Malware Mobile Devices in Indonesia

Abstract

The number of mobile devices and information technology supporting applications is currently very diverse. Ranging from expensive to cheap, even new and used. On the other hand, the increase in connections needed every year always increases along with its development. Both of these are always accompanied by increasing crime in cyberspace so that the level of risk and threats that arise will also always spread threats from time to time. Many people do not understand what cyber risk is, its impact and how minimal handling is needed to overcome the above. This research was conducted to provide an overview of cybersecurity information to anyone about the amount of malware on existing and scattered devices and the user behavior itself. It starts with scanning network traffic, type of malware, then the patterns and its characteristics. On the other hand, this also provides input on how to make minimal handling as a way to control cybersecurity. The aim of the work is to focus on establishing the basic behavior of a user on mobile malware for user profiling analysis.


 


Keywords: malware, cybersecurity, user behavior, control.

References
[1] Fox, R. (2013). Information Technology: An Introduction for Todays Digital World. First Edition, CRC Press, FL, USA, 1.


[2] K, S. M. (2013). Guidelines for Managing the Security of Mobile Devices in the Enterprise. NIST, US Department of Commerce.


[3] Kshetri, N. (2013). Cybercrime and Cybersecurity in the Global South. First Edition, Palgrave Macmillan, NY USA, 6.


[4] Monnappa, K. (2018). Learning Malware Analysis: Explore the concepts, tools, and techniques to analyze and investigate Windows malware. First Edition, Packt Publishing, Birmingham, UK, 6.


[5] S, P. Y. (2015). The Recognize of malware characteristics through static and dynamic analysis approach as an effort to prevent cybercrime activities. Journal of Theoritical and Applied Information Technology, Vol. 77, No. 3, p. 438-445.


[6] Saeger, F. B. (2015). The Ishikawa Diagram for Risk Management: Anticipate and Solve the Problem for Future Business. Lemaire Publishing, Namur, Belgium, 8.


[7] Tan, Y. (2016). Artificial Immune System: Applications in Computer Security. First Editiionn, John Wiley & Son Inc, NJ, USA, 150.


[8] Wiryawan, D. a. (2016). Implementation of the acunetix for testing the banking website (owned by the government and non-government in Indonesia. An International Interdisciplinary Journal, Vol. 19 Number 6(A), 1785-1792.