Abstract

The tendency of organizations to use unprotected mobile devices with the Android operating system leads to an increase in incidents with the loss of important information. As a result of certain attacks on the system, it is modified and elements that compromise the built-in security of the device can be added to it without authorization. This study suggests methods of protecting the system by controlling the integrity of information. The purpose of the paper is to substantiate the model of information integrity control. The methods for securing system information, including integrity control and partitioning memory are described. The software part includes a mechanism for monitoring the integrity of the system when the device is turned on. The hardware part includes a modified memory drive consisting of non-rewritable sections and sections that allow recording, deleting and editing information. Moreover, the device itself is supposed to be made non-disassembly and without the possibility of replacing unauthorized components: all modules will be cryptographically linked to the motherboard. As a result of this scientific work, recommendations for the design of domestic smartphones have been developed, and the operation of the integrity control tool has been verified as well. The results of this study will make it possible to create an uncompromised corporate device for working with confidential information, eliminating the need to use personal devices for employees. The integrity control tool was tested on a real device with the Android 9.0 Oreo system installed.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call