Android Operating System: Architecture, Security Challenges and Solutions



Download 0,84 Mb.
Pdf ko'rish
bet8/22
Sana31.03.2022
Hajmi0,84 Mb.
#520728
1   ...   4   5   6   7   8   9   10   11   ...   22
Bog'liq
AndroidOperatingSystem

Android Applications 
 
Android applications are bundled into an Android package (.apk) via the Android Asset Packaging Tool 
(AAPT). To streamline the development process, Google provides the Android Development Tools (ADT). 
The ADT streamlines the conversion from class to dex files, and creates the .apk during deployment. In a 
very simplified manner, Android applications are in general composed of: 

Activities 
(needed to create a screen for a user application – classes with a UI) 

Intents 
(used to transfer control from one activity to another) 

Services 
(classes without a UI, so they can be executed in the background) 

Content Providers 
(allows the application to share information with other applications)
 
 
3.0 Security Issues in Android OS 
 
Security has always been a major concern for consumers, but it's especially important for enterprise 
users. In far too many cases, malicious hackers are able to take control of a computer, steal sensitive 
information or use it against millions across the world. On the Web, hackers take every opportunity to 
try and take down sites or turn them into their own personal Trojan-delivering friends. However, in 
recent years, a new threat has emerged that, at least so far, few people know enough about: mobile 
security. From Android to Symbian and even, in some cases, iOS, operating systems across the mobile 
market are being targeted by malicious hackers. Users of those operating systems, meanwhile, do little 
to safeguard themselves from those threats. In a world where the trend to bring user’s own device 
(BYOD) is becoming the norm, the worlds of consumer and business security are starting to collide. 
Interestingly, over the last year or so, Android has become the chief target for malicious hackers. 
According to several reports, cyber-crooks are targeting the Android operating system since it's 
essentially open and the sheer number of people using the platform makes it a worthwhile option. But 
there are still many people that don't believe Android security is a major threat to them. Those people 
need to wake up. Here's a look at why Android security is a growing threat. [10]
Android remains the world's most widely used operating system, based on market and usage share 
statistics, used by hundreds of millions of customers worldwide. 



But, according to a new document
obtained by Public Intelligence, the U.S. Dept. of Homeland Security 
(DHS) and the Federal Bureau of Investigation (FBI) are increasingly aware of the threats its law 
enforcement users and officials face at a federal, state, and local level in using older versions of the 
mobile platform. 
According to the roll call release — marked as unclassified but "for official use only," and designed for 
police, fire, emergency medical services (EMS) and security personnel — upwards of 44 percent of 
Android users worldwide are still using Android versions 2.3.3 to 2.3.7, which still contain security 
vulnerabilities fixed in later versions. 
The document does not state, however, how many U.S. government staff use Android, let alone older 
versions of Android, on its networks. Android continues to be a "primary target for malware attacks due 
to its market share and open source architecture," the document says, and an uptick in mobile device 
use by government users "makes it more important than ever to keep mobile [operating 
systems] patched and up-to-date." 
As many will know, staying ahead of the Android security curve requires actively ditching existing 
handsets and buying a new device, particularly in a bring-your-own-device world where this falls down 
to the responsibility of the user. Many manufacturers and carriers do not issue the latest Android 
versions for older devices. [09] 

Download 0,84 Mb.

Do'stlaringiz bilan baham:
1   ...   4   5   6   7   8   9   10   11   ...   22




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish