wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Smartphone Security: Vulnerabilities and Attacks

profile
Srinidhi Shetty
Oct 20, 2021
0 Likes
0 Discussions
71 Reads


Application in the smartphones have become in the recent years. Smartphone have provided many services like mobile payment system, application market(i.e playstore). Also the no of vulnerabilities of application is also increasing. so in this research i had tried to cover the Vulnerabilities & solutio for smartphone security.

 

Smartphone provide many feature as a result they have become perfect target for different virues & Vulnerabilities. According to a research study 80-90% android mobiles in market are more vulnerable to security issues than IOS in Iphone.

 

Smartphone OS : is a system software that run on smartphone & allows them to execute the applications.

 

Smartphone OS Feature : Since every OS provides different features they can provide camera, fingerprint, sensor support as well as works with hardware features also.

 

Types of OS : Android & IOS
These 2 OS are majorly used OS.Both the OS have 4 layers.

 

Android
Linux Kernel -In charge for power management,  Virtual memory & network
Libraries - different libraries have differnt function in Andriod mostly libraries are java based.
Java API framework - used for creating Androi Application
System Apps - since it supports 3rd party application also there are different layers in android security like
security at OS level, Mandatory application sandbox, secure inter process, Application signing, Application-defined & user-granted.

 

IOS
Core OS - low level feature like bluetooth framework.
Core Service-high level feature like cloud kit framework 
Media Layer -includes game kit helps in using music,animation, videos etc.
Cocoa Touch - framework used for creating IOS application

 

MALICIOUS ATTACKS - below are few malicious attacks
Malicious Applications - Malware,Virus,Spyware,Trojan
Software Vulnerabilities - Adware apps, Fake apps, Backdoor
Threats or Attacks - Social Engineering, Phishing app, Man-In-The-Middle (MITM), Mobile botnet

 

MOST WANTED MOBILE MALWARE FAMILIES
Triada is one of the most wanted malware which was supported on Android OS.This malware uses a backdoor to infect OS processes and provides a remote access for stealing money from users.

 

SECURITY SOLUTIONS FOR SMARTPHONES
Malware Detection Techniques -Signature based techniques, Machine learning based techniques

 

Countermeasures against Malware -The users’ knowledge about Smartphones malicious risks, Install apps from trusted sources, The security of wireless networks, Prevent Root (Android) and Jailbreaking (iOS), Keep smartphone OS up to date, Encrypt Smartphone, Encourage Smartphone Users to Install Mobile Security Software

 

CONCLUSION -we examined current viable solutions for smartphone users by concentrating on existing mechanisms, and we proposed some future paths for cyber security experts to enhance this study field.


Comments ()


Sign in

Read Next

Man In The Middle Attack

Blog banner

Session Hijacking

Blog banner

The Secure Software Development Life Cycle (SDLC)

Blog banner

The House ??of Patola Designs: Traditional Weaves with a Modern Twist

Blog banner

How to Encrypt and Decrypt Using GNU PGP

Blog banner

Modern Operating System - Khush bagaria

Blog banner

SMARTSHEET MANAGEMENT SYSTEM

Blog banner

Inventory management software system

Blog banner

Memory management

Blog banner

Virtual Memory

Blog banner

Lemon and Chilli Pickle (Limbu Mirchi Achar)

Blog banner

OS ASSIGNMENT

Blog banner

BITCOIN WALLET

Blog banner

Practical Implementation of Client Server model using TCP/IP.

Blog banner

Short note on Microsoft office

Blog banner

Loneliness

Blog banner

Constrained Management in IT

Blog banner

Basic Security For SOAP Services

Blog banner

virtual memory

Blog banner

Evolution of Operating Sytems

Blog banner

Blockchain

Blog banner

Deadlock

Blog banner

SQL Injection

Blog banner

Save Girl Child

Blog banner

Routers

Blog banner

Memory Management

Blog banner

Deadlock

Blog banner

RAID

Blog banner

Analysis of Digital Evidence In Identity Theft Investigations

Blog banner

Instagram

Blog banner

The most common internet security threats

Blog banner

Tracking Emails & Email Crimes

Blog banner

The Role of Frontline Managers in Driving Workplace Performance and Customer Satisfaction

Blog banner

"The Benefits of Using GIS in Agriculture"

Blog banner

undefined

Blog banner

Cyber-crime Investigation and Future Directions

Blog banner

Introduction to Virtual Memory - 080

Blog banner

Digital Footprints An Emerging Dimension of Digital Inequality

Blog banner

Fault tolerance

Blog banner

Memory Management

Blog banner

Photography

Blog banner

Deadlock and Starvation in an Operating System

Blog banner