Android Operating System: Architecture, Security Challenges and Solutions



Download 0,84 Mb.
Pdf ko'rish
bet10/22
Sana31.03.2022
Hajmi0,84 Mb.
#520728
1   ...   6   7   8   9   10   11   12   13   ...   22
Bog'liq
AndroidOperatingSystem

 
Security Issues in Android OS 
Taking specific malware out of the equation, what are some of the threats/vulnerabilities on Android 
devices that might be cause for concern? These certainly are not comprehensive, but do cover a 
significant range of the vulnerabilities and risks that may be exploited on the Android OS: 
 
User as admin 
Install apps, grant app permissions, download data, and access unprotected networks - The user can 
reign free over their Android domain without restriction. 
The Android Market 
Google’s verification processes for applications entering their market have been shown to be woefully 
lacking over the last year or two, leading to a number of malware-infected apps and games being made 
legitimately available to users. 
Gateway to PC 
HTC devices have long been able to utilize a VPN, but increasingly other applications are becoming 
available for remote access – Go to Meeting, Team Viewer, Remote Rack space. Although secured, these 
third party services still provide a line in to the corporate network and may be implemented fairly easily 
on to an endpoint. Any Android device can be connected to a PC via a USB cable, laying out the contents 
of its SD card for read/write/delete. The SD card itself as removable storage can be easily accessed 
directly as well. Indeed these methods could be utilized themselves for bringing malware in to a 
corporate network, for downloading malicious content on to a PC or sucking up data as soon as it is 
connected. 
Application permissions 
In the form of a pop up, the user may see these notifications as a nuisance, a delay in accessing the 
newly downloaded Angry Birds levels. Or they may simply not understand the nature of the requests. 
Common permissions that may (read: should!) raise an eyebrow would include ‘Read/Send SMS’, 
‘Access Fine Location’, ‘Access IMEI, phone identity’, ‘Brick’ (required to disable the device in trace and 
wipe apps), ‘Access camera’, and so on. Such requests may be integral to functionality, but could equally 
be recording calls and transmitting sign-in credentials. 


12 

Download 0,84 Mb.

Do'stlaringiz bilan baham:
1   ...   6   7   8   9   10   11   12   13   ...   22




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish