Increasing use of smartphones for work and private purposes have mingled both the valuable personal data to work data unintentionally. Android permission-based security model are used to restrict the ability of applications to access device resources, but it failed to provide an adequate control for users and a visibility of how third party applications using personal data of users. The permission warnings when installing applications do not help most users in taking right security decisions. This research aims at developing a risk assessment method to determine security posture, at Android smartphone The method can help users to increase the security level of a device, especially against sensitive data leakage. The design of risk assessment uses two approaches, security configuration level assessment and sensitive data risk assessment. Security configuration level assessment is based on built-in Android smartphone configurations, while sensitive data risk assessment is based on combination of permissions from all applications installed on the device. Design of risk assessment implemented on Android smartphone called Smartphone Risk Assessment (SRA). The evaluation has been done by a usability testing using the System Usability Scale (SUS) questionnaire. The result shows that the SRA is rated as "Good" by respondents based on SUS score. The SRA is considered to be helpful by users to determine potential threats of their smartphones and any applications that has potential to leak sensitive data.
[1]
Ninghui Li,et al.
Generating Summary Risk Scores for Mobile Applications
,
2014,
IEEE Transactions on Dependable and Secure Computing.
[2]
Ziming Zhao,et al.
RiskMon: continuous and automated risk assessment of mobile applications
,
2014,
CODASPY '14.
[3]
Dimitris Gritzalis,et al.
A Risk Assessment Method for Smartphones
,
2012,
SEC.
[4]
Y. S. Feruza,et al.
IT Security Review: Privacy, Protection, Access Control, Assurance and System Security
,
2007
.
[5]
Angela M. Cirucci,et al.
Usability Testing
,
2021,
UX Research Methods for Media and Communication Studies.
[6]
Paolo Giorgini,et al.
Modelling Risk and Identifying Countermeasure in Organizations
,
2006,
CRITIS.
[7]
Tao Xie,et al.
WHYPER: Towards Automating Risk Assessment of Mobile Applications
,
2013,
USENIX Security Symposium.
[8]
J. B. Brooke,et al.
SUS: a retrospective
,
2013
.
[9]
Jeff Sauro,et al.
The Factor Structure of the System Usability Scale
,
2009,
HCI.
[10]
Philip T. Kortum,et al.
Determining what individual SUS scores mean: adding an adjective rating scale
,
2009
.