wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Smartphone Security: Vulnerabilities and Attacks

profile
Srinidhi Shetty
Oct 20, 2021
0 Likes
0 Discussions
71 Reads


Application in the smartphones have become in the recent years. Smartphone have provided many services like mobile payment system, application market(i.e playstore). Also the no of vulnerabilities of application is also increasing. so in this research i had tried to cover the Vulnerabilities & solutio for smartphone security.

 

Smartphone provide many feature as a result they have become perfect target for different virues & Vulnerabilities. According to a research study 80-90% android mobiles in market are more vulnerable to security issues than IOS in Iphone.

 

Smartphone OS : is a system software that run on smartphone & allows them to execute the applications.

 

Smartphone OS Feature : Since every OS provides different features they can provide camera, fingerprint, sensor support as well as works with hardware features also.

 

Types of OS : Android & IOS
These 2 OS are majorly used OS.Both the OS have 4 layers.

 

Android
Linux Kernel -In charge for power management,  Virtual memory & network
Libraries - different libraries have differnt function in Andriod mostly libraries are java based.
Java API framework - used for creating Androi Application
System Apps - since it supports 3rd party application also there are different layers in android security like
security at OS level, Mandatory application sandbox, secure inter process, Application signing, Application-defined & user-granted.

 

IOS
Core OS - low level feature like bluetooth framework.
Core Service-high level feature like cloud kit framework 
Media Layer -includes game kit helps in using music,animation, videos etc.
Cocoa Touch - framework used for creating IOS application

 

MALICIOUS ATTACKS - below are few malicious attacks
Malicious Applications - Malware,Virus,Spyware,Trojan
Software Vulnerabilities - Adware apps, Fake apps, Backdoor
Threats or Attacks - Social Engineering, Phishing app, Man-In-The-Middle (MITM), Mobile botnet

 

MOST WANTED MOBILE MALWARE FAMILIES
Triada is one of the most wanted malware which was supported on Android OS.This malware uses a backdoor to infect OS processes and provides a remote access for stealing money from users.

 

SECURITY SOLUTIONS FOR SMARTPHONES
Malware Detection Techniques -Signature based techniques, Machine learning based techniques

 

Countermeasures against Malware -The users’ knowledge about Smartphones malicious risks, Install apps from trusted sources, The security of wireless networks, Prevent Root (Android) and Jailbreaking (iOS), Keep smartphone OS up to date, Encrypt Smartphone, Encourage Smartphone Users to Install Mobile Security Software

 

CONCLUSION -we examined current viable solutions for smartphone users by concentrating on existing mechanisms, and we proposed some future paths for cyber security experts to enhance this study field.


Comments ()


Sign in

Read Next

Famous Indian dishes that where misunderstood to be Indian

Blog banner

Dangers of Using Public WiFis

Blog banner

Modern Teaching Methods: Why Inquiry-based & Experiential Learning Works Best

Blog banner

Service stratergy principles

Blog banner

SECURITY VULNERABILITIES COUNTERMEASURES IN A SMART SHIP SYSTEM

Blog banner

Electronic data interchange

Blog banner

?Why Does My Breath Still Smell After Brushing?

Blog banner

Threat from Inside: Educating the Employees Against Cyber Threats

Blog banner

What makes Nugget RC Racing Florida’s Most Exciting Racing Events?

Blog banner

Why Extreme Opinions Are Rising: Psychological Insights into Society’s Divides

Blog banner

Getting into anime My anime suggestions

Blog banner

Memory Management Techniques

Blog banner

OLA

Blog banner

A Survey of Anti-Forensic Techniques: Methods, Challenges, and Countermeasures

Blog banner

Jira service Management

Blog banner

38_Network Sniffing Techniques_SBC

Blog banner

Data Visualization in Decision-Making

Blog banner

Service transition principles

Blog banner

Deadlock

Blog banner

STUDY OF SYSTEM HACKING TOOLS

Blog banner

Malware Defense

Blog banner

Apache Spark :- Powerful Data Processing Tool

Blog banner

Threat management

Blog banner

Time Series Analysis

Blog banner

De-Coding Love

Blog banner

Virtual memory

Blog banner

Mendeley (management software)

Blog banner

5 Things I As A Dentist Would Never Do (And What You Can Learn From It)

Blog banner

Article on Zoho Corporation

Blog banner

LIFEHACKER

Blog banner

Consumer to consumer business mode

Blog banner

This Windows 11 encryption bug may cause data damage

Blog banner

Super Garlicky Tomato Soup with Smashed White Beans

Blog banner

How to lose belly fat

Blog banner

RAID_142

Blog banner

The khan mehtab transforming the modular switches company

Blog banner

Understanding Input Based Keylogger Activation Systems: Risks and Mitigation

Blog banner

Go Daddy

Blog banner

Blog name

Blog banner

New Ransomware Encrypts Your Android And Then Changes PIN Lock

Blog banner

PROCESS CONTROL BLOCK IN OS

Blog banner

Race Condition

Blog banner