System and hardware security options available for users on devices running Android operating system
Article Sidebar
Open full text
Issue Vol. 8 (2018)
-
Object recognition on video from camera to computer
Oleksandr Cherednyk, Elżbieta Miłosz215-219
-
System and hardware security options available for users on devices running Android operating system
Tomasz Borysiewicz220-225
-
Efficiency of creating application’s presentation layer with frameworks AngularJS, Angular2, BackboneJS
Monika Tobiańska, Jakub Smołka226-229
-
User monitoring system using of social networks - structure and analysis of the opportunities
Sofiia Lahoda, Marek Miłosz230-234
-
Comparison of object-relational data mapping technology in Symfony 3 framework
Karol Sawłuk, Marek Miłosz235-240
-
Time analysis of the performance of Windows 10 and Windows 8.1 based on mobile application
Jacek Chmiel, Maria Skublewska-Paszkowska241-246
-
Comparison of selected network communication methods on the Android platform
Przemysław Żydek, Jakub Smołka247-251
-
Comparison of tools for automated tests of the graphical user interface using the the Sikuli and AutoIT example
Tomasz Paczuski, Beata Pańczyk252-257
-
Hosting models comparison of ASP.NET Core application
Kamil Zdanikowski, Beata Pańczyk258-262
-
Performance analysis of relational databases Oracle and MS SQL based on desktop application
Grzegorz Dziewit, Jakub Korczyński, Maria Skublewska-Paszkowska263-269
-
Verification methods of a programmer’s knowledge and skills
Paweł Hajduk, Norbert Wieruszewski, Maria Skublewska-Paszkowska270-276
-
Possibility analysis of environmental threat monitoring with the Arduino platform
Krzysztof Lenart, Małgorzata Plechawska-Wójcik277-281
-
Comparative analysis of mobile applications for IT project management
Ewelina Wlaszczyk, Elżbieta Miłosz282-285
-
Comparing the performance of integration platforms
Bartłomiej Karol Flis, Łukasz Kołyga, Maria Skublewska-Paszkowska286-291
-
Analysis of properties of reversible steganography methods
Piotr Zimnicki, Grzegorz Kozieł292-297
-
Performance comparison of automatic tests written in Selenium WebDriver and HP UFT
Krzysztof Drążek, Maria Skublewska-Paszkowska298-301
Main Article Content
DOI
Authors
Abstract
Producer of Android operating system have been trying to offer ways to protect digital data on devices since 1st version of this platform. Development of possibilities of operating system and new technological solutions allows to launch more innovate protections, which are not only more secure, but also very comfortable in everyday usage. This article presents comparison of available solutions, both in terms of the best protection and convenience of usage. The topic of convenience of usage required research to collect information about the most popular configurations among users. The analysis of security level of available locks and obtained results allowed to verify whether owners of devices running Android operating system are properly securing digital data stored in internal memory of their devices
Keywords:
References
[2] Smartphone OS Market Share, 2017 Q1, IDC, http://www.idc.com/prodserv/smartphone-os-market-share.jsp, [02.01.2016]
[3] Poznajmy technologię: Jak działa czytnik linii papilarnych?, LenovoZone, https://lenovozone.pl/porady/poznajmytechnologie-jak-dziala-czytnik-linii-papilarnych [17.06.2017]
[4] T. Nick, Here is how the iris scanner on the Galaxy Note 7 works, phoneArena.pl, https://www.phonearena.com/news/Here-is-how-the-GalaxyNote-7-iris-scanner-works_id82854 [15.08.2017]
[5] J. Stępień, Knock Code przełomowa metoda budzenia smartphona, www.shemag.pl/trend/knock-code-przelomowametoda-budzenia-smartphona [30.08.2017]
[6] Control your app permissions on Android 6.0 and up, Google Play Help,
https://support.google.com/googleplay/answer/6270602 [15.08.2017]
[7] P. Lamkin, Android Wear 2.0: Ultimate guide to the major smartwatch update, WAREABLE, https://www.wareable.com/android-wear/android-wear-updateeverything-you-need-to-know-2735 [16.09.2017]
[8] U. Malhotra, How many combinations of locking pattern are possible for a Samsung 3*3 locking grid?, Quora, https://www.quora.com/How-many-combinations-of-lockingpattern-are-possible-for-a-Samsung-3*3-locking-grid [03.10.2017]
Article Details
Abstract views: 377
License

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
