wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Smartphone Security: Vulnerabilities and Attacks

profile
Srinidhi Shetty
Oct 20, 2021
0 Likes
0 Discussions
71 Reads


Application in the smartphones have become in the recent years. Smartphone have provided many services like mobile payment system, application market(i.e playstore). Also the no of vulnerabilities of application is also increasing. so in this research i had tried to cover the Vulnerabilities & solutio for smartphone security.

 

Smartphone provide many feature as a result they have become perfect target for different virues & Vulnerabilities. According to a research study 80-90% android mobiles in market are more vulnerable to security issues than IOS in Iphone.

 

Smartphone OS : is a system software that run on smartphone & allows them to execute the applications.

 

Smartphone OS Feature : Since every OS provides different features they can provide camera, fingerprint, sensor support as well as works with hardware features also.

 

Types of OS : Android & IOS
These 2 OS are majorly used OS.Both the OS have 4 layers.

 

Android
Linux Kernel -In charge for power management,  Virtual memory & network
Libraries - different libraries have differnt function in Andriod mostly libraries are java based.
Java API framework - used for creating Androi Application
System Apps - since it supports 3rd party application also there are different layers in android security like
security at OS level, Mandatory application sandbox, secure inter process, Application signing, Application-defined & user-granted.

 

IOS
Core OS - low level feature like bluetooth framework.
Core Service-high level feature like cloud kit framework 
Media Layer -includes game kit helps in using music,animation, videos etc.
Cocoa Touch - framework used for creating IOS application

 

MALICIOUS ATTACKS - below are few malicious attacks
Malicious Applications - Malware,Virus,Spyware,Trojan
Software Vulnerabilities - Adware apps, Fake apps, Backdoor
Threats or Attacks - Social Engineering, Phishing app, Man-In-The-Middle (MITM), Mobile botnet

 

MOST WANTED MOBILE MALWARE FAMILIES
Triada is one of the most wanted malware which was supported on Android OS.This malware uses a backdoor to infect OS processes and provides a remote access for stealing money from users.

 

SECURITY SOLUTIONS FOR SMARTPHONES
Malware Detection Techniques -Signature based techniques, Machine learning based techniques

 

Countermeasures against Malware -The users’ knowledge about Smartphones malicious risks, Install apps from trusted sources, The security of wireless networks, Prevent Root (Android) and Jailbreaking (iOS), Keep smartphone OS up to date, Encrypt Smartphone, Encourage Smartphone Users to Install Mobile Security Software

 

CONCLUSION -we examined current viable solutions for smartphone users by concentrating on existing mechanisms, and we proposed some future paths for cyber security experts to enhance this study field.


Comments ()


Sign in

Read Next

Record Blocking

Blog banner

USPS mail

Blog banner

Service Transition Process in ITSM

Blog banner

Disk cache

Blog banner

The Joy of Giving: How Festivals Teach Children Empathy and Gratitude

Blog banner

Data Mining

Blog banner

Benefits of yoga and meditation

Blog banner

Cyber Bullying - Neeta Vonkamuti

Blog banner

Multiprocessor and Multicore Organization

Blog banner

File system

Blog banner

I/O Buffering

Blog banner

Concurrency management in operating systems

Blog banner

Junk food vs healthy food

Blog banner

Mumbai Metro 3

Blog banner

Deadlock

Blog banner

Outlook.com

Blog banner

A Brief Review on Cyber Forensics and its Analysis Tool

Blog banner

10 Amazing facts about Tokyo Ghoul

Blog banner

Service Operations in ITSM

Blog banner

What is the point of living if we can die at any moment of our lives ?

Blog banner

Survey of Which Movies Types people are Prefer to Watch in India.

Blog banner

Types of Malware in Cyber Security

Blog banner

Predicting Student Performance with Data Science

Blog banner

38_Network Sniffing Techniques_SBC

Blog banner

Travel Geek ‘The last $50k in Switzerland’

Blog banner

rupee

Blog banner

INTERNET

Blog banner

Deadlock

Blog banner

Uniprocessor scheduling

Blog banner

Banaras

Blog banner

Real-Time Operating Systems (RTOS) Deep Explanation

Blog banner

Virtual Memory

Blog banner

What is Internet

Blog banner

Data Science in Mental Health Prediction

Blog banner

Explain website hacking issues

Blog banner

Skills An Ethical Hacker Must Have

Blog banner

Cyber Crime Investigation In The Era Of Big Data

Blog banner

Modern operating system

Blog banner

What is Amazon?

Blog banner

Deadlock Prevention

Blog banner

Importance of education

Blog banner

Virtual memory

Blog banner