Preview

Android Os Security: Advantages and Disadvantages

Good Essays
Open Document
Open Document
2941 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Android Os Security: Advantages and Disadvantages
Android OS Security:
Advantages and Disadvantages

In the field of computing, few inventions, innovations or technological improvements, have been moving quite like wireless technology. With the advent of fourth generation cell phones and networks (4G), there have literally been leaps and bounds made in the realm of personal computing, productivity and data sharing. It is this increased connectivity both in our personal and business lives that introduce risks to intrusion, corruption or theft of data, or in the worst case, access to personal data that would lead to identity theft. In the business realm, this translates to problems for firm infrastructure and exposure to proprietary leaks, loss of customer data, or damage to the reputation of the business entity. Therefore, it is important that adequate measures are taken to evaluate risks and take steps both personally and professionally to minimize those risks. We present several advantages and disadvantages of the Android OS platform with very high visibility right now in the wireless arena. Both for the flexibility and open architecture, this platform presents some unique challenges in terms of security.
The landscape of business is ever-changing, and with the introduction of mobile computing platforms, this amounts to changes that are orders-of-magnitude less than in previous eras of business. The inherent flexibility of mobile computing allows businesses to capitalize on market shifts quickly, translating into a competitive advantage or disadvantage in much less time than it takes to engineer, develop, and market products of any type. It is no less important then, for firms to understand and adopt this technology in a proper perspective considering the measure of risk. We attempt to identify some of the risks inherent in one aspect of this technology: the Android OS platform, upon which a rapidly growing smart phone market is based.
The Threat
While previous iterations of phones were exposed to threats in



References: Anagnostakis, K., Bos, H., Homburg, P., Portokalidis, G. (2010). “Paranoid Android: Versatile Protection for Smartphones”. Proceedings of the 26th Annual Computer Security Applications Conference. New York, NY: ACM. Chin, E., Felt, A.P., Hanna, S., Song, D., Wagner, D. (2011). “Android Permissions Demystified”. Proceedings of the 18th ACM conference on Computer and communications security. New York, NY: ACM. Delac, G., Silic, M., Krolo, J. (27 May 2011) “Emerging Security Threats for Mobile Platforms”. Proceedings of the 34th International Convention. Pp.1468-1473. Citation:http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5967292&isnumber=5967009. Enck, W., Ongtang, M., McDaniel, P. (Feb 2009) “Understanding Android Security”. Security & Privacy, IEEE, 7, 1, 50-57. Citation:http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=4768655&isnumber=4768640. Enck, W., et.al. (2010) “TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones”. Proceedings of the 9th USENIX conference on Operating systems design and implementation. Berkeley, CA: USENIX. Jahanian, F., Oberheide, J. (2010) “When Mobile is Harder Than Fixed (and Vice Versa): Demystifying Security Challenges in Mobile Environments”. Proceedings of the Eleventh Workshop on Mobile Computing Systems and Applications. New York, NY: ACM. Landman, M. (2010). “Managing Smart Phone Security Risks”. 2010 Information Security Curriculum Development Conference. New York, NY: ACM. Miller, C. (Aug 2011) “Mobile Attacks and Defense”. Security & Privacy, IEEE, 9, 4, 68-70. Citation:http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5968091&isnumber=5968077. Shabtai, A., et al. (April 2010) “Google Android: A Comprehensive Security Assessment”. Security & Privacy, IEEE, 8, 2, 35-44. Citation:http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5396322&isnumber=5439518.

You May Also Find These Documents Helpful

  • Satisfactory Essays

    In this article, the authors not only cite the article by A. Fishman and M. Marquis-Boire but also used their own thoughts to make their story effectively “Cyanogen Mod is an open-source firmware distribution based on Android that lets users install apps without granting all requested permissions.” and “Blackphone has an OS that is based on a fork of Android. / Despite the Blackphone’s focus on security, a data-type confusion vulnerability in its code was disclosed and fixed in January 2015. The vulnerability could have allowed remote attackers to execute arbitrary code on Blackphones.” (3), these stories will cause attention to the readers…

    • 143 Words
    • 1 Page
    Satisfactory Essays
  • Best Essays

    “Making Mobile Devices, Cellular Devices More Secure.” (November 8, 2009). Retrieved on September 7, 2012 from…

    • 3710 Words
    • 15 Pages
    Best Essays
  • Powerful Essays

    Jutta Joachim and Andrea Schneiker Security Dialogue 2012 43: 495 DOI: 10.1177/0967010612463488 The online version of this article can be found at: http://sdi.sagepub.com/content/43/6/495…

    • 10783 Words
    • 44 Pages
    Powerful Essays
  • Better Essays

    Students use mobile devices, ranging from smartphones to tablets to laptops, to access class schedules, grades, email, and social network sites. Many devices have the capability to store user ID’s and passwords but personal security measures on these devices are not stringent, making it easy for an unauthorized person to intercept this information. Even though a college computer network may have numerous levels of protection, the system cannot easily track student authentication when mobile devices are used. This lack of authentication provides easy access for even a semi-skilled hacker to the user ID/password combination. Once the hacker has this information, he or she can take over…

    • 1432 Words
    • 5 Pages
    Better Essays
  • Best Essays

    Starbucks/Itunes Partnership

    • 4719 Words
    • 19 Pages

    Mobile Technology is expanding daily. It seems to be one of the fastest growing kinds of technologies in the news today. With the advancements in Personal Area Networks (PAN) and Wireless Access Protocols (WPA) mobile devices of today can be developed that are more secure than ever. They can be more accessible than ever before and provide faster and more accurate data transfer. The uses for the mobile devices have begun to expand into more and more areas of daily life. The iPhone mobile phone developed by Apple, Inc. is one of the most popular and bestselling mobile phones on the market today. In order for the iPhone to be at the head of the industry several of the most important technological features are…

    • 4719 Words
    • 19 Pages
    Best Essays
  • Better Essays

    Cmgt400 Week 3

    • 1752 Words
    • 8 Pages

    References: Conklin, A., White, G., Williams, D., Davis, R., & Cothren, C. (2012). Principles of Computer Security: Comp TIA Security + and Beyond (third ed.). Boston, MA: McGraw-Hill Company.…

    • 1752 Words
    • 8 Pages
    Better Essays
  • Best Essays

    cow papper english

    • 1388 Words
    • 6 Pages

    National Science Foundation. (2010). Can Clever Hackers Target Smart Phones? Retrieved August 27, 2010, from http://www.nsf.gov/news/news_summ.jsp?cntn_id=116723…

    • 1388 Words
    • 6 Pages
    Best Essays
  • Better Essays

    Week 7 Research Paper Sun

    • 1241 Words
    • 4 Pages

    M.A. Badamas, (2001),"Mobile computer systems - security considerations", Information Management & Computer Security, Vol. 9 Iss: 3 pp. 134 – 136…

    • 1241 Words
    • 4 Pages
    Better Essays
  • Good Essays

    Current Event

    • 670 Words
    • 3 Pages

    More than 90 percent of American adults own a mobile phone, and more than half of the devices are smartphones. But “smartphone” is a misnomer. They are personal computers that happen to include a phone function, and like any computer they can store or wirelessly retrieve enormous amounts of personal information: emails, photos and videos; document files; financial and medical records; and virtually everywhere a person has been.…

    • 670 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Fire Truck Crash

    • 318 Words
    • 2 Pages

    The consequences of losing a smartphone or other mobile device are significant because these devices store personal and business data. The goal, therefore, for mobile devices users is to make their…

    • 318 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Ben-Asher, N., Kirschnick, N., Sieger, H., Meyer, J., Ben-Oved, A., & Moller, S. (2011). On the need for different security methods on mobile phones. Proceedings of the 13th International Conference on Human Computer Interaction with Mobile Devices and Services, Stockholm, Sweden. 465-473. doi: 10.1145/2037373.2037442…

    • 781 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Iphone Security Issues

    • 469 Words
    • 2 Pages

    Information breaks, hacking and device thievery is a standard piece of cutting edge life. So as to protect clients, Apple and Google added extremely viable security components to their phone working frameworks making them effectively unlockable. However, the FBI wants Apple to diminish advancements it has made on encryption programming, contending this is making it less demanding for fear based oppressors and different unsafe people to dodge identification.…

    • 469 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Over the last decade, electronic-based companies such as Samsung and Apple have collaborated with cellular-phone carriers, and have studied the average consumer to find endless ways to improve the cellular phone. As a result, the smart phone was born. With their ability to provide users with instant access to communication, entertainment, Internet access, calendar, news, social media, and much more, the smart phone revolutionized and shifted the path of modern technology. In 2006, Apple began this revolution with their release of the iPhone. Being the first proper smart phone, many other companies attempted to mimic the unbeatable features and technology that Apple had included with the iPhone. Though many had failed in doing so, Google managed to keep up with the iPhone with their Android software. Soon enough, Google’s Android software became the dominant smart phone based software for smart phones not manufactured by Apple. Because of this, Android phones had become just as popular as iPhones. This paper will explore the similarities and differences between both Apple’s iPhone and Google’s Android.…

    • 775 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Mobile Computing

    • 1913 Words
    • 8 Pages

    Brady, James., Sadler, Connie J., Finney, Shannon., Oakes, Reid., Seymour, Dennis M., & Woods, Beau (November 11, 2011). Security of Mobile Computing Devices in the Healthcare Environment. Retrieved from http://www.himss.org/content/files/PrivacySecurity/HIMSS_Mobility_Security_in_Healthcare_Final.pdf…

    • 1913 Words
    • 8 Pages
    Powerful Essays
  • Good Essays

    Rogers (2009), mentioned that this book provides the concepts and code that is needed to start building smartphone applications with Android programming environment. Android Application Development introduces the environment including the operating system and SDK, and provides working examples with thorough explanations to demonstrate Android’s architectural features and APIs. Whether developers want a commercial application for smartphones or a mobile mash up for personal use, Android Application Development shows how to design, build and test applications that are innovative portable and profitable. Developers will learn the tools that write programs using Eclipse, run application on the Android emulator, and carry out debugging, tracing, and profiling.…

    • 680 Words
    • 2 Pages
    Good Essays