logo

Operating System Security

   

Added on  2023-04-25

10 Pages2330 Words405 Views
Running head: OPERATING SYSTEM SECURITY
Operating System Security
Name of the Student
Name of the University
Author Note:

1OPERATING SYSTEM SECURITY
Table of Contents
Introduction..........................................................................................................................2
Literature review..................................................................................................................2
Conclusion...........................................................................................................................6
References............................................................................................................................7

2OPERATING SYSTEM SECURITY
Introduction
Google Android is a Linux based operating device which is used in range of mobile
devices like smartphones and computers. Android is an open source operating system due to
which it has become as one of the fastest growing operating systems (Silberschatz, Gagne and
Galvin 2018). As a result of openness property, it has become the most favorite brand among
both consumers and developers (Canfora et al. 2015). Software developers can easily make
changes and improve the features so that they can meet the latest requirement of mobile
technology. Android users can easily download more than 1.5 billion application and games
from Google store every month (Ranganath et al. 2015). As a result of powerful framework, both
users and developers can create own application for wide range of devices. Android operating
system comes up with some unique features like media support, Bluetooth, GPS, SQLite, and
many other features.
In the coming pages, a literature review has been conducted security technologies of
android mobile. After that, a discussion has been provided with respect to threats, attacks in
mobile operating system. Various issues with respect to configuration or installation of google
android have been discussed in details. The last section of the report deals with vulnerabilities
and social issues with respect to Android operating system.
Literature review
According to (Shaw et al. 2016), Android-based application runs in operating system
which does not provide any kind of access to rest of system based resources. In some cases, it
can provide access to user that is when applications are installed in it (Arshad et al. 2018). Prior
to installation, Play store asks for all required information. For example, a game may require to

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
System Management : Discussions
|4
|604
|25

Different Mobile OS and its Security Issues
|4
|793
|214

Smartphone Operating System and Security: A Comparative Study
|7
|1257
|77

(PDF) Advanced programming language design
|14
|4570
|66

Operating System of Android Phones
|4
|808
|198

Mobile Application Security: Malware Threats and Defenses
|7
|6648
|56