Preview

Threat Analysis of the Android Market

Better Essays
Open Document
Open Document
1039 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Threat Analysis of the Android Market
Threat Analysis of the Android Market | ANDROID MARKET
In keeping with the Open Handset Alliance goals of Android being the first open, complete, and free platform created specifically for mobile devices, Google offers the Android Market. The Android Market offers the ability for developers to create any application they choose with the community regulating whether the application is appropriate and safe, as opposed to relying on a formal screening process.
The pros and cons of this open approach to an application store have been discussed in great detail. Notwithstanding, Spyware and other malicious applications have made their way onto even controlled application stores and these controls have not negated the need for mobile device security software, such as Anti-Malware applications. The desire for open source applications by mobile device owners on even strictly controlled operating systems is evidenced by the vast amount of iPhone devices that are jailbroken to allow for the running of out-of-market applications which have not been approved by Apple.
The Android Market offers flexibility that markets such as the Apple App Store do not by allowing anyone to develop and publish an application to the Market’s consumers. This presents the opportunity to easily defraud innocent consumers for financial gain. Financial gain drives the paradigm of information security and attackers now see consumer and enterprise smartphones as targets. Since today’s Smartphone devices are the equivalent of mobile computers, it is logical that attackers have expanded their focus from PC-based malware to Smartphone malware and an open application repository lends itself to these types of attackers.

ANDROID MARKET SECURITY MODEL
The Android Market relies on the community to identify and flag applications that either malfunction or are malicious in nature. This would imply that there will always be a window where a number of consumers would need to use, test and determine if an

You May Also Find These Documents Helpful

  • Satisfactory Essays

    In this article, the authors not only cite the article by A. Fishman and M. Marquis-Boire but also used their own thoughts to make their story effectively “Cyanogen Mod is an open-source firmware distribution based on Android that lets users install apps without granting all requested permissions.” and “Blackphone has an OS that is based on a fork of Android. / Despite the Blackphone’s focus on security, a data-type confusion vulnerability in its code was disclosed and fixed in January 2015. The vulnerability could have allowed remote attackers to execute arbitrary code on Blackphones.” (3), these stories will cause attention to the readers…

    • 143 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    CIS 500 Term Papaer

    • 3105 Words
    • 10 Pages

    "Lookout 's State of Mobile Security Identifies Malware Designed for Profit and Privacy as 2012…

    • 3105 Words
    • 10 Pages
    Powerful Essays
  • Satisfactory Essays

    “A mobile application, most commonly referred to as an app, is a type of application software designed to run on a mobile device, such as a smartphone or tablet computer. Mobile applications frequently serve to provide users with similar services to those accessed on PCs. Apps are generally small, individual software units with limited function. Mobile applications are a move away from the integrated software systems generally found on PCs. Instead, each app provides limited and isolated functionality such as a game, calculator or mobile Web browsing. Although applications may have avoided multitasking because of the limited hardware resources of the early mobile devices, their specificity is now part of their desirability because they allow consumers to hand-pick what their devices are able to do.” (Techopedia, N.D.)…

    • 749 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Fire Truck Crash

    • 318 Words
    • 2 Pages

    likely candidates to house malware, and often is difficult to distinguish the legitimate apps from fake…

    • 318 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Lawton, G. (2008). Is it finally time to worry about mobile malware? Computer, 41(5), 12-14.…

    • 781 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Android vs Iphone

    • 2355 Words
    • 10 Pages

    We really like that the Android operating system is open source, but what's more important to most end users is openness in terms of what you can run on these devices. The operating systems themselves are clearly important, but one thing's abundantly clear: the applications make the phone. And while Google has yet to get in hot water for rejecting apps based on anti-competitive fear or…

    • 2355 Words
    • 10 Pages
    Powerful Essays
  • Good Essays

    Social Security

    • 707 Words
    • 3 Pages

    The author stated in source 2 "Downloading and installing an application (or app, for short) could endanger your data privacy, too, if the app collects information from your cell phone without your permission. Some apps explicitly ask for permission to access your cell phone in different ways." This also means that some apps are not safe because they take in your personal information from your phone and your privacy is in danger. Hackers all over the internet waiting for something like this to happen because they see it as a opportunity When using the internet use the right websites so your personal information is…

    • 707 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Apple vs Android

    • 702 Words
    • 3 Pages

    Androids are popular for the designs and creative freedom they grant consumers. The ability to organize your home screen to fit your own personal needs invites a number of consumers to invest in Android smartphones. Apple’s “one software fits all” mentality is convenient for the average businessman or entrepreneur. On the other…

    • 702 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Androids vs Iphones

    • 1132 Words
    • 5 Pages

    Cited: “Android Market Tops 10B Downloads Google 458134”.eWeek 7 Dec. 2011. Academic OneFile. Web. 24 Mar. 2013.…

    • 1132 Words
    • 5 Pages
    Better Essays
  • Better Essays

    android

    • 1051 Words
    • 5 Pages

    term paper we have discuss the history of Android, the architecture on which it works? Various application developments like android market. The various GUI android challenges faced by…

    • 1051 Words
    • 5 Pages
    Better Essays
  • Better Essays

    The Web app resides on server and is accessed via the Internet. It performs specified tasks – potentially all the same ones as a native application – for the mobile user, usually by downloading part of the application to the device for local processing each time it is used. The software is written as Web pages in HTML and CSS, with the interactive parts in Java. This means that the same application can be used by most devices that can surf the Web (regardless of the brand of phone)”, (www.eweek.com).…

    • 2082 Words
    • 9 Pages
    Better Essays
  • Good Essays

    “They have an app for that” is the mantra of most smartphone users, but an improperly configured smartphone can be an open invitation to hackers looking for easy information. Today’s modern smartphone can do anything from controlling your home computer to handling your online banking to watching TV to making video calls. With all the features included in them, they are very easy to stockpile important (and sometimes sensitive) information about the user. Since smartphones are essentially tiny computers, they suffer the same vulnerabilities of PC’s, including viruses, malicious applications, and hacking. If there is the tiniest flaw in the smartphone’s armor, hackers can gain access and take an enormous amount of data from it.…

    • 913 Words
    • 4 Pages
    Good Essays
  • Better Essays

    Throughout the last few years, jail-breaking portable devices has become a new platform which individuals use to share files. Although it’s legal to jail-break your iPhone or Android, there are many arguments on the ethics of doing so. Some people believe that it is ok to jailbreak to the extent you don’t cause businesses or app developers to lose profit. While others argue that jail-breaking is just a tool used to enjoy your device and explore the cool features it has. However, jail-breaking your device excludes the limitation in which it can function. It gives you the ability to “install software from sources other than the Apple’s App Store.” In addition, “It allows apps to access the iOS filesystem…

    • 1969 Words
    • 8 Pages
    Better Essays
  • Better Essays

    Travel Advisory

    • 4474 Words
    • 17 Pages

    (U) This report analyzes the newly launched Google Voice service, which is a unified communications service that is currently in closed beta testing and is only available to users invited by Google. A general description of Google Voice is provided, and the use of Google Voice by small businesses is introduced as a likely popular use of the service once it is officially launched to the general public. The various services and applications are described in detail. General privacy and security issues are described. The service is currently available only in the US.…

    • 4474 Words
    • 17 Pages
    Better Essays
  • Powerful Essays

    The security upgrades in Android Lollipop are expected to let clients inhale less demanding if their gadgets are lost or stolen, yet protection promoters are cheering them—and additionally comparable late changes from Apple. A little yet critical change that showed up decisively in Android 4.4 Kitkat, Selinux is a Linux-based construction modelling intended to ensure such frameworks from benefit rise assaults. Not new by any methods, yet judging from Google's short comments in Android 5.0 this goes structure being conceivable to obligatory for all applications. Tightens up security against programming vulnerabilities and astute malware…

    • 1120 Words
    • 5 Pages
    Powerful Essays