wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Smartphone Security: Vulnerabilities and Attacks

profile
Srinidhi Shetty
Oct 20, 2021
0 Likes
0 Discussions
71 Reads


Application in the smartphones have become in the recent years. Smartphone have provided many services like mobile payment system, application market(i.e playstore). Also the no of vulnerabilities of application is also increasing. so in this research i had tried to cover the Vulnerabilities & solutio for smartphone security.

 

Smartphone provide many feature as a result they have become perfect target for different virues & Vulnerabilities. According to a research study 80-90% android mobiles in market are more vulnerable to security issues than IOS in Iphone.

 

Smartphone OS : is a system software that run on smartphone & allows them to execute the applications.

 

Smartphone OS Feature : Since every OS provides different features they can provide camera, fingerprint, sensor support as well as works with hardware features also.

 

Types of OS : Android & IOS
These 2 OS are majorly used OS.Both the OS have 4 layers.

 

Android
Linux Kernel -In charge for power management,  Virtual memory & network
Libraries - different libraries have differnt function in Andriod mostly libraries are java based.
Java API framework - used for creating Androi Application
System Apps - since it supports 3rd party application also there are different layers in android security like
security at OS level, Mandatory application sandbox, secure inter process, Application signing, Application-defined & user-granted.

 

IOS
Core OS - low level feature like bluetooth framework.
Core Service-high level feature like cloud kit framework 
Media Layer -includes game kit helps in using music,animation, videos etc.
Cocoa Touch - framework used for creating IOS application

 

MALICIOUS ATTACKS - below are few malicious attacks
Malicious Applications - Malware,Virus,Spyware,Trojan
Software Vulnerabilities - Adware apps, Fake apps, Backdoor
Threats or Attacks - Social Engineering, Phishing app, Man-In-The-Middle (MITM), Mobile botnet

 

MOST WANTED MOBILE MALWARE FAMILIES
Triada is one of the most wanted malware which was supported on Android OS.This malware uses a backdoor to infect OS processes and provides a remote access for stealing money from users.

 

SECURITY SOLUTIONS FOR SMARTPHONES
Malware Detection Techniques -Signature based techniques, Machine learning based techniques

 

Countermeasures against Malware -The users’ knowledge about Smartphones malicious risks, Install apps from trusted sources, The security of wireless networks, Prevent Root (Android) and Jailbreaking (iOS), Keep smartphone OS up to date, Encrypt Smartphone, Encourage Smartphone Users to Install Mobile Security Software

 

CONCLUSION -we examined current viable solutions for smartphone users by concentrating on existing mechanisms, and we proposed some future paths for cyber security experts to enhance this study field.


Comments ()


Sign in

Read Next

Place to visit in pune

Blog banner

LiquidPlanner

Blog banner

Linux Virtual Machine Process Scheduling

Blog banner

Regression Analysis

Blog banner

Security Issues and Countermeasures

Blog banner

Types of threads

Blog banner

DISK SCHEDULING

Blog banner

Memory hierarchy

Blog banner

Carrot Pickle With Raisins (lagan Nu Achar)

Blog banner

Google classroom

Blog banner

objectives and functions of operating system

Blog banner

What is Spyware? and examples of them.

Blog banner

Developments in Modern Operating Systems

Blog banner

Impacts of Data Breach On Companies Challenges and Prevention

Blog banner

Eating Well With Meal Maharaj on Busy Workdays Without Cooking

Blog banner

Memory management

Blog banner

How To Implement Search Engine Marketing (Sem) Strategy Effectively

Blog banner

Working with Sniffers for monitoring network communication

Blog banner

Blockchain uses and use cases

Blog banner

Concurrency and memory

Blog banner

What is the point of living if we can die at any moment of our lives ?

Blog banner

Memory Management Techniques

Blog banner

Europe Through My Lens

Blog banner

Virtual Machine

Blog banner

Direct memory access (DMA)

Blog banner

What if COVID does not exist!

Blog banner

SMARTSHEET MANAGEMENT SYSTEM

Blog banner

What is metaverse?

Blog banner

The Impact of Tolerances and Wall Thickness on Pipeline Integrity

Blog banner

Kafka - A Framework

Blog banner

PPC Advertising and its Impressive Benefits

Blog banner

Starvation

Blog banner

Philadelphia Experiment : Was it real?

Blog banner

How Laughing Gas Makes Your Dental Visit So Much Easier

Blog banner

Title: Modern Operating Systems: Powering the Digital Era

Blog banner

operating system

Blog banner

LINUX

Blog banner

“CONSISTENCY” in Social Media Marketing

Blog banner

Introduction to Data Science: Life Cycle & Applications

Blog banner

"Can Lisp do Machine Learning?"

Blog banner

Jamming Attacks in Network Security: Disrupting Communication Signals

Blog banner

Short-Form Video Marketing: Why It's Dominating the Internet

Blog banner