logo

Mobile Device Security

   

Added on  2023-03-17

7 Pages1761 Words87 Views
 | 
 | 
 | 
Running head: MOBILE DEVICE SECURITY
MOBILE DEVICE SECURITY
Name of the Student
Name of the Organization
Author Note
Mobile Device Security_1

1COMPUTER NETWORKING AND APPLICATION
Introduction
The main aim of the paper is to help in providing an entire overview of the security
ecosystem of the mobile device and also in identifying all the top challenges of security. The
particular security of mobile device mostly involves the entire ecosystem of mobile which
involves the endpoint device as well as the security of data, secular sharing of information and
also a secure access for a number of applications of the enterprise and data. It also involves
secure testing, development which is secure and also the delivery of several applications with the
help of a number of app stores as well as several websites (Chen et al. 2015). This paper will be
comprising of some sections and each will be describing a huge area of concern in the security of
mobile device.
Discussion
App Stores and the malware
It has been observed that there are a number of sources which have the capability of
citing a rise in the malware of mobile device. It has been examined a number of times that there
are some statistics as well as trends for several infections of malware in a number of devices
which are seen to be connected via some fixed networks and mobile devices (Sinha and Zscaler
Inc 2015). It has been seen that most of the malware of android is recently distributed as several
apps which are trojanized and Android has the capability of offering an easier target for mainly
this due to the open environment of the application. Several apps of Android are seen to be
downloaded from all the stores of app as well as websites belonging to the third party (Patten and
Harris 2013). There is no such control of all the certificates which are digital mainly used for
signing several apps of Android. Apps of Android are mainly known for being self-signed and it
Mobile Device Security_2

2COMPUTER NETWORKING AND APPLICATION
cannot be easily traced to all the developers. It has been become very much easy for hijacking
any app of Android, injecting code within it and also for redistributing it. In such a situation, an
innovative detection technique of malware named MassVet can be utilized for comparing an app
which has been already submitted with some other apps upon a market by focusing upon all its
differences with all of them possessing a similar kind of the structure of UI as well as
interactions with others (Mahaffey, Hering and Burgess 2013). It has been seen that this
particular technique of the detection of malware has been used a lot for analyzing about 1.2
millions of applications and has been able to discover a huge number of apps which are highly
malicious apps.
Storage security
It has been reported by some authors that in the year 2014, huge number of users have
spent about 96% of their time on all the mobile devices by using all the different mobile apps. In
all the applications of browser which are mainly traditional, it has been noticed that there is a
tendency of all the data to be easily stored upon the side of the server where a number of tough
controls can be highly enforced (A. Harris and Patten 2014). All the devices of mobile are
utilized in a number of unique ways which has been making it quite a challenging one for storing
data securely. The main challenge for the encryption of data is actually the key storage. On all
the devices of mobile, the key of encryption is required to be available for accessing data for all
the different users. Storage of the key of encryption on a server which is remote does not mean
generally that it will be solving the problem because any attacker who will be having the access
to the particular device can be able to request simply for the key of encryption from that
particular server and finally decrypt the data (Ramalingam, Walsh and Carr Amazon
Technologies Inc 2013). It has been observed that most of the devices of mobile will be making
Mobile Device Security_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Mobile Device Security NAME OF THE STUDENT NAME OF THE
|9
|476
|39

Mobile Application Security: Malware Threats and Defenses
|6
|1508
|435

Mobile Application Security: Malware Threats and Defenses
|7
|6648
|56

Cyber Security Laws and Regulations
|15
|5469
|290

Method to Detect and Mitigate Data
|13
|2575
|61

Mobile Application Threat Modeling
|14
|3127
|21