Preview

Android Hacking and Security Research Paper

Powerful Essays
Open Document
Open Document
1705 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Android Hacking and Security Research Paper
Android Hacking and Security

Donna McDuffey
Kentucky State University Graduate Student
Nicholasville, KY
859-382-3480
donna.mcduffey@kysu.edu

ABSTRACT
An introduction to the security risks to android users, how hackers target these platform devices, and how users can better protect themselves and sensitive data.
Categories and Subject Descriptors
Introduction
Android Platform introduction
Android Security Features and Shortcomings
Types of Android Hacking
Android Security Measures to Prevent Hacking
General Terms
Android, Android Hacking, Android Security
Keywords
Android, security, android security, hacking, android hacking, user settings, personal data and mobile devices, mobile device security, open source, wireless security.
1. INTRODUCTION
In this research paper, I will review security issues for mobile devices using the Android platform specifically. I’ll detail threats and vulnerabilities and how android device users can better secure their devices and data.
2. ANDROID BASICS
Android is a mobile operating system. The OS was developed by Android, Inc. who was eventually bought by Google. Android is an open source platform, which means the OS can be customized by anyone. Anyone can develop for Android and all the developer tools are free to access and download.
2.1 Android vs. Other Mobile OS
There are different types of mobile operating systems. Android and iOS by Apple, are the two main offerings on the market today. As of 2013 over 60% of all smart phones purchased were android devices [8]. Windows is now producing a mobile OS that resembles the desktop version their users are accustomed to. Currently, there are not many offerings for devices or applications, although it is an emerging market. The unique aspect of Android is that it is an open source operating system, which anyone with the right tools can customize.

2.2 Android Rooting and Modification
Often, individual mobile service providers and manufacturers modify the OS on the devices



References: [1]Indiana University. 2011. “How Can I Protect Data on my Mobile Device.” Web. https://kb.iu.edu/d/bcnh. [2]Lookout Mobile. 2014. “Mobile Security Technology”. Web. https://www.lookout.com/mobile-security-technology/. [3]Mittal, S. 2014. InfoSec Institute. “Android Application Security Testing.” Web. 17 February 2014. http://resources.infosecinstitute.com/android-application-security-testing-guide-part-1/. [4]Mossman, M. 2011. InfoSec Institute. “Android Security: Taking Control.” Web. 11 May 2011. http://resources.infosecinstitute.com/android-security-take-control/ . [5]Mossman, M. 2011. InfoSec Institute. “Android Security: Tips and Settings.” Web [6] Paul, I. 2013. PCWorld. “Security to go: Three tips to keep your mobile data safe.” Web. 15 October 2013. http://www.pcworld.com/article/2052810/security-to-go-three-tips-to-keep-your-mobile-data-safe. /. [7]Taous, T. 2014. Sitepoint. “A Brief Guide to Rooting Android.” Web. 5 June 2014. http://www.sitepoint.com/brief-guide-rooting-android/. [8]Violino, B. 2013. Infoworld. “A Clear-Eyed Guide to Android’s Actual Security Risks”. Web. 9 December 2014. [9]Wikipedia. 2014. “Rooting (Android OS)”. Web. Accessed 19 November 2014. http://en.wikipedia.org/wiki/Rooting_%28Android_OS%29.

You May Also Find These Documents Helpful

  • Powerful Essays

    Cited: 4. ”A clear-eyed guide to Android 's actual security risks." InfoWorld. N.p., n.d. Web. 27 Apr. 2014. <http://www.infoworld.com/d/mobile-technology/clear-eyed-guide-androids-actual-security-risks-232034>.…

    • 4860 Words
    • 14 Pages
    Powerful Essays
  • Powerful Essays

    Securing Mobile Devices. (n.d.). Information Technology - Information Security – Information Assurance | ISACA. Retrieved from http://www.isaca.org/Knowledge-Center/Research/ResearchDeliverables/Pages/Securing-Mobile-Devices.aspx…

    • 1427 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    References: Milligan, P., & Hutcheson, D. (2008). Business risks and security assessment for mobile devices, Audit and Control Association. www.isaca.org…

    • 610 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Fire Truck Crash

    • 318 Words
    • 2 Pages

    safeguard personal and business data. Mobile security apps can lock a mobile device remotely, erase its…

    • 318 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Ben-Asher, N., Kirschnick, N., Sieger, H., Meyer, J., Ben-Oved, A., & Moller, S. (2011). On the need for different security methods on mobile phones. Proceedings of the 13th International Conference on Human Computer Interaction with Mobile Devices and Services, Stockholm, Sweden. 465-473. doi: 10.1145/2037373.2037442…

    • 781 Words
    • 4 Pages
    Good Essays
  • Better Essays

    The term mobile devices are not limited to cellphones; they include iPads, iPods, Laptops, PDAs and e-Readers. These devices act as a lifeline to the outdoor world, and are frequently used for navigating, social networking, shopping, banking and business purposes. What is often forgotten about these devices is that they are gateways to hackers. “Mobile devices can be used by a hacker as an access point into many other aspects of your digital life as well the lives of others in your network, making mobile security about more than just protecting your phone,” (Certic, 2013). Mobile Technology became widely accepted by most of the world in the early 1980’s and since then, the evolution of technology has shown substantial growth. “Worldwide smartphone sales reached 144.4 million units in the first quarter, a 45% increase year over year, research firm Gartner reported. Tablet shipments jumped 120%, to 17.4 million units worldwide, according to a report from research company IDC,” (Drew, 2012). In 2013, over 80% of the world’s population uses a mobile phone and to date there are more than 6 billion mobile devices in the world. Concerns regarding cancer in relation to frequent use and security risks associated with the ability to protect the user’s information are controversial.…

    • 1441 Words
    • 6 Pages
    Better Essays
  • Good Essays

    Mobile devices have been a part of our everyday life. Consequently, Security is becoming increasingly prominent features on mobile devices. In this project we will develop a jail security system that interface with an Android mobile device. The mobile device and jail security system communicate via WI-FI. The mobile application can be interface with the security system. Commands to lock, unlock, or check the status of the door, to turn on/off the alarm, to increase/decrease the fencing power supply, control of surveillance to which the security system is installed can be sent quickly from the mobile device via a simple, easy to use GUI. The security system that acts on these commands taking the appropriate action and sending a confirmation back to the mobile device. The security system also incorporates a traditional lock and key interface in case lose the mobile device.…

    • 963 Words
    • 4 Pages
    Good Essays
  • Good Essays

    As Hong Leong group’s business relies on then use of mobile devices to interact with customers, the threat becomes high. Cyber criminals can inject virus or malware in the smartphones and make the phone unresponsive to the user. He can access user information from the phones through certain malicious programs and thus steal user identity. He can also manipulate the phone as his own to send SMS and spam mails and even make phone calls (Seals, iPhone-targeting XcodeGhost Malware Infiltrates US Enterprises, 2015).…

    • 856 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Android devices are powerful mobile computers with permanent internet connectivity and a rich variety of built-in…

    • 5920 Words
    • 24 Pages
    Powerful Essays
  • Powerful Essays

    Abstract—Distributed system are becoming a paramount important nowadays. The new technology era become one of high impact in global market. Recently, mobile code has been one of the technological answer of smart technology problem. In this work is explain about mobile code in distributed application with some examples of application and also security issues about the mobile code itself.…

    • 1109 Words
    • 5 Pages
    Powerful Essays
  • Powerful Essays

    mobile

    • 2906 Words
    • 12 Pages

    Methodology Plan 1 Context and objectives 2 Android introduction 3 Android security model 4 Methodology 5 Toward a backdoor without permission 6 Post-exploitation 7 Scope of the vulnerabilities 8 Conclusion Toward a backdoor without permission Post-exploitation Android introduction Android security model…

    • 2906 Words
    • 12 Pages
    Powerful Essays
  • Best Essays

    cow papper english

    • 1388 Words
    • 6 Pages

    National Science Foundation. (2010). Can Clever Hackers Target Smart Phones? Retrieved August 27, 2010, from http://www.nsf.gov/news/news_summ.jsp?cntn_id=116723…

    • 1388 Words
    • 6 Pages
    Best Essays
  • Good Essays

    Current Event

    • 670 Words
    • 3 Pages

    More than 90 percent of American adults own a mobile phone, and more than half of the devices are smartphones. But “smartphone” is a misnomer. They are personal computers that happen to include a phone function, and like any computer they can store or wirelessly retrieve enormous amounts of personal information: emails, photos and videos; document files; financial and medical records; and virtually everywhere a person has been.…

    • 670 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Tom M and Jennifer V. (2014, November, 21). Your apps are watching you - WSJ:…

    • 2925 Words
    • 10 Pages
    Powerful Essays
  • Satisfactory Essays

    It has a range of products available to cover different needs, from premium services to businesses and basic antivirus software for home use. The most popular products from the security retailer include the following:…

    • 964 Words
    • 4 Pages
    Satisfactory Essays