Security assessment of the selected mobile platform
Abstract
Smartphones were gradually gaining popularity, so as to effectively replace traditional telephones. Devices creates many capabilities, but they can be a source of threats. In this article analyzed Android system security. Author checked what threats lurk for mobile devices and how the Android system tries to protect them. The questionnaire survey checked how the phone screens are blocked and how often changes are made to the blockade. To check if the screen lock can be removed, tests were performed using Google to find the device, as well as Fone. A summary of results was presented and conclusions were drawn.
Keywords:
Android; security; security testingReferences
[1] Drake J.J. Fora P.O. Lanier Z. Mulliner C. Pidley S. A. Wicherski G., Android Podręcznik Hackera, Helion, 2015.
[2] Bing H., Analysis and Research of System Seciurity Based on Android, Fifth International Conference on Intelligent Computation Technology and Automation, 2012
[3] Mu J. Cui A. Rao J., Android Mobile Security – Threats and Protection, International Conference on Computer, Network and Communication Engineering, 2013.
[4] Wu X. Li X, Hack Android Application and Defence, 3rd International Conference on Computer Science and Network Technology, 2013.
[5] Weidman G., Bezpieczny system w praktyce. Wyższa szkoła hackingu i testy penetracyjne, Helion, 2015.
[6] Rashidi B. Fung C., A Survey of Android Security Threats and Defenses, ResearchGate, 2015.
[7] Fang Z. Han W. Li Y., Permission based Android security: Issues and countermeasures, Research Collection School Of Information Systems, 2014.
[8] Delac G. Silic M. Krolo J., Emerging Security Threats for Mobile Platforms, Faculty of Electrical Engineering and Computing.
[9] Gunasekera S., Android Apps Security, Apress, 2012.
[10] Holla S. Katti M.M., Android based mobile application development and its serciurity, Inernational Journal of Computer Trends and Technology, 2012.
[11] Liebergeld S. Lange M., Android Security, Pitfalls, Lessons Learned and BYOD, 2013.
[12] https://www.spidersweb.pl/2018/02/android-ios-udzialyrynkowe.html
[2] Bing H., Analysis and Research of System Seciurity Based on Android, Fifth International Conference on Intelligent Computation Technology and Automation, 2012
[3] Mu J. Cui A. Rao J., Android Mobile Security – Threats and Protection, International Conference on Computer, Network and Communication Engineering, 2013.
[4] Wu X. Li X, Hack Android Application and Defence, 3rd International Conference on Computer Science and Network Technology, 2013.
[5] Weidman G., Bezpieczny system w praktyce. Wyższa szkoła hackingu i testy penetracyjne, Helion, 2015.
[6] Rashidi B. Fung C., A Survey of Android Security Threats and Defenses, ResearchGate, 2015.
[7] Fang Z. Han W. Li Y., Permission based Android security: Issues and countermeasures, Research Collection School Of Information Systems, 2014.
[8] Delac G. Silic M. Krolo J., Emerging Security Threats for Mobile Platforms, Faculty of Electrical Engineering and Computing.
[9] Gunasekera S., Android Apps Security, Apress, 2012.
[10] Holla S. Katti M.M., Android based mobile application development and its serciurity, Inernational Journal of Computer Trends and Technology, 2012.
[11] Liebergeld S. Lange M., Android Security, Pitfalls, Lessons Learned and BYOD, 2013.
[12] https://www.spidersweb.pl/2018/02/android-ios-udzialyrynkowe.html
Iwaniuk, A. (2018). Security assessment of the selected mobile platform . Journal of Computer Sciences Institute, 9, 302–307. https://doi.org/10.35784/jcsi.216
Statistics
Abstract views: 228PDF downloads: 156
License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.