366
Chapter 9
■
Security Vulnerabilities, Threats, and Countermeasures
android
Android is a mobile device OS based on Linux, which was acquired by Google in 2005. In
2008, the first devices hosting Android were made available to the public. The Android
source code is made open source through the Apache license,
but most devices also
include proprietary software. Although it’s mostly intended for use on phones and tablets,
Android is being used on a wide range of devices, including televisions, game consoles,
digital cameras, microwaves, watches, e-readers,
cordless phones, and ski goggles.
The use of Android in phones and tablets allows for a wide range of user customiza-
tion: you can install both Google Play Store apps as well as apps from unknown external
sources (such as Amazon’s App Store), and many devices support the replacement of
the default version of Android with a customized or alternate version. However, when
Android is used on other devices, it can be implemented as something closer to a static
system.
Whether static or not, Android has numerous security vulnerabilities.
These include
exposure to malicious apps, running scripts from malicious websites, and allowing inse-
cure data transmissions. Android devices can often be rooted (breaking their security and
access limitations) in order to grant the user full root-level access to the device’s low-level
configuration settings. Rooting increases a device’s security risk, because all running
code inherits root privileges.
Improvements are made to Android security as new updates are released.
Users can
adjust numerous configuration settings to reduce vulnerabilities and risks. Also, users
may be able to install apps that add additional security features to the platform.
iOS
iOS is the mobile device OS from Apple that is available on the iPhone, iPad, and Apple
TV. iOS isn’t licensed for use on any non-Apple hardware. Thus, Apple is in full control of
the features and capabilities of iOS. However, iOS is not an example of a static environ-
ment, because users can install any of over two million apps from the Apple App Store.
Also, it’s often possible to jailbreak iOS (breaking Apple’s security and access restric-
tions), allowing users to install apps from third parties and gain
greater control over low-
level settings. Jailbreaking an iOS device reduces its security and exposes the device to
potential compromise. Users can adjust device settings to increase an iOS device’s secu-
rity and install many apps that can add security features.
Do'stlaringiz bilan baham: