Ask a question from expert

Ask now

(PDF) Advanced programming language design

14 Pages4570 Words66 Views
   

Added on  2021-04-24

(PDF) Advanced programming language design

   Added on 2021-04-24

BookmarkShareRelated Documents
Advanced scripting languages
By
(Name)
(Course)
(Professor’s Name)
(Institution)
(State)
(Date)
(PDF) Advanced programming language design_1
Abstract.
Mobile devices have become part and parcel of out today lives, thanks to technology.
These devices run on operating systems such as android, windows or IOS with hardware
compatibility giving them the ability to connect to each other and to the internet for functions
and services such as data sharing, web browsing, email services, social media, entertainment
and google maps. The scope of mobile phone security threats covers hardware and software
related factors such as storage systems, network access and encryption. Several mobile
devices were taken as case studies for this research. The devices were analysed and tested for
both their security features and vulnerabilities for unauthorized access. We find that these
mobile devices have a lot of security vulnerabilities relating to data privacy, data leaks,
unauthorized access and malware.
Keywords.
Mobile devices, vulnerabilities, internet, encryption, privacy, unauthorized.
INTRODUCTION.
Mobile devices have evolved to become more efficient and perform computerized
capabilities and thus achieve more adoption in the public by the consumers from individual
persons, organizations and the governments and as such have become necessary companions
for these consumers at work or at home to perform tasks, entertain and socialize. Major
improvements have been made in the field relating to the hardware and software
compatibilities. These improvements have also enabled accomplishment of more advanced
tasks using the mobile devices. As an advantage, the improvements have also made the
mobile devices more attractive to attackers, Becher (2011).
Mobile devices run on different operating system platforms. Examples include
Windows, produced by Microsoft, Google’s Android and Iphone’s iOS. Android is the most
used and widely accepted operating system with thousands of companies use the platform to
produce and run their mobile devices such as smartphones, smart televisions, portable routers
and other physical entities connected to the Internet of Things. Android is an open source
project meaning that different users of the platform can edit and use it to suit their business or
personal needs and objectives in performing different functions and delivery of services. The
open source model has led to it being a prime target to attacks by malicious individuals using
(PDF) Advanced programming language design_2
mobile applications or network access using command execution to access and harvest the
user’s private data.
All the consumers of mobile devices are apprehensive about their data security,
accuracy and integrity. This provides a need to the producers of the mobile devices to
increase and improve the security features of the devices to meet the security needs of the
users. These obligations include data security, reduce data loss and leaks and prevent
unauthorized access by third party applications or individuals such as malware and spyware.
Stricter levels of security and protection should therefore be implemented more than what the
producers of the mobile devices are able to provide.
The ever increasing mobile technology to increase user productivity and efficiency
puts a need on the producers of mobile devices to properly secure their products. As an
example, user store private and confidential data on the hand held devices such as
smartphones not limited to bank account details and passwords that in malicious hands can be
devastating. The benefits of the mobile devices are numerous and worth however have been
thwarted by security risks leading to fraud, loss of privacy and data losses.
The scope of the mobile device security investigation.
Digital investigation of the mobile system security vulnerabilities includes the
scientific techniques and practices used in the determining the functionalities of the device
and the security loopholes left behind. The world has shifted from the internet and world
wide web to a mobile society where almost all tasks are accomplished using the mobile
devices such as smartphones. These mobile devices are used to access information from the
internet that was done by the computers in the older days. Most mobile devices consumers
use the gadgets in their day to day activities and therefore the devices receive, generate and
store more and more of the users’ private data. With the need to protect their data, mobile
device security becomes a human need and primary enforcer and not a human want nor
secondary enforcer, Ghosh & Swaminatha (2011). This paper reviews to determine the
overview of mobile device security including the application layer, data link layers and
storage services of the applications installed and running on the devices. The research further
focuses on the attack made using third party applications such as web browsers and the
mobile application user as an attack enabler. The paper intends to show the main aspects of
the security of mobile devices that exposes the users to the risks involved.
(PDF) Advanced programming language design_3
The ebb and flow examine proposes, utilizing a benchmarking and exploitative tools
technique to enable the planning of a measurable, presentable and applicable examination to
cell phones with Android working framework; in view of the chain of care rules, consistence
stages, and stages and to identify discoveries, dissentions, find vulnerabilities. In light of this
procedure, we can decide the starting point of the main sources of various kinds of occasions
or targets directed towards a cell phone as a mobile device. Also, utilizing a choice lattice, the
best programming for playing out the scientific examination is picked and utilizing Balanced
Scorecard, markers are assessed.
The research focused on the different mobile threats prevalently are categorized into
three:
The threats originating from the installation and use of mobile applications which
include adware, malware and spyware.
Threats arising from the connection of the mobile device to the internet on different
networks such as data loss, unauthorized access, data leaks and “man-in-the-middle”
eavesdrop.
Physical vulnerabilities of using small, portable handheld devices such as getting lost,
water and dust destruction and theft.
This paper focuses on the mobile security that is specific to the mobile devices and not how
the normal security of other computer systems can be implemented to the field and offer
protection to the user data.
Literature review.
In the paper by Shon & Choi (2017, September). “Mobile Phone Usage Patterns,
Security Concerns, and Security Practices of Digital Generation” by Sonya Zhang and Saree
Costa, the authors determined the patterns of use of the mobile devices by the students. The
randomly selected 262 students, were also interviewed about their mobile device practices
and security concerns. The study concluded that mostly the students used their devices for
entertainment and productivity purposes. The authors determined that most mobile device
consumers are aware of the security threats involved with using the devices from the physical
risks of theft to online and application threats. The participants ranked data privacy as the
primary threat they were worried of. In so doing, the participants regularly updated the
software component of their mobile devices and used passwords and pin codes to secure the
(PDF) Advanced programming language design_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Mobile Application Threat Modeling
|14
|3127
|21

Implementation of Bitdefender GravityZone Business Security for IT Security Requirements
|8
|1359
|146

Comparison of Smart Phone OSs
|4
|660
|80

Smartphone Operating System and Security: A Comparative Study
|7
|1257
|77

Mobile Device Security NAME OF THE STUDENT NAME OF THE
|9
|476
|39

Cyber Defense in Web Based Attacks Report 2022
|4
|728
|16