The location of each user was stored by the operating system in a special file. The file was then sent to a data center without any specifications or instructions for these mobile devices. This represents a real threat to the privacy of mobile device users and data integrity. Regardless of the level of security, an intruder can still gain access to data about the location of the user via unauthorized access to the microphone, camera, and phone navigating tools. Because of this, the security model used for PC cannot be replicated for mobile OS …show more content…
The traffic of the mobile device should be subject to analysis and testing; this way the company can protect your mobile device from further attacks. The security should ensure compatibility with existing software as well. When installing third-party software, additional package signatures should be implemented. Similar to Linux, Android uses a “copy-on-write” principle for RAM allotment, which refine memory pages from the process prior. When a file is deleted, the blocks of disk space is not cleared, but the storage of the protected data uses a cryptographic