...platform for many reasons. Not only is the profit from smartphone hacking increasing, but as more consumers link their personal accounts (email, social networking, financial, etc.) to their smartphones, the private information of the users opens a window of opportunity. Hackers can infect smartphones to record phone calls, send and delete data messages, and spy on your phone’s activity. It does not only pose great security threats, but also causes an economic loss to common users. This definitely becomes a major issue when businesses are also taking advantage of the portable PC power of smartphones and incorporating them into their business activities. Typical smartphones like the Apple iPhone, RIM’s BlackBerry, Windows Mobile, and Google Android have seen their usage grow rapidly in recent few years. Besides the basic functions like phone calls and messages, they can handle other known previously only to the PC like reading and writing emails and documents. Moreover, smartphones...
Words: 3045 - Pages: 13
...of our lives… personal and professional. The information they provide is so vital that the Army is piloting their use as standard field issue to every soldier, complete with combat-focused applications [1]. However, smartphones and tablets raise new security issues. They are more likely to be lost or stolen, exposing sensitive data. Malware risks are increased because they connect to the Internet directly rather than from behind corporate firewalls and intrusion-protection systems. Security of mobile devices focuses on controlling access through the use of device locks and hardware data encryption. While this may be sufficient for individual users, it is insufficient for defense needs. Many documented examples exist of hacking of the device lock, as well as defeats of the hardware-level encryption. Once the device is unlocked, there is generally unfettered access to all apps and their associated data. Military applications require additional application-level access controls to provide data security. Unfortunately, there are gaps in the application-level security model of the two predominant mobile operating systems: iOS from Apple and Google Android. Our ongoing research1 looks to address these gaps by developing innovative approaches for fine-grained data protection and access control, taking into account mobile device usage patterns, device characteristics, and usability. Mobile Applications Security Threat Vectors Many threat vectors for infecting personal computers arise...
Words: 4009 - Pages: 17
...CSEC610 Individual Assignment The Bring Your Own Device (BYOD) Policy: Implications on Corporate Security Abstract: The paper discusses: 1) potential vulnerabilities in the Bring Your Own Device (BYOD) Policy when adopted by a company; 2) threats to a network from untrusted and unmanaged devices; and 3) best practices for implementing the BYOD policy in a workplace. The paper also proposes one of many solutions that can be implemented to make the policy robust. Bring Your Own Device or BYOD is the policy, whereby employees are allowed to utilize their own personal computing devices to access corporate resources to perform their day-to-day job duties. These devices can include laptops, smart phones, and tablets and the corporate resources include sensitive, private and privileged information. When not implemented correctly, the BYOD policy is a vulnerability for businesses and enterprises, since sensitive data is accessed through unmanaged and potentially compromised devices. This accessed data has the potential to end up in the wrong hands in an ever-increasing number of ways. This puts pressure on IT managers to manage and secure these devices and protect proprietary company data. BYOD offers potential cost-saving measures, since it allows employees to bring their personal computing devices to the workplace, thereby eliminating the need for businesses to provide them with these devices. When individuals can work from and use a device...
Words: 2386 - Pages: 10
...Android Operating System POS/355 June 19, 2013 Castle Phelps Introduction The “Android” operating system is in many users opinion the best mobile device operating system in use today. It allows mobile device manufacturers the ability to tailor the operating systems for the specific device it to be used on, In this essay we will talk about what makes the Android operating system the most popular operating system out on the market today and why it controls the majority market share for mobile devices. We will discuss how the Android allows for external storage of applications, expandable memory, and use of the Google “Cloud” with apps such as Google Drive, Google Play, and Google Wallet. We will also cover how android deals with internet security, viruses, and malware on their mobile devices operating systems. Memory Management The fact that Google allows mobile device manufacturers to customize the android operating system for all of their phones and tablets means that each device will vary on how much internal memory will be used for android firmware and applications. Many of the higher end devices such as Samsung’s Galaxy line of devices offer 1GB of memory and up with expandable memory up to an additional 32GB with a micro SDHC card. Android is a software stack for mobile devices that includes an operating system, middleware and key applications. Android is a Linux based OS with a 2.6.x kernel, stripped down to handle most tasks pretty well; All the basic OS operations...
Words: 2066 - Pages: 9
...TM 562: Wireless Devices and Applications Table of Contents Introduction 1 Background about Smartphones 1 Defined Smartphone 1 Different applications on a Smartphone 1 Problem Statement 3 Security Risks 3 Analysis 4 Viruses 4 Threats 5 Recommended Solution and Implementation 6 6 6 References 7 Introduction Statement If you've ever wondered exactly what a smartphone is, well, you're not alone. How is a smartphone different than a cell phone, what makes it so smart, and how secure is the device? Firstly, IBM designed the first smartphone in 1992. It was called Simon. The smartphone was presented that year as a concept device in Las Vegas at the computer industry trade show known as COMDEX. The first cell phone, on the other hand, was demonstrated 19 years before the first smartphone (Wikipedia). Smartphones are phones that provide a new genre of application than the standard cell phone. They provide phone plus Internet connectivity and storage, text and multimedia, and multi-tasking. In a nutshell, a smartphone is a device that lets you make telephone calls, but also adds in features that you might find on a personal digital assistant or a computer, such as the ability to send and receive e-mail, scheduling and contact management software, edit Office documents, as well as a built-in camera and mp3 capabilities. However, with the access to the Internet the phone is now subjected to more security issues. If a person can hack the...
Words: 2102 - Pages: 9
...Essay on “Google Android OS vs. Apple iOS” The competition between Google Android and Apple iOSis one of the most talked after wars in mobile gadget platforms. The Google Android platform is increasingly becoming dominant in the smartphones and tablets market. Nokia, a once leading company in the mobile phone market is slowly entering the smartphone market with a new range of Lumia smartphones powered by Windows 8 mobile as it phases out its range of Symbian powered smartphones. Equally, Motorola Mobility is trying to gain a share of the market by increasing its product portfolio of smartphones in the Droid family. The Android Operating System powers the Droid range of smartphones. Samsung is by far the largest mobile manufacturing company in the world with a full range of Android powered smartphones in the Galaxy family. The recent entry of the Samsung Galaxy SIII heightened the competitive advantage of the Android Software Platform based on the Android 4.0 (Ice Cream Sandwich) software. With HTC,Blackberry OS, and Microsoft Mobile as a distant competitors, the war is clearly not between mobile phone manufacturers but the war is between software manufacturers, and in this case,Apple iOS and Google Android (Katie, 2012). Currently, the competition between Apple iOS and Google Android is so close such that it becomes difficult to tell the superior operating system (Ian, 2011). Undeniably, each mobile platform has its strengths and weaknesses. Advantages of Android OS over Apple iOS...
Words: 1828 - Pages: 8
...The significance of features of custom rom in android phone A thesis proposal Presented to Chief Edwin Casila Professor In partial fulfilment of the requirement for the Degree Information Technology Presented by: Imperial, Melchor B. DEDICATION I dedicate my research work to my family and many friends. A special feeling of gratitude to my loving parents, Marife and Larry, whose words of encouragement and push for tenacity ring in my ears. My sisters Laarnie and younger brother Joebert and Eugine have never left my side and are very special. I also dedicate this research and special thanks to my many friends and church family who have supported me throughout the process. I dedicated also this research to my loving and sweetest girlfriend, Cristine Mercado for your love and encouragement, for the support and still by my side. I will always appreciate all they have done, especially Mr. Angle Kenneth Aspa for helping me develop my technology skills. I dedicate this work and give special thanks to my Professor Chef. Edwin T. Casila for many hours of teaching us and making me laugh always. ACKNOWLEDGEMENTS I wish to thank my classmate who were more than generous with their expertise and precious time. A special thanks to Ms Anzano , my Professor for his countless hours of reflecting, reading, encouraging, and most of all patience throughout the entire process. I would like to acknowledge and thank my school...
Words: 5360 - Pages: 22
...ANDROID OPERATION SYSTEM INTRODUCTION Android is a mobile operating system that is currently developed by Google, it is based on the Linux kernel and designed primarily for touchscreen mobile devices such as smartphones and tablets. Android’s user-interface is mainly based on direct manipulation, using touch gestures that loosely corresponds to real-world actions, such as swiping, tapping and pinching to manipulate on-screen objects along with a virtual keyboard for text input. In addition to touchscreen devices Google has also developed android for other platforms such Android TV for Television, Android Auto for Cars and Android Wear for wristwatches. Each of these platform have special interface to sooth the platform. Variant of Android are also used on Notebooks, game console, digital camera and other electronics. As smartphones and tablets become more popular, the operating systems for those devices become more important. Android is such an operating system for low powered devices that run on battery and contain hardware like Global Positioning System (GPS) receivers, cameras, light and orientation sensors, WiFi and UMTS (3G telephony) connectivity and a touch screen. Like all operating systems, Android enables applications to make use of the hardware features through abstraction and provide a defined environment for applications. Unlike on other mobile operating systems like Apple’s iOS, Palm’s web OS or Symbian, Android applications are written in Java and run in virtual...
Words: 3950 - Pages: 16
...PC, data back-up & encryption, & password management Always current cloud based protection Real-time antivirus & anti-theft protection for your Android smartphone Proactive detection of Malware Advanced anti-theft & Internet threat protection for your Android tablet Safe Money, two-way firewall, award-winning parental control, & advanced identity theft protection Real-time Protection against Mac & PC malware, Safemoney technology, and parental control Privacy protection including webcam protection, security notifications on Wi-Fi networks, & additional tools to protect personal information Mcafee Total Protection Free Trial Mcafee Total Protection Paid Version Protect against viruses and malware Secure your Macs Optimize your PC Safeguard your smartphones and tablets Protect your family Manage all your devices from one place Block spam and dangerous email Password manager Protect against hackers and thieves Protects Multiple PCs Protect your social network Free Anti-Virus Software Paid Anti-Virus Software Malwarebytes Anti-Malware Mcafee Total Protection Panda Free Antivirus Norton Anti- Security Comodo Cleaning Essential 6 Kaspersky Total Security Norton Power Eraser AVG Anti-Virus Programs Trojan Horse Program: A Trojan horse, or Trojan, in computing is a generally non-self-replicating type of malware program containing malicious code that, when executed, carries out actions determined by the nature of the Trojan, typically causing loss or theft...
Words: 495 - Pages: 2
...ANALYTICAL STUDY AMONG THE INDUSTRY LEADERS (WINDOWS, IOS AND ANDROID) An Analytical Report Presented to MS. MARCIA ROLIZA M. DEL MUNDO, MA Faculty Member, General Education Department In partial fulfillment Of the requirements in BUSINESS WRITING For the course BACHELOR OF SCIENCE IN INFORMATION AND TECHNOLOGY BACHELOR OF SCIENCE IN COMPUTER ENGINEERING Presented by IBRAHIM ESTOESTA IRYNNE GAE FERNANDEZ ANDRIAN VILLADELREY KYLE VILLANUEVA March 2016 ACKNOWLEDGEMENT We would like to express our special thanks of gratitude to the following people: * Our teacher, Ms. Marcia Roliza Del Mundo, who gave us the golden opportunity to do this wonderful project on the topic, “The Best Smartphone Operating System: An Analytical Study Among the Industry Leaders”, which helped us in doing a lot of research and we came to know about so many new things; * Our parents and our friends, who helped us a lot in finalizing this project within the limited time frame; and lastly * Our God, for giving us strength and for guiding us in everything we’ve done for the past months in doing this project. From the bottom of our hearts, thank you. Ibrahim Estoesta Irynne Gae Fernandez Andrian Villadelrey Kyle Villanueva TABLE OF CONTENTS Cover Page Acknowledgement BEST SMARTPHONE OPERATING SYSTEM: 4 I. Introduction 5 Internet Operating System or iOS 5 Android Operating System 6 Windows Operating System 6 II....
Words: 1729 - Pages: 7
...threats presented within the “Security Threat Report 2014” Security threats have not only grown and matured quickly, but the people behind these threats have become more creative in camouflaging their work. These criminals have become more adept at eluding their identification and are now relying on cryptography. Malware authors, as with users, are now focusing on mobile devices and web services. Numerous threats were listed in the Security Threat Report 2014 such as botnets, android malware, attacks on Linux platforms and Mac OS X, web-based malware, targeted threats to your financial accounts, unpatched windows systems and re-invented spam. These items are detrimental to companies and users. The more complex these threats get, the harder it is to protect against them. I will analyze botnets and android malware in this section. A botnet is a network of private computers infected with malicious software and controlled as a group without the owner’s knowledge. Criminals distribute malicious software that can turn your computer into a “bot”. When this occurs, your computer can perform automated tasked over the Internet without your knowledge. This type of malware is typically used to infect large numbers of computers. They are used to send out spam email messages, spread viruses, attack computers and servers, and commit others kinds of crime and fraud. Botnets are now more resilient and integrating multiple backup forms of command and control. The operators are now faster...
Words: 1366 - Pages: 6
...Updating Android operating system, is it really safe? All Android devices at risk of being hacked when installing OS system updates _ Pileup Flaws By Raunak Chatterjee and Anisha Agarwal Student of Computer Science and Engineering department of Calcutta Institute of Technology Email: rnk.chatterjee.cit@gmail.com ------------------------------------------------- Anishaagarwal1992@gmail.com Abstract: Android is a Linux based operating system. Initially developed by Android, Inc., which Google backed financially and later bought in 2005, Android was unveiled in 2007 along with the founding of the Open Handset Alliance—a consortium of hardware, software, and telecommunication companies devoted to advancing open standards for mobile devices. The first publicly available smartphone running Android, the HTC Dream, was released on October 22, 2008. Android's source code is released by Google under the Apache License; this permissive licensing allows the software to be freely modified and distributed by device manufacturers, wireless carriers and enthusiast developers. As of July 2013, Android has the largest number of applications, available for download in Google Play store which has had over 1 million apps published, and over 50 billion downloads. A developer survey conducted in April–May 2013 found that Android is the most used platform among developers: it is used by 71% of the mobile developers’ population. From astro 1.0 to kit Kat android make itself evolved. For evolving...
Words: 4974 - Pages: 20
...between Google Android and Apple iOSis one of the most talked after wars in mobile gadget platforms. The Google Android platform is increasingly becoming dominant in the smartphones and tablets market. Nokia, a once leading company in the mobile phone market is slowly entering the smartphone market with a new range of Lumia smartphones powered by Windows 8 mobile as it phases out its range of Symbian powered smartphones. Equally, Motorola Mobility is trying to gain a share of the market by increasing its product portfolio of smartphones in the Droid family. The Android Operating System powers the Droid range of smartphones. Samsung is by far the largest mobile manufacturing company in the world with a full range of Android powered smartphones in the Galaxy family. The recent entry of the Samsung Galaxy SIII heightened the competitive advantage of the Android Software Platform based on the Android 4.0 (Ice Cream Sandwich) software. With HTC,Blackberry OS, and Microsoft Mobile as a distant competitors, the war is clearly not between mobile phone manufacturers but the war is between software manufacturers, and in this case,Apple iOS and Google Android (Katie, 2012). Currently, the competition between Apple iOS and Google Android is so close such that it becomes difficult to tell the superior operating system (Ian, 2011). Undeniably, each mobile platform has its strengths and weaknesses. Advantages of Android OS over Apple iOS For Consumers Devices running the Android Operating System...
Words: 2155 - Pages: 9
...Student’s Name: Date: ITS111 – Introduction to IS Security Seminar One – Security in the News Attack 1 Title: Home Depot Hit By Same Malware as Target Type of Attack Description: BlackPOS infects computers running Windows that are part of POS systems and have card readers attached to them. Once installed on a POS system, the malware identifies the running process associated with the credit card reader and steals payment card Track 1 and Track 2 data from its memory. This is the information stored on the magnetic strip of payment cards and can later be used to clone them. Attack Description: Its a new variant of “BlackPOS” (a.k.a. “Kaptoxa”), a malware strain designed to siphon data from cards when they are swiped at infected point-of-sale systems running Microsoft Windows. Attack 1 Reference(s) Constantin, L. (2013). Krebs on Security. Retrieved from http://krebsonsecurity.com/2014/09/home-depot-hit-by-same-malware-as-target/ Attack 2 Title: The Sony Pictures hack, explained Type of Attack Description: hackers implanted Wiper on Sony's computer infrastructure, a malware software program designed to erase data from the servers. That malware uses Microsoft Windows’ own management and network file sharing features to propagate, shut down network services, and reboot computers Attack Description: It was an attack by North korea in response to the movie “The Interview” a comedy about a plot to assassinate North Korean leader. The attackers stole huge...
Words: 884 - Pages: 4
...Personalized Optimization for Android Smartphones WOOK SONG, YESEONG KIM, HAKBONG KIM, JEHUN LIM, and JIHONG KIM, Seoul National University As a highly personalized computing device, smartphones present a unique new opportunity for system optimization. For example, it is widely observed that a smartphone user exhibits very regular application usage patterns (although different users are quite different in their usage patterns). User-specific high-level app usage information, when properly managed, can provide valuable hints for optimizing various system design requirements. In this article, we describe the design and implementation of a personalized optimization framework for the Android platform that takes advantage of user’s application usage patterns in optimizing the performance of the Android platform. Our optimization framework consists of two main components, the application usage modeling module and the usage model-based optimization module. We have developed two novel application usage models that correctly capture typical smartphone user’s application usage patterns. Based on the application usage models, we have implemented an app-launching experience optimization technique which tries to minimize user-perceived delays, extra energy consumption, and state loss when a user launches apps. Our experimental results on the Nexus S Android reference phones show that our proposed optimization technique can avoid unnecessary application restarts by up to 78.4% over the default...
Words: 10997 - Pages: 44