Security Threats and Data Protection in Android Devices
Mac-Tay, Terry (2018)
Mac-Tay, Terry
2018
All rights reserved. This publication is copyrighted. You may download, display and print it for Your own personal use. Commercial use is prohibited.
Julkaisun pysyvä osoite on
https://urn.fi/URN:NBN:fi:amk-2024050810078
https://urn.fi/URN:NBN:fi:amk-2024050810078
Tiivistelmä
The main aim of this thesis is to provide an awareness of the security threats found in Android smart devices. Educate end users on how these smart devices pose threats in our society and personal life. Smartphones and tablets have become our dependable companion as they provide us with the access to a plethora of private information potentially leading to financial and personal hardship, therefore, they need to be well protected.
The study also focuses on an overview of Android platform infrastructure, the platform architecture and basic security layers of Android Operating system. Furthermore, research will be conducted into various security patches or updates from Google, how long period to serve other Android fragment devices. The information collected was from reliable sources such as Blogs, Security experts’ experiences and other confessions of known attackers. Other data collected were from books mainly android platform architecture.
The second focus is on security vulnerabilities from the end-user, enterprises that encourage bring your own device (BYOD) to work premises without any security countermeasures and a brief security concern to Android developers. To achieve these security objectives for individual Android users and enterprise data protections, Android users must consider the alternative secure apps for their devices. What permissions to grant access to on applications installed and avoid connecting to public free Wi-Fi or use VPN, Sandboxes, HTTPS Plugins to stay protected at all cost.
The approach of this study is qualitative. Predominantly, the approach will be a desktop study. Referencing is used by presenting some well legitimate sources, security experts to who have had experience for over a decade working in the field of information security and cybersecurity.
The study also focuses on an overview of Android platform infrastructure, the platform architecture and basic security layers of Android Operating system. Furthermore, research will be conducted into various security patches or updates from Google, how long period to serve other Android fragment devices. The information collected was from reliable sources such as Blogs, Security experts’ experiences and other confessions of known attackers. Other data collected were from books mainly android platform architecture.
The second focus is on security vulnerabilities from the end-user, enterprises that encourage bring your own device (BYOD) to work premises without any security countermeasures and a brief security concern to Android developers. To achieve these security objectives for individual Android users and enterprise data protections, Android users must consider the alternative secure apps for their devices. What permissions to grant access to on applications installed and avoid connecting to public free Wi-Fi or use VPN, Sandboxes, HTTPS Plugins to stay protected at all cost.
The approach of this study is qualitative. Predominantly, the approach will be a desktop study. Referencing is used by presenting some well legitimate sources, security experts to who have had experience for over a decade working in the field of information security and cybersecurity.