wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Smartphone Security: Vulnerabilities and Attacks

profile
Srinidhi Shetty
Oct 20, 2021
0 Likes
0 Discussions
71 Reads


Application in the smartphones have become in the recent years. Smartphone have provided many services like mobile payment system, application market(i.e playstore). Also the no of vulnerabilities of application is also increasing. so in this research i had tried to cover the Vulnerabilities & solutio for smartphone security.

 

Smartphone provide many feature as a result they have become perfect target for different virues & Vulnerabilities. According to a research study 80-90% android mobiles in market are more vulnerable to security issues than IOS in Iphone.

 

Smartphone OS : is a system software that run on smartphone & allows them to execute the applications.

 

Smartphone OS Feature : Since every OS provides different features they can provide camera, fingerprint, sensor support as well as works with hardware features also.

 

Types of OS : Android & IOS
These 2 OS are majorly used OS.Both the OS have 4 layers.

 

Android
Linux Kernel -In charge for power management,  Virtual memory & network
Libraries - different libraries have differnt function in Andriod mostly libraries are java based.
Java API framework - used for creating Androi Application
System Apps - since it supports 3rd party application also there are different layers in android security like
security at OS level, Mandatory application sandbox, secure inter process, Application signing, Application-defined & user-granted.

 

IOS
Core OS - low level feature like bluetooth framework.
Core Service-high level feature like cloud kit framework 
Media Layer -includes game kit helps in using music,animation, videos etc.
Cocoa Touch - framework used for creating IOS application

 

MALICIOUS ATTACKS - below are few malicious attacks
Malicious Applications - Malware,Virus,Spyware,Trojan
Software Vulnerabilities - Adware apps, Fake apps, Backdoor
Threats or Attacks - Social Engineering, Phishing app, Man-In-The-Middle (MITM), Mobile botnet

 

MOST WANTED MOBILE MALWARE FAMILIES
Triada is one of the most wanted malware which was supported on Android OS.This malware uses a backdoor to infect OS processes and provides a remote access for stealing money from users.

 

SECURITY SOLUTIONS FOR SMARTPHONES
Malware Detection Techniques -Signature based techniques, Machine learning based techniques

 

Countermeasures against Malware -The users’ knowledge about Smartphones malicious risks, Install apps from trusted sources, The security of wireless networks, Prevent Root (Android) and Jailbreaking (iOS), Keep smartphone OS up to date, Encrypt Smartphone, Encourage Smartphone Users to Install Mobile Security Software

 

CONCLUSION -we examined current viable solutions for smartphone users by concentrating on existing mechanisms, and we proposed some future paths for cyber security experts to enhance this study field.


Comments ()


Sign in

Read Next

Principal of concurrency

Blog banner

Concurrency management in operating systems

Blog banner

Corporate Discipline.

Blog banner

National Payments Corporation of India-Rupay - Gayatri Nayak

Blog banner

MAHAKAL LOK UJJAIN

Blog banner

Ethical Issues in Data Science and Role of Data Science in Smart Cities

Blog banner

Social Media.

Blog banner

Top 5 Post-Wedding Skin Care Tips

Blog banner

Evolution of Operating Sytems

Blog banner

Memory management

Blog banner

Esri India launches Policy Maps.

Blog banner

MAILFENCE

Blog banner

A True Friendship

Blog banner

Importance Of Education.

Blog banner

Types of Malware in Cyber Security

Blog banner

Kernel Memory Allocation In Linux.

Blog banner

Different types of scam frauds

Blog banner

Direct Memory Access

Blog banner

Amazon

Blog banner

INTERNET SECURITY

Blog banner

10 Rare Historic Pictures that are Ever Captured

Blog banner

INTRODUCTION TO C#

Blog banner

The Future of Cybersecurity: Trends, Challenges, and Strategies

Blog banner

The art of living with machines...

Blog banner

How to Find the Right Therapist For Me?

Blog banner

Meal Maharaj — 3 CP, 5 CP, 8 CP. Same Love, Different Portions

Blog banner

Virtual Machine's

Blog banner

Deadlock and Starvation

Blog banner

Who decides your overthinking, anyway?

Blog banner

Synchronization

Blog banner

E-commerce

Blog banner

Modern operating system

Blog banner

Why am I never satisfied with my Life?

Blog banner

Metasploit

Blog banner

Honeypot in cyber security

Blog banner

Multiple processor scheduling

Blog banner

Binary Search Tree (BST) in Data Structure

Blog banner

Whatsapp Messenger

Blog banner

E-security systems | CCTV

Blog banner

Deadlock

Blog banner

virtual machines and virtualization

Blog banner

Uber

Blog banner