MOBILE SECURITY IN ANDROID MOBILE TECHNOLOGY
Journal: International Journal of Research in Information Technology (IJRIT) (Vol.1, No. 2)Publication Date: 2013-02-28
Authors : Shivappa M Metagar Jayaprasad Motupalli Theja N Bhootaleppa P Savukar;
Page : 30-36
Keywords : Android; message passing; Intents; mobile phone security; mobile phones; database;
Abstract
Mobile security or mobile phone security has become increasingly important  in mobile computing. It is of particular concern as it relates to the security of  personal information now stored on smart phones. More and more users and  businesses use smart phones as communication tools but also as a means of  planning and organizing their work and private life. Within companies, these  technologies are causing profound changes in the organization of  information systems and therefore they have become the source of new  risks. Indeed, smart phones collect and compile an increasing amount of  sensitive information to which access must be controlled to protect the  privacy of the user and the intellectual property of the company. All smart  phones, as computers, are preferred targets of attacks. These attacks exploit  weaknesses related to smart phones that can come from means of  communication like SMS, MMS, wifi networks, and GSM. There are also  attacks that exploit software vulnerabilities from both the web browser and  operating system. Finally, there are forms of malicious software that rely on  the weak knowledge of average users. Different security counter-measures  are being developed and applied to smart phones, from security in different  layers of software to the dissemination of information to end users. There are  good practices to be observed at all levels, from design to use, through the  development of operating systems, software layers, and downloadable apps.
Other Latest Articles
- A Survey: Course Management System (CMS) For Education in Cloud Technology
 - A QOS -AWARE REACTIVE APPROACH FOR QUERY PROCESSING IN WIRELESS SENSOR NETWORK
 - Worms Containment Strategy
 - Influence of IPS and AES in Security Region: DOD
 - Secure and Energy-Efficient Cooperative Video Distribution over Wireless Networks
 
Last modified: 2013-03-04 15:49:23
                    Share Your Research, Maximize Your Social Impacts
                

