Security Issues In Mobile Operating Systems

Improved Essays
Technology is evolving every day and with new technology comes new security issues. Many of today’s technology relies on “trusted” operating systems. Only a true developer will be able to navigate through other uncommon operating systems. Some of the most popular operating systems are Microsoft Windows, Apple’s iOS, and Google’s Android. Though many people use these operating systems, they are not always secure. To be considered secure, a user must know the full extent of an operating system’s features. However, one can agree that almost everyone skips the fine print and agree to all of the privacy policy and agreements. When developing mobile OS security, the following must considered: 1. Because of the portability, users are always on the …show more content…
The location of each user was stored by the operating system in a special file. The file was then sent to a data center without any specifications or instructions for these mobile devices. This represents a real threat to the privacy of mobile device users and data integrity. Regardless of the level of security, an intruder can still gain access to data about the location of the user via unauthorized access to the microphone, camera, and phone navigating tools. Because of this, the security model used for PC cannot be replicated for mobile OS …show more content…
The traffic of the mobile device should be subject to analysis and testing; this way the company can protect your mobile device from further attacks. The security should ensure compatibility with existing software as well. When installing third-party software, additional package signatures should be implemented. Similar to Linux, Android uses a “copy-on-write” principle for RAM allotment, which refine memory pages from the process prior. When a file is deleted, the blocks of disk space is not cleared, but the storage of the protected data uses a cryptographic

Related Documents

  • Great Essays

    Bsc300 Unit 1 Assignment 2

    • 2191 Words
    • 9 Pages

    ASSIGNMENT 2 AUTHOR: ALI AKBAR MIT111558 SUBMITTED TO: MS NAVNEET KAUR Contents Mobile Apps 2 Introduction 2 Vulnerabilities 2 Android main risk: 3 Security vulnerabilities: 4 Bad data storage: 4 Malware: 4 Unauthorized access: 5 Lack of encryption: 5 Data leaks from syncing: 6 Preventive methods for vulnerability: 6 Experience trust product. 6 Work with software reputation service. 7 Layer security.…

    • 2191 Words
    • 9 Pages
    Great Essays
  • Improved Essays

    Nt1310 Unit 2 Journal

    • 457 Words
    • 2 Pages

    1. Title of Article: Keep Your Phone Safe: How to Protect yourself from wireless threats 2. Authors: N/A 3. Source: http://www.consumerreports.org/cro/magazine/2013/06/keep-your-phone-safe/index.htm 4. Year of Publication: 2013 5.…

    • 457 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    “The first computer viruses hit computers in the early 1980s, and essentially we’ve been in a cyber-arms race ever since. We design new defenses, and then hackers and criminals design new ways to penetrate them….We’ve got to be just as fast and flexible and nimble in constantly evolving our defenses.” -President Barack Obam…

    • 428 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Throughout the insightful article, The Criminal Indictment That Could Finally Hit Spyware Makers Hard, written by Kim Zetter refers to incidents and consequences of on-line threats. This article displays the legal case against Hammad Akbar, CEO of the firm InvoCode designed StealthGenie, a spy app for Android phones, iPhones and Blackberry devices (Zetter 1). Within the beginning portion of the article, Zetter explains how the cellular device app had the capability to “secretly record phone calls and siphoned text messages and other data from a target’s phone, all of which customers of the software could view online” (Zetter 1). Not only did the threat of having phone calls and text message privacy invaded, the threat of the app also “allowed…

    • 442 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Unit 6 Assignment 1

    • 666 Words
    • 3 Pages

    Additionally, there are probably many others that can determine my location, such as websites and the federal government. In an attempt to improve my privacy I rarely give apps the ability to access my location and I have the location feature disabled on my phone.…

    • 666 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Response Essay Rewrite In recent times, Apple and the FBI have been arguing over the creation of software that would be able to reveal encrypted information. The author of the article Biting Apple Bruises Privacy Rights, argues the idea that by forcing Apple to hack their product will result in future violations of security and privacy. Personally, I strongly agree with the writer’s belief that forcing companies to reveal secured information is completely unwarranted and should not be allowed under any circumstance.…

    • 1482 Words
    • 6 Pages
    Improved Essays
  • Decent Essays

    Cell Phones: An Annotated Bibliography The articles and studies below examine several different aspects pertaining to cell phones. In many of the studies below it can be seen that cell phones are not as private as one would think. With that said one would think that only hackers could evade your privacy true hackers are one, but Law enforcement is the biggest. Does Law Enforcement abide by the law or do they think that they are above the law.…

    • 945 Words
    • 4 Pages
    Decent Essays
  • Improved Essays

    Technology has shaped many parts of our lifestyle’s from movement from one point to another (GPS), all the way to maintaining all of our hard earned funds on a piece of plastic. The question at hand is how this is all protected and who enforces it? Network security has proven beneficial in many cases in today’s society. It continuously monitors the companies system ensuring that unauthorized access isn’t permitted, or as we like to believe keeping our information from falling into the wrong hands.…

    • 397 Words
    • 2 Pages
    Improved Essays
  • Superior Essays

    Until my most recent smartphone, I have taken the time to research and undergo the process of unlocking my device. When I first began to take part in this culture, I wanted to understand for myself what features I was missing out on. I soon realized that there were numerous advantages to unlocking my Android phone that I never would have had the opportunity to experience if I had conformed to the standard Android expected of me. As the years have passed, I have associated the act of unlocking my phone as a right rather than a risk that Android allows me to take. Wu’s article notes that there are risks to tampering with a smartphone’s software, but taking on those risks should be a personal choice and not something a phone manufacturer can force upon a customer.…

    • 714 Words
    • 3 Pages
    Superior Essays
  • Great Essays

    With the continuing development of the Internet, the center stage of individual, business, and government discussions became a new globally sought after resource, data. Since its origin, Internet users have been warned about the dangers of posting personal, intimate information publicly; however, recent events have shifted privacy discussions away from discouraging posting ill-advised information to bringing awareness to under the radar data collection. Data is a very broad term that encompasses almost all Internet activity. What users search, click, view, and type is all collected and processed by either the website, Internet browser, or even the device itself. The demand for this personal data is enormous.…

    • 1224 Words
    • 5 Pages
    Great Essays
  • Improved Essays

    For example, in the article "That 's No Phone. That 's My Tracker. " it states, "In just the past few years, cellphone companies have honed their geographic technology, which has become almost pinpoint… If someone knows exactly where you are, they probably know what you are doing.…

    • 1042 Words
    • 5 Pages
    Improved Essays
  • Great Essays

    (Jayakumar, Tahora, 2016) In Apple attitude, the protection and privacy of Apple’s customers and partners estimated at least 1 billion devices (Statt, 2016) dictate their refusal based on the amount of the good for the largest amount of people. Similarly, rights of the users to choose privacy and the integrity of Apple to provide secure and encrypted products to its customers. Moreover, Apple competitive advantages, costs, and level of effort to build a backdoor to the iPhone could have future negative consequences on consumers’ expectations, sentiments, and trust. (Jayakumar, Tahora,…

    • 1298 Words
    • 6 Pages
    Great Essays
  • Improved Essays

    Apple vs. Android If you’ve ever had any doubts regarding the demand for smart phones, research done by IDC states that the global smart phone market has topped 1 billion shipments, covering about one seventh of the world’s population, a new milestone. Most everyone can agree that smart phones are a familiar way of life, but the big debate is whether a user’s best option is to pick out an Apple or Android device. While both Android and Apple dish out portable technology that keeps us connected, they go about it in contrasting ways.…

    • 731 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    They amuse data gathers by cookies and different innovations, such as insensitive information (Apple, 2014). Besides, Apple 's map services, give the precision into its GPS administrations (Staff, 2015). IOS gadgets gives new security viewpoints, but they have easy to utilize. Numerous angles are empowered naturally, along these lines IT divisions don 't require to execute wide designs. Most security aspects as gadget encryption are not configurable, subsequently clients can 't…

    • 905 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Everybody tends to have a cellphone nowadays. In the communications generation it is really important to be connected with people around. Thereby we need to own a cellphone, specifically smartphones, to join in the social networks. Choosing a smartphone is not an easy decision. Generally there are two big options when it comes to smartphones, Android phones and iPhones.…

    • 825 Words
    • 4 Pages
    Improved Essays

Related Topics