Review on Android and Smartphone Security
Abstract
Currently, Android controls the largest market share among operating systems for smartphones. Smartphone users have woken up to the realization that security is an issue that must be kept in mind all the time. The enhancement of performance and increase in features also multiply in tandem with risk such as virus attacks. It is possible that Android could be the most secure operating system, compared to others, currently. There are limited restrictions for developers, however. Such a blank check allows for multiple security concerns for the end-user. This paper explores Android's security model; it is the level of application and the security concerns with the operating system for smartphones.
There is no doubt that Android has exhibited truly modern smartphone features and tweaks. It is a typical open-source program. Applications from Android can use a broad range of software programs, including server and local data, networks, and other applications (Mohini, et al., 2013). To successfully run an open-source platform such as Android, one needs a highly sophisticated and anticipative approach and infrastructure. Android Operating System works with multi-layers of security precautions. It is an ideal platform for an open-source channel. Android incorporates a stack of software, with an Operating System, core application, and middleware in complete form (Kaur & Kaur, 2013).
Millions of mobile gadgets in over 190 countries across the globe use the Android Operating System. Android has been designed with architectural acumen that gives room for continuous improvement from developers from elsewhere. Indeed, the security elements have been designed to remain accommodative to developers. The developers have the window to use the versatile security buffers. There is a lack of familiarity by developers about security that applies by default. The end user's interest drives the design of the Android Operating System and the device itself. It allows users to view how applications work and manage the same applications (Mohini, et al., 2013).
Figure 1 below compiles the security aspects of Android, including what is considered at various levels. Every element assumes that the one below it is appropriately secured. If an Android OS code running as root, with the exception, any process running over the Kernel for Linux is controlled by the Application Sandbox (Mohini, et al., 2013)
Figure 1: Architecture of Android (Mohini, et al., 2013)
Android Security
i. Android is open source, thus, allows developers to enhance it (AOSP, 2013)
ii. The software for Android is for multitasking. Consequently, no software can gain serious access to OS components (AOSP, 2013)
iii. So far, UNIX is the most secure Operating System, and it is what Android uses (AOSP, 2013)
iv. If a developer wishes to publish their application on the open market, they require a unique signature to do so (AOSP, 2013).
v. iv. The developers need a unique signature to publish their application on the market (AOSP, 2013).
vi. Users have an avenue to report suspected security flaws through their Google accounts
vii. For application installation, all must seek clearance from the end-user
Security Concerns that Android Has Faced
Well, Android is not as secure as it appears, the layers of security measures notwithstanding. Some security concerns are apparent:
i. There is no security scan for Android for applications being uploaded on its customer stalls
ii. Some apps have been noted to carry the capacity to exploit the services of other apps installed on the Android system with no prior permission granted
iii. Android's permission...
Bibliography
Ahmed, O. & Sallow, A. B., 2019. Android Security: A Review. Academic Journal of Nawroz University.
Android Open Source Project. 2013. Android Security Overview. http://source.android.com/devices/tech/security/index.html.
Android Open Source Project. Security and permissions. 2013. http://developer.android.com/guide/topics/security/permissions.html.
Android Open Source Project. 2013. Publishing on GooglePlay. http://developer.android.com/distribute/googleplay/publish/preparing.html.
Android Open Source Project. 2013. What is Android? http://developer.android.com/about/index.html
Berger B.J., Bunke M., and Sohr K., 2011. An Android Security Case Study with Bauhaus, Working Conference on Reverse Engineering, 179–183.
Dini G., Martinelli F., Saracino A. and Sgandurra D., 2012. MADAM: a multi-level anomaly detector for android malware, http://www.iet.unipi.it/g.dini/research/papers/2012-MMMANCS.pdf
Enck W., Octeau D., McDaniel P., and Chaudhuri S., 2011. A Study of Android Application Security, The 20th USENIX Conference on Security, 21-21.
Schmidt A.D., Schmidt H.G., Clausen J., Camtepe A., Albayrak S., and Yuksel K. Ali and Kiraz O., 2008. Enhancing Security of Linux-based Android Devices, http://www.dailabor.de/fileadmin/files/publications/lk2008-android_security. pdf
Androids From your reading of Hasker, and using the categories he uses, what view of the mind/body problem do you think is exhibited by Picard? By Maddox? Support your answer. When explaining the mind/body problem, Hasker points out that there are physical properties and mental properties of people that can enhance understanding of the Star Trek episode. Hasker also notes that the philosophical concept of dualism (between mind and body) and the
But Android is also available on low-end devices. This is a market unserved by either Apple or Blackberry. The low-end market is especially popular in the developing world -- consider that India now has an Android tablet priced at $60. By virtue of covering all price ranges in the market, Android is poised to take a dominant share of smartphones. In addition, the differentiation that its manufacturers are engaging
Android Tablet General Marketing The objective of this study is to describe the cultural, social, personal and psychological factors that influence consumers on purchasing an Android Tablet. This work will also discuss which aspects of consumer behavior the product or service should emphasize in their marketing plan and why. Personal Use The personal reason to purchase an Android Tablet may include the ability to read E-books using the Android Tablet or the ability to
Smartphones and the Great Digital Divide Even though 44% of African-Americans and Latinos own a smartphone while only 30% of White, non-Hispanics do, many people contend that this isn't really closing the great digital divide because African-Americans and Latinos use their smartphones more for entertainment than empowerment. Build an argument to support the previous statement. One can in fact argue that while more minority persons own a smartphone than Caucasian individuals, one
NFC is going to revolutionize the smartphone as an e-commerce platform. Conclusion The proliferation of smartphones continues to lead to exceptional growth of application development across all platforms, with Android being the clear leader in the last six months of development. The decision to make the platform and source code both open have contributed to Google quickly overtaking Apple and their iPhone OS operating system in terms of market share. It
This section of the paper is providing the disadvantages of smart phones and tablets technology for the employees working in private and government organizations. a. Cost Undoubtedly, the biggest disadvantage of smart phones and tablets technology is the cost as compared to the standard mobile phones. Since, it has been examined that the cost of smart phones is more upfront as compared to the less than about a third of such
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now