logo

Mobile Applications Security

   

Added on  2023-03-23

9 Pages2657 Words64 Views
Running head: MOBILE APPLICATIONS
MOBILE APPLICATIONS
Name of Student
Name of University
Author’s Note

1MOBILE APPLICATIONS
Introduction
Mobile employee security include the process of examination of the overall structure
of various mobile applications and then carrying out a study of how they actually work along
with focusing at vital areas of threats and what various hackers as well as numerous attackers
want to obtain. Various security experts had developed numerous assessments on the basis of
threats such as theft to any sort of financial data or some personal identifiers or the
unauthorized access to various devices (Chen, Qian and Mao 2016). Areas that are covered
by various security of mobile application are threat modelling, risk analysis and source code
review. Developers might concentrate at various areas like database, configuration files or
cache, risk analysis and many more or at various underlying platforms in order to understand
the ways that can be used for the purpose of protecting mobile applications as well as devices
from numerous vulnerabilities (Delac, Silic and Krolo, 2011). This assignment deals with
choosing two scholarly articles that reflects on the concept of mobile applications security.
This assignment also presents a critique on both the papers. The assignment discusses
regarding the issues stated in the papers, it also represents if the research covers the present
research literature for the research questions. It further presents the methodology that has
been presented in the papers and many similar factors related to the papers.
Critique body
The research questions that have been presented in these papers are very clearly
stated, they are significant as well because this particular assignment deals with the concept
of security of mobile applications (Delac, Silic and Krolo, 2011). These papers describe the
fact that when compared to various traditional phones, which usually provided only
telephony functions, smart phones are computing as well as communicating devices which
support communications that also provides multimedia communication for the purpose of

2MOBILE APPLICATIONS
work as well as entertainment (Chen, Qian and Mao 2016). It also describes the fact that
because of quantum jump in the functionality, the overall rate of the process of upgrading the
traditional phones to various smart phones is huge. One more point that has been presented in
these papers which also provides the maximum level of significance to the papers is the fact
that though the mobile platform has been very rich in basic features, it could be extended
with the help of installation of applications, the papers represent some research questions
such as which applications increases the vulnerability of the devices along with the data in it
(Delac, Silic and Krolo, 2011). They are mainly vulnerable because besides using computing
power that is provided by the mobile devices, the attackers aim in targeting the data, this
happens because the smart phones have become the storage units for personal data through
the use of numerous social networking applications, email clients and personal organizers.
These papers represent a particular attacker centric threat model for various mobile platforms
(Delac, Silic and Krolo, 2011). The threat model aims in addressing three major issues of
mobile devices security, the goal of attackers, mobile malware and attack vendors. Firstly it
aims in defining the motives for attacking the mobile platforms for identifying the interest of
attackers as well as their potential targets.
The main attack goal is dedicated on motives that are been introduced by various
modern mobile phones as well as devices (Delac, Silic and Krolo, 2011). Secondly, the model
aims in incorporating various attack vendors for presenting possible entry points for various
malicious content on the devices. After these, the model then considers various types of
threats that are applicable to the mobile platforms in case the presented attack vendors have
been utilized in a successful manner.
The research describes regarding the existing research literature that is relevant, for
the research questions, it presents the research that has been carried out by various
researchers regarding the attacks that had been taken place previously, and these attacks had

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Cyber Issues in Smart Home Appliances of IoT
|26
|7130
|13

Smartphones Security Issues and Mitigation Tools
|10
|706
|305

Mobile Phone Security: Enhancing Device Security Measures
|17
|3756
|495

Mobile Device Insecurities and Vulnerabilities
|9
|1641
|120

Network and Security
|15
|3266
|22

Classification of Bluetooth Smart Technology Attacks and Defenses
|29
|5740
|58