wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Smartphone Security: Vulnerabilities and Attacks

profile
Srinidhi Shetty
Oct 20, 2021
0 Likes
0 Discussions
71 Reads


Application in the smartphones have become in the recent years. Smartphone have provided many services like mobile payment system, application market(i.e playstore). Also the no of vulnerabilities of application is also increasing. so in this research i had tried to cover the Vulnerabilities & solutio for smartphone security.

 

Smartphone provide many feature as a result they have become perfect target for different virues & Vulnerabilities. According to a research study 80-90% android mobiles in market are more vulnerable to security issues than IOS in Iphone.

 

Smartphone OS : is a system software that run on smartphone & allows them to execute the applications.

 

Smartphone OS Feature : Since every OS provides different features they can provide camera, fingerprint, sensor support as well as works with hardware features also.

 

Types of OS : Android & IOS
These 2 OS are majorly used OS.Both the OS have 4 layers.

 

Android
Linux Kernel -In charge for power management,  Virtual memory & network
Libraries - different libraries have differnt function in Andriod mostly libraries are java based.
Java API framework - used for creating Androi Application
System Apps - since it supports 3rd party application also there are different layers in android security like
security at OS level, Mandatory application sandbox, secure inter process, Application signing, Application-defined & user-granted.

 

IOS
Core OS - low level feature like bluetooth framework.
Core Service-high level feature like cloud kit framework 
Media Layer -includes game kit helps in using music,animation, videos etc.
Cocoa Touch - framework used for creating IOS application

 

MALICIOUS ATTACKS - below are few malicious attacks
Malicious Applications - Malware,Virus,Spyware,Trojan
Software Vulnerabilities - Adware apps, Fake apps, Backdoor
Threats or Attacks - Social Engineering, Phishing app, Man-In-The-Middle (MITM), Mobile botnet

 

MOST WANTED MOBILE MALWARE FAMILIES
Triada is one of the most wanted malware which was supported on Android OS.This malware uses a backdoor to infect OS processes and provides a remote access for stealing money from users.

 

SECURITY SOLUTIONS FOR SMARTPHONES
Malware Detection Techniques -Signature based techniques, Machine learning based techniques

 

Countermeasures against Malware -The users’ knowledge about Smartphones malicious risks, Install apps from trusted sources, The security of wireless networks, Prevent Root (Android) and Jailbreaking (iOS), Keep smartphone OS up to date, Encrypt Smartphone, Encourage Smartphone Users to Install Mobile Security Software

 

CONCLUSION -we examined current viable solutions for smartphone users by concentrating on existing mechanisms, and we proposed some future paths for cyber security experts to enhance this study field.


Comments ()


Sign in

Read Next

Hacking Mobile Platforms

Blog banner

The functions of operating system

Blog banner

Online Games

Blog banner

Virtual memory

Blog banner

?What Your Dentist Notices The Moment You Sit In The Chair

Blog banner

The evolution of OS

Blog banner

LEMON PICKLE (NIMBU KA ACHAR)

Blog banner

“CONSISTENCY” in Social Media Marketing

Blog banner

Memory Management

Blog banner

Time Series Analysis

Blog banner

Mumbai

Blog banner

Expressing and Measuring Risk (Risk Management)

Blog banner

What's Better : Supervised or Unsupervised Learning

Blog banner

Deadlock

Blog banner

Incident management in ITSM

Blog banner

Career v/s Job : Choose your passion

Blog banner

CONCURRENCY: MUTUAL EXCLUSION AND SYNCHRONIZATION-het karia

Blog banner

MODERN OPERATING SYSTEMS

Blog banner

ZOHO

Blog banner

OS Evolution Achievements

Blog banner

Deadlock

Blog banner

Virtual Memory

Blog banner

The Importance of Data Quality Management in Data Science

Blog banner

Explain Multiprocessors

Blog banner

Buffer Overflow

Blog banner

Self-love: Being the reason of your own smile

Blog banner

10 Unknown facts about India's Independence

Blog banner

Remote Work in 2026

Blog banner

Virtual memory

Blog banner

The Benefits of Practical Life Activities in Preschool

Blog banner

Concept and definition of m-commerce

Blog banner

"Audit" In Data Science

Blog banner

Why is ITSM important in IT organization?

Blog banner

Emotional Intelligence in Children: Why It Is as Important as Academics

Blog banner

Quality check in IT services

Blog banner

Memory management

Blog banner

GIS

Blog banner

TRELLO

Blog banner

Sensory Play for Toddlers: Boosting Curiosity Through Touch, Sound, and Colour

Blog banner

Raising Emotionally Intelligent Students: The Classroom Beyond Academics

Blog banner

INTERNET

Blog banner

Ethical Hacking

Blog banner