Security And Security In The Android Operating System

Improved Essays
Despite Android’s complex and successful system, it has had several flaws in development that need to be addressed. Intrusion detection has been a major factor of consideration as Security evolves to meet a popular demand in privacy. With the popularity of the Android operating system during its early years, an analysis of the system raise Security concerns within the public. With the new mobile markets flooding the industry with popularity, hackers invested in new penetration methods for illegal profit and power. The hackers may abuse certain features of the Android devices such as creating security flaws in the Android operating system, the apps on the Google Play Store, and the contact between the developer and other Android devices. All …show more content…
These are Activity, Service, Content provider, and Broadcast receiver. The Activity component is defined by the user interface. This part controls what the user uses on the application which is usually separated into one Activity per screen. One example may be the different application buttons the user can press on the home screen. The Service component controls the procedures that run in the background. These may call other programs that oversee background downloads of music, files, etc. If the designer wants, the service can also be application specific daemons run service. Useful examples of services in the background is a firewall that records and matches internet traffic to its list of dangerous websites or an antivirus app that will automatically check the system periodically and after the app updates it’s virus database. The Content provider uses a relational database interface to control the sharing of data. Using Structured Query language or SQL as a base language, the Content provider relays date between apps, and from apps to internet and vice versa. This is regulated with the SQL Delete, Select, and Insert are several commands that the Content provider uses to set permissions between one object to another like an Access Control List or ACL. Common examples of this are when you send a text to someone, or when you get a high score on a mobile game, and you send the score to display it on leaderboards. The last component is a Broadcast receiver. This is space specifically designed to receive data or signals. This can be used in tandem with Services and Content providers to receive updates such as an email app telling you when you get email. When all of the components put together, this explains how your phone’s system works. For example, if you turn on your device which is connected to the internet, and your mailbox on a web site gets a new email, then the device will alert you. When you are at

Related Documents

  • Decent Essays

    It handles data errors. Switches operate on this…

    • 442 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Nt1330 Unit 4 Paper

    • 551 Words
    • 3 Pages

    In T8.1, services and their corresponding user communicate with each other by passing data in a well-defined, shared format, or by coordinating an activity between two or more services. The services are located in a central service pool and can use a so-called Service Bus (often Enterprise Service Bus or ESB), should be shared in parallel by different application systems and beyond, combined by a service composition to arbitrarily complex complete systems. This, also called orchestration combination of various distributed services from many different administrative domains is an essential feature of a service-oriented architecture. A Service bus is used to provide communication between all services and any user, User sends request to the service…

    • 551 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    Nt1330 Unit 1 Study Guide

    • 573 Words
    • 3 Pages

    Structured Query Language (SQL) – A language that allows client workstations to communicate with servers and mainframe computers. 14. Open Database Connectivity (ODBC) – Industry standard protocol that makes it possible for software from different vendors to interact and exchange…

    • 573 Words
    • 3 Pages
    Decent Essays
  • Improved Essays

    Nt1310 Unit 2 Journal

    • 457 Words
    • 2 Pages

    1. Title of Article: Keep Your Phone Safe: How to Protect yourself from wireless threats 2. Authors: N/A 3. Source: http://www.consumerreports.org/cro/magazine/2013/06/keep-your-phone-safe/index.htm 4. Year of Publication: 2013 5.…

    • 457 Words
    • 2 Pages
    Improved Essays
  • Decent Essays

    c. Cache: this is the part of the CPU that where instructions have been copied and…

    • 363 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Nt1310 Unit 6

    • 470 Words
    • 2 Pages

    Protecting ones privacy is something that many people desire and will go to great lengths to protect it. Privacy for most people starts with electronic communications and the smartphone is at the top of that list. Earlier this week SIRIN Labs announced the launch of the SOLARIN, a super phone of sorts - one that the company says is the worlds first truly smartphone. The phone geared towards the travelling business professional, is meant to ultra secure while at the same time not compromising on looks and usability. The company boasts that the device has over 2,500 inner components, and superior exterior compared to any other smartphone on the market - they believe its the best mobile phone in the world.…

    • 470 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    “The first computer viruses hit computers in the early 1980s, and essentially we’ve been in a cyber-arms race ever since. We design new defenses, and then hackers and criminals design new ways to penetrate them….We’ve got to be just as fast and flexible and nimble in constantly evolving our defenses.” -President Barack Obam…

    • 428 Words
    • 2 Pages
    Improved Essays
  • Superior Essays

    Mitch Albom, author of “Mitch Albom: FBI vs. Apple about more than a phone”, builds an overall effective editorial that supports the readers point of view by fighting for the protection of our phone information. In this case, a man named Syed Farook, killed and injured several people, including his wife. The FBI believes that accessing information from his phone may be able to help them with their case. They order Apple to build a new software that will allow them to bust into phones by being able to guess passwords as many times as they want; as of now, someone can only guess a password 10 times before the information is lost. In court, the FBI fights that the law requires businesses not involved in the case, have to execute court orders.…

    • 1079 Words
    • 5 Pages
    Superior Essays
  • Improved Essays

    Throughout the insightful article, The Criminal Indictment That Could Finally Hit Spyware Makers Hard, written by Kim Zetter refers to incidents and consequences of on-line threats. This article displays the legal case against Hammad Akbar, CEO of the firm InvoCode designed StealthGenie, a spy app for Android phones, iPhones and Blackberry devices (Zetter 1). Within the beginning portion of the article, Zetter explains how the cellular device app had the capability to “secretly record phone calls and siphoned text messages and other data from a target’s phone, all of which customers of the software could view online” (Zetter 1). Not only did the threat of having phone calls and text message privacy invaded, the threat of the app also “allowed…

    • 442 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    1984 Vs Today

    • 451 Words
    • 2 Pages

    Many people have probably heard the phrase “Big Brother is watching you,” though they may not know its origin. It comes from the dystopian novel 1984, by George Orwell. This novel constantly speaks of “Big Brother,” part of the all-seeing government, where there are telescreens in every home and people report any suspicious activity they see. Though published in 1949, many of the things that are going on in that society is happening today. Today’s society and that of 1984 is too similar, and this should be changed.…

    • 451 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Computers and Smartphones are a part of almost everybody’s life. The use of these devices has made life for many people easier and more enjoyable. But some people may wonder, how do the application on your device, or the device itself, work? The minds behind these creations are called software developers. Software developers create software that is found on every computer, without them, you would not be able to use anything on a computer.…

    • 468 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Introduction of the Canadian Mobile Industry Nowadays, mobiles become the necessity of peoples’ daily life. People keep their cell phone with them wherever they go and whatever they are doing. People communicate with each other on phone with SMS, mobile applications or through social media platforms when they are on the go.…

    • 532 Words
    • 3 Pages
    Improved Essays
  • Great Essays

    Introduction This article, Building A “Backdoor” To The iPhone: An Ethical Dilemma, discusses Tim Cook, CEO of Apple, ethical dilemma to safeguard its customer’s trust and digital privacy or assist the U.S. government and the Federal Bureau of Investigation (FBI) to gain access to an iPhone device used by a terrorist to commit a heinous crime against society in the city of San Bernardino, California. In addition, evaluate methods in which managers with power and responsibilities characterized by Badaracco, an ethics professor at Harvard University, as the “dirty-hands problem” and the “right-versus-right” difficulties where “the moral dilemmas of management are, at bottom, clashes among different, conflicting moralities, among very different…

    • 1298 Words
    • 6 Pages
    Great Essays
  • Improved Essays

    METHODS Listed below are the steps needed to create a Data Pipeline. Below the commands are the results from successful processing of those commands. 1) Verify or create required IAM Roles (for CLI or API only). IAM roles determine what actions pipelines can perform and what resources it can access. IAM roles determine what actions applications can perform and what resources they can access on a pipeline resource, such as EC2 instance Through CLI or AWS Data Pipeline console create the following roles: DataPipelineDefaultRole - Grants AWS Data Pipeline access to your AWS resources…

    • 705 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    However, this open system can lead to security problems once people are installing unofficial apps on their phones. These apps can be used as spy ones, stealing important information like passwords and bank account details. Nevertheless, people have a lot of options of choice. Many different brands can have many different smartphones since Android OS is an open system. Whereas iPhones has just one main model, Android Phones has much more diverse main options.…

    • 825 Words
    • 4 Pages
    Improved Essays