Security assessment of the selected mobile platform
Article Sidebar
Open full text
Issue Vol. 9 (2018)
-
Security assessment of the selected mobile platform
Aleksandra Iwaniuk302-307
-
Author's method of securing the screen of the mobile device.
Grzegorz Iwaniuk308-310
-
Method of increasing the QR code capacity – Hexa QR Code
Daniel Janowski311-317
-
Comparative analysis of approches in developing Android applications using Xamarin technology
Michał Bartkiewicz, Adrian Dziedzic318-323
-
Quality evaluation of selected tools to automate application testing
Łukasz Szczepkowicz, Beata Pańczyk324-327
-
Comparative analysis of Front-End Code Playground tools
Mateusz Magier, Beata Pańczyk328-333
-
Comparison of selected tools to perform unit tests
Piotr Strzelecki, Maria Skublewska-Paszkowska334-339
-
Assessment of the web application security effectiveness against various methods of network attacks
Mateusz Erbel, Piotr Kopniak340-344
-
Method of synchronization and data processing from differents inertial sensors kits sources for the human gait analysis
Aleksandra Goźdź, Maciej Kalinowski, Piotr Kopniak345-349
-
Testing the functionality of the application made in .NET Core technology on the Raspberry Pi II platform
Tomasz Piotr Sajnóg, Dariusz Czerwiński350-358
Main Article Content
DOI
Authors
Abstract
Smartphones were gradually gaining popularity, so as to effectively replace traditional telephones. Devices creates many capabilities, but they can be a source of threats. In this article analyzed Android system security. Author checked what threats lurk for mobile devices and how the Android system tries to protect them. The questionnaire survey checked how the phone screens are blocked and how often changes are made to the blockade. To check if the screen lock can be removed, tests were performed using Google to find the device, as well as Fone. A summary of results was presented and conclusions were drawn.
Keywords:
References
[2] Bing H., Analysis and Research of System Seciurity Based on Android, Fifth International Conference on Intelligent Computation Technology and Automation, 2012
[3] Mu J. Cui A. Rao J., Android Mobile Security – Threats and Protection, International Conference on Computer, Network and Communication Engineering, 2013.
[4] Wu X. Li X, Hack Android Application and Defence, 3rd International Conference on Computer Science and Network Technology, 2013.
[5] Weidman G., Bezpieczny system w praktyce. Wyższa szkoła hackingu i testy penetracyjne, Helion, 2015.
[6] Rashidi B. Fung C., A Survey of Android Security Threats and Defenses, ResearchGate, 2015.
[7] Fang Z. Han W. Li Y., Permission based Android security: Issues and countermeasures, Research Collection School Of Information Systems, 2014.
[8] Delac G. Silic M. Krolo J., Emerging Security Threats for Mobile Platforms, Faculty of Electrical Engineering and Computing.
[9] Gunasekera S., Android Apps Security, Apress, 2012.
[10] Holla S. Katti M.M., Android based mobile application development and its serciurity, Inernational Journal of Computer Trends and Technology, 2012.
[11] Liebergeld S. Lange M., Android Security, Pitfalls, Lessons Learned and BYOD, 2013.
[12] https://www.spidersweb.pl/2018/02/android-ios-udzialyrynkowe.html
Article Details
Abstract views: 288
License

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
