System Management : Discussions

   

Added on  2022-09-11

4 Pages604 Words25 Views
Running head: SYSTEM MANAGEMENT
SYSTEM MANAGEMENT
Name of the Student
Name of the University
Author Note
System Management : Discussions_1
SYSTEM MANAGEMENT 1
Discussions
1. The escalation of privileges is only made possible due to new kind of weakness known as
pileup flaws. Under proper conditions, updating the android device can enable an attacker
to escalate the privileges of an application can carry out all kinds of harmful activities [1].
A group of researchers has recognized six pileup flaws in the android PMS and that
exposes nearly 1 Billion devices based on Google.
2. The research paper shows that it is possible to use the vulnerabilities of package
management services of android, the collection of tools in order to automate the
procedures of installing, updating, configuring and then removing the packages of
software for the devices of android [2]. The flaws of pileup permit the escalation of
privileges through the procedure of updating. The pileup flaws permit a hacker in order to
escalate, settings and signature for an application that is malicious and it can be utilised in
order to steal the data of the user
3. The application of android sandbox isolates the data of the application and the execution
of code from various other applications. A framework of application with robust
deployments of the security functionality such as permissions, cryptography and secure
IP. The permissions those are granted by user in order to restrict admittance to the
features of the system and the data of the user [3].
Sandboxing safeguards the important architecture of the organization from doubtful code
as it executes in a separate system. It also permits IT in order to test malicious code in an
environment of testing that is isolated in order to understand the way it works in a system
and detect the same attacks of malware.
4. The SecUp scanner is a vulnerability scanner that is used in order to detect the
vulnerability of a system. The architecture of the SecUp scanner consists of the user
System Management : Discussions_2

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Operating System Security
|10
|2330
|405

Smartphone Operating System and Security: A Comparative Study
|7
|1257
|77

Cyber Security Attacks and Techniques
|14
|1105
|277

Ensuring Security of the System from Malware and Virus Attacks
|4
|727
|345

Penetration Testing Report
|16
|2973
|89

Empirical Study into the Security Exposure
|33
|7577
|40