Abstract
New technologies have always created new areas of concern for information security teams. Usually it provides time for the development of effective security controls. The rapid growth of the smartphone in market and the use of these devices for so many sensitive data have led to the emergence of security threat. A malicious user or malware on a device can create a number of risks for an organization, and so the fact that these devices are not necessarily connected does not translate to a lack of security risks. This paper will discuss why it is important to secure an Android device, what some of the potential vulnerabilities are, and security measures that can be introduced to provide a baseline of security of data on Google’s mobile OS
Highlights
Android is a mobile platform which enables application development while making use of local as well as server side data using advanced hardware and software
Android provides the security of Linux kernel at the operating system level as well as a secure inter-process communication (IPC) facility to enable secure communication between applications running in different processes
The Android system assigns a unique user ID (UID) to each Android application and runs it as that user in a separate process. This approach is different from other operating systems, where multiple applications run with the same user permissions
Summary
Android is a mobile platform which enables application development while making use of local as well as server side data using advanced hardware and software. The great design of Android was done with device users in mind They have been provided visibility that how applications work, and control over those applications. This document shows the goals of the Android security program, describes the Android security architecture as much as possible, and answers the most pertinent questions. It focuses on the security related features of Android's core platform and does not include security issues that are unique to specific applications, for example related to the browser or SMS application. Recommended best practices for building Android devices, deploying Android devices, or developing applications for Android are not the goal of this document at all
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
More From: INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.