Security And Security In The Android Operating System

Good Essays
Despite Android’s complex and successful system, it has had several flaws in development that need to be addressed. Intrusion detection has been a major factor of consideration as Security evolves to meet a popular demand in privacy. With the popularity of the Android operating system during its early years, an analysis of the system raise Security concerns within the public. With the new mobile markets flooding the industry with popularity, hackers invested in new penetration methods for illegal profit and power. The hackers may abuse certain features of the Android devices such as creating security flaws in the Android operating system, the apps on the Google Play Store, and the contact between the developer and other Android devices. All …show more content…
These are Activity, Service, Content provider, and Broadcast receiver. The Activity component is defined by the user interface. This part controls what the user uses on the application which is usually separated into one Activity per screen. One example may be the different application buttons the user can press on the home screen. The Service component controls the procedures that run in the background. These may call other programs that oversee background downloads of music, files, etc. If the designer wants, the service can also be application specific daemons run service. Useful examples of services in the background is a firewall that records and matches internet traffic to its list of dangerous websites or an antivirus app that will automatically check the system periodically and after the app updates it’s virus database. The Content provider uses a relational database interface to control the sharing of data. Using Structured Query language or SQL as a base language, the Content provider relays date between apps, and from apps to internet and vice versa. This is regulated with the SQL Delete, Select, and Insert are several commands that the Content provider uses to set permissions between one object to another like an Access Control List or ACL. Common examples of this are when you send a text to someone, or when you get a high score on a mobile game, and you send the score to display it on leaderboards. The last component is a Broadcast receiver. This is space specifically designed to receive data or signals. This can be used in tandem with Services and Content providers to receive updates such as an email app telling you when you get email. When all of the components put together, this explains how your phone’s system works. For example, if you turn on your device which is connected to the internet, and your mailbox on a web site gets a new email, then the device will alert you. When you are at

Related Documents

  • Decent Essays

    5. (5 points) How does dynamic addressing work? Dynamic addressing allows the IP address to change. So, when you turn on your computer the DHCP will send out a request to a DHCP server. The DHCP server will then respond with an IP address that your computer will utilize for that session.…

    • 766 Words
    • 4 Pages
    Decent Essays
  • Decent Essays

    The attacker in control of a botnet can use it for a variety of purposes. One of the most common uses for a botnet is to perform distributed denial of service attacks (DDoS), where the bots send massive amounts of web traffic to a single website and attempt to bring it down. Botnets can also be used to…

    • 2049 Words
    • 9 Pages
    Decent Essays
  • Decent Essays

    Essay On Cybersecurity

    • 1115 Words
    • 5 Pages

    So what can you do to be safe on the Internet? Cormier states that there is many things to do to be safe. One of them is to add a Dual/Multi-factor authentication too your accounts. “The most used Dual Factor authentication choice you see is the text message. For your account, it will ask you for your password, and then after your password, it would send you a text message to a phone number that you already setup on the site.…

    • 1115 Words
    • 5 Pages
    Decent Essays
  • Decent Essays

    A PC user opens her Internet Explorer web browser, types the www.certskills.com/books web address, and presses Enter. The browser displays a new web page. What part of the web address most directly identifies the web server from which the web page will be retrieved? B. www.certskills.com 14. Using the terminology introduced in this chapter, think about network topologies.…

    • 1494 Words
    • 6 Pages
    Decent Essays
  • Decent Essays

    Web hosts are companies such as Ehost.com that give people permission to use space on their servers or they Domain Structures are broken down into top-level domains and sub-level domains. The basic top-level domains include .com or org. Top-Level domains can moreover represent countries code such as “.uk” or “.us” and the sub-level domains connect related pages to the official websites. Domain Name Registers is a company that allows companies to register to own a domain name and it also manages the reservation of company’s internet domain names. World Wide Web (WWW) is a system on the internet that allows hypertext links document to be connected and it allows users to search for information.…

    • 795 Words
    • 4 Pages
    Decent Essays
  • Decent Essays

    Moonpig Case Study

    • 1591 Words
    • 7 Pages

    Photobox is parent organisation of Moonpig. Various ways of contacting Moonpig customer service are available. You can • Call customer service • Send email • Write to head office • Use online form to send message Visit the web shop and locate help drop down menu on the top right. Then select appropriate option to call or send email. Existing and new customers need to contact customer service for various reasons.…

    • 1591 Words
    • 7 Pages
    Decent Essays
  • Decent Essays

    When OpenID was first created and starting to be used by major companies as their go-to single sign-on solution, people were skeptical. Today, it is used just about everywhere and people do not usually think twice before using it to log into their favorite website. We will explore how the improvements OpenID has made over the years have caused it along with OAuth to become some of the most widely used cross-site authentication protocols. In this paper, we will also touch on what flaws still exist in these protocols and if their benefits outweigh those flaws. This work is relevant because OpenID Connect and OAuth are used so widely today, both internally for companies and for public-facing websites.…

    • 1871 Words
    • 8 Pages
    Decent Essays
  • Decent Essays

    POP3 is designed to delete them off the server, unless, the user opts not to delete the email then the POP3 will download the email every time the users opens it. IMAP is another protocol which is the Application Layer Internet protocol. This allows the user to access the mail server, this happens when the user signs up to the mail server. For example, when users sign up to BT Mail they are accessing the IMAP protocol to send and receive emails. The current IMAP is version 4 revision 1 and this is defined as RFC 3501.…

    • 1440 Words
    • 6 Pages
    Decent Essays
  • Decent Essays

    U Chat Analysis

    • 836 Words
    • 4 Pages

    The tables that we need are: filters, chatrooms, admins, user, logged in users, guest users, messages, cities, and universities. Each database table will play a different role for the application. In the category table we will have a list of chat rooms based on the user 's interests such as sports, news, activities, clubs, etc. The admin table will contain a hardcoded list of administrators. The user table will contain information about the users such as username, bio, avatar, password, with more possible data to be determined.…

    • 836 Words
    • 4 Pages
    Decent Essays
  • Decent Essays

    Speech On Gmail

    • 889 Words
    • 4 Pages

    There are endless types of messages that we can send as an email, including pictures, videos, and songs. In order to get the process of sending email started, we must first get to Gmail. Gmail is the service that we use to send an email, and gmail.com is the website name for Gmail. For us to get there we have to click on our Internet Browser. Once the browser is open, we then click on the address bar, which is the blank field at the top of the internet browser.…

    • 889 Words
    • 4 Pages
    Decent Essays