Abstract
This chapter describes the Windows Operating System (OS), providing an overview of its history, vulnerabilities, adversarial techniques, malware types, current solutions for mitigating attacks, and the utilization of Windows mobile services. The chapter begins by delving into the basics of Windows OS history, tracing its evolution and significant milestones. It then explores the cybersecurity landscape of Windows, discussing the vulnerabilities and risks associated with the OS. Adversarial techniques employed to exploit Windows vulnerabilities are examined, shedding light on the tactics used by attackers. The chapter proceeds to dissect various types of Windows OS malware, highlighting the diverse range of threats targeting the platform. Current solutions for mitigating attacks on Windows devices are explored, outlining the measures implemented to enhance security and protect user data. Furthermore, the trend of utilizing Windows mobile services is discussed, providing insights into the latest developments in this area. Overall, this chapter offers a comprehensive understanding of Windows security concerns and advancements in utilizing Windows mobile services.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
“Windows mobile OS: A brief history” by Sagar Khillar, Interesting Engineering, July 9, 2020. Available at: https://interestingengineering.com/windows-mobile-os-a-brief-history
“A brief history of Windows Mobile OS” by Russell Holly, Android Central, January 30, 2016. Available at: https://www.androidcentral.com/brief-history-windows-mobile-os
“A visual history of Windows Mobile” by Daniel Rubino, Windows Central, April 29, 2015. Available at: https://www.windowscentral.com/visual-history-windows-mobile
IDC. (2016). Smartphone OS Market Share, 2015 Q4. Retrieved from https://www.idc.com/promo/smartphone-market-share/os
Mohammad, D. R., Al-Momani, S., Tashtoush, Y. M., & Alsmirat, M. (2019). A comparative analysis of quality assurance automated testing tools for Windows mobile applications. In 2019 IEEE 9th Annual Computing and Communication Workshop and Conference (CCWC) (pp. 0414–0419).
Jansen, W. (2021). Microsoft 365 for business and enterprise. Springer International Publishing.
Grønli, T. M., Hansen, J., Ghinea, G., & Younas, M. (2014, May). Mobile application platform heterogeneity: Android vs. Windows Phone vs. iOS vs. Firefox OS. In 2014 IEEE 28th international conference on advanced information networking and applications (pp. 635–641). IEEE.
Ahvanooey, M. T., Li, Q., Rabbani, M., & Rajput, A. R. (2020). A survey on smartphone security: Software vulnerabilities, malware, and attacks. ar**v preprint ar**v:2001.09406
**ao, C. (2016). DualToy: New Windows Trojan sideloads risky apps to android and iOS devices. https://unit42.paloaltonetworks.com/dualtoy-new-windows-trojan-sideloads-risky-apps-to-android-and-ios-devices/
Allievi, A., & Flori, E. (2018). FinFisher exposed: A researcher’s tale of defeating traps, tricks, and complex virtual machines. https://www.microsoft.com/en-us/security/blog/2018/03/01/finfisher-exposed-a-researchers-tale-of-defeating-traps-tricks-and-complex-virtual-machines/
Microsoft. (2017). Twin zero-day attacks: PROMETHIUM and NEODYMIUM target individuals in Europe. https://www.microsoft.com/en-us/security/blog/2016/12/14/twin-zero-day-attacks-promethium-and-neodymium-target-individuals-in-europe/?source=mmpc
Lookout. (2018). Dark Caracal: Cyber-espionage at a Global Scale. https://info.lookout.com/rs/051-ESQ-475/images/Lookout_Dark-Caracal_srr_20180118_us_v.1.0.pdf
NortonLifeLock. (2021). NortonLifeLock Cyber Safety Insights Report. Retrieved from https://us.norton.com/internetsecurity-emerging-threats-cyber-safety-insights-report-volume-1-2021.pdf
Microsoft. (2015, July 23). Dialer.BZ: Premium phone scam trojan on Windows phones. Microsoft Security. https://www.microsoft.com/security/blog/2015/07/23/dialer-bz-premium-phone-scam-trojan-on-windows-phones/
BBC News. (2017). WannaCry ransomware cyber-attacks slow but fears remain. Retrieved from https://www.bbc.com/news/technology-39901382
Luo, Y., Zhu, H., Wang, Z., & Liu, P. (2016). Kemoge: Understanding mobile ad fraud in action. Proceedings of the 33rd annual computer security applications conference (ACSAC).
Akamai. (2020). State of the internet/security: Phishing for finance. Retrieved from https://www.akamai.com/us/en/multimedia/documents/state-of-the-internet/state-of-the-internet-security-phishing-for-finance-report-2020.pdf
“Acecard banking trojan now targeting Windows Phone users,” SC Magazine. (2015).
KrebsOnSecurity. (2016). KrebsOnSecurity Hit with Record DDoS. Retrieved from https://krebsonsecurity.com/2016/09/krebsonsecurity-hit-with-record-ddos/
Cuthbertson, A. (2016). Windows Phone SMS malware threat discovered in Russia. https://www.newsweek.com/windows-phone-sms-malware-threat-russia-449919
Vähäkainu, P., & Lehto, M. (2022). Use of artificial intelligence in a cybersecurity environment. In Artificial intelligence and cybersecurity: Theory and applications (pp. 3–27).
IBM, IBM MaaS360 Mobile Device Management (SaaS), visited in 2023. https://www.ibm.com/docs/en/maas360
IBM, Windows Phone 8 device MDM, visited in 2023. https://www.ibm.com/docs/en/maas360?topic=windows-enrolling-your-phone-8-device-mdm
Deep instinct, https://www.deepinstinct.com/
Zhang, Y., Dai, Z., Zhang, L., Wang, Z., Chen, L., & Zhou, Y. (2020). Application of artificial intelligence in military: From projects view. In 2020 6th International Conference on Big Data and Information Analytics (BigDIA) (pp. 113–116).
IBM Security QRadar Suite, IBM, https://www.ibm.com/qradar?utm_content=SRCWW&p1=Search&p4=43700074872917601&p5=e&gclid=CjwKCAjw1MajBhAcEiwAagW9MRLPpIdZxX5v4Cref8OJHY9QwQ35RD6wxdScMcFG4D4tMsWk7e5gpBoCNLIQAvD_BwE&gclsrc=aw.ds
Sadowski G, Kavanagh K, Bussa T (2020). Critical capabilities for security information and event management. Gartner Group Research Note.
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2024 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this chapter
Cite this chapter
Abdul Kadir, A.F., Habibi Lashkari, A., Daghmehchi Firoozjaei, M. (2024). Windows Operating System. In: Understanding Cybersecurity on Smartphones. Progress in IS. Springer, Cham. https://doi.org/10.1007/978-3-031-48865-8_4
Download citation
DOI: https://doi.org/10.1007/978-3-031-48865-8_4
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-48864-1
Online ISBN: 978-3-031-48865-8
eBook Packages: Business and ManagementBusiness and Management (R0)