last date
20 December 2024
Reseach Article

Exploring the threats in Cell Phone as a Portable Storage Device

by Vaishali Mishra, Ashutosh Mishra,
journal cover thumbnail
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 1 - Number 6
Year of Publication: 2010
Authors: Vaishali Mishra, Ashutosh Mishra,
10.5120/135-253

Vaishali Mishra, Ashutosh Mishra, . Exploring the threats in Cell Phone as a Portable Storage Device. International Journal of Computer Applications. 1, 6 ( February 2010), 98-101. DOI=10.5120/135-253

@article{ 10.5120/135-253,
author = { Vaishali Mishra, Ashutosh Mishra, },
title = { Exploring the threats in Cell Phone as a Portable Storage Device },
journal = { International Journal of Computer Applications },
issue_date = { February 2010 },
volume = { 1 },
number = { 6 },
month = { February },
year = { 2010 },
issn = { 0975-8887 },
pages = { 98-101 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume1/number6/135-253/ },
doi = { 10.5120/135-253 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T19:45:30.993298+05:30
%A Vaishali Mishra
%A Ashutosh Mishra,
%T Exploring the threats in Cell Phone as a Portable Storage Device
%J International Journal of Computer Applications
%@ 0975-8887
%V 1
%N 6
%P 98-101
%D 2010
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The introduction of personal computing and wireless communication technology provides an option for on site device software updating and data retrieving. This is especially true for any devices sitting in a remote site where computing network is not accessible. In many advanced computing systems, frequent software updating and configuration profiles refreshing are required. This is clumsy and error prone procedures when users are not familiar with the operating systems. Suppose all the necessary files and programs are predefined in a mobile phone. All necessary files and software can be transferred to the corresponding computing devices and PCs at remote sites through wireless communication links such as Bluetooth/infrared. This idea helps to solve the initial installation cost of a communication network to a remote site.

References
  1. Windows XP Networking Features and Enhancements, Microsoft Technical Article, January, 2002.
  2. John Calboon, “Mobile Computing with Windows XP”, Microsoft Technical Articles, July, 2001.
  3. Specification of Bluetooth System Volume 2, Profiles, Bluetooth SIG.
  4. Brent A. Miller, Chatschink Bisdikian, “Bluetooth Revealed”. Prentice Hall 2nd Edition.
  5. D.Kammer, G.McNutt, B.Senses, J.Bray, “Bluetooth Application Developer’s Guide: The Short Range Interconnect Solution”. Syngress Publishing Inc., 2002.
  6. Haataja, Keijo M.J. 2006. Security in Bluetooth, WLAN and IrDA: a comparison. Retrieved on July 1, 2006 from http://www.cs.uku.fi/research/publications/reports/A-2006-1.pdf
  7. Kotadia, Munir. 2004. Bluesnarfing tools ëspreading quicklyí. ZDNet UK. Retrieved July 11, 2006 from http://news.zdnet.co.uk/internet/security/0,39020375,39146427,00.htm
  8. The Bunker. 2003. Security Briefs. Serious flaws in Bluetooth security lead to disclosure of personal data. Retrieved on July 1, 2006 from http://www.thebunker.net/security/bluetooth.htm
Index Terms

Computer Science
Information Sciences

Keywords

Bluetooth Mobile communication