Grin logo
en de es fr
Shop
GRIN Website
Publish your texts - enjoy our full service for authors
Go to shop › Computer Science - IT-Security

Potential for Data Loss from Security Protected Smartphones

Investigate how to use protective security measures from the PC world to secure Smartphones

Title: Potential for Data Loss from Security Protected Smartphones

Master's Thesis , 2011 , 53 Pages , Grade: 75

Autor:in: Vikas Rajole (Author)

Computer Science - IT-Security
Excerpt & Details   Look inside the ebook
Summary Excerpt Details

Smartphones have been widely accepted by mass market users and enterprise users.
However, the threats related to Smartphones have also emerged. Smartphones carry substantial
amount of sensitive data. There have been successful attacks in the wild on jail broken phones.
Smartphones needs to be treated like a computer and has to be secured from all type of attacks.
There are proof of concept attacks on Apple iOS and Google Android. This project aims to
analyse some attacks on Smartphones and possible solutions to defend the attacks. This project
also uses a proof of concept malware for testing antivirus software.

Excerpt


Inhaltsverzeichnis (Table of Contents)

  • Chapter 1
    • Introduction
    • 1.1 Background
    • 1.2 Project objectives
    • 1.3 Methods used
  • Chapter 2 Understanding the Antivirus Application
    • 2.1 Introduction
    • 2.2 Components of a conventional or computer Antivirus
    • 2.3 Components of a Smartphone antivirus
    • 2.4 Comparison of computer antivirus and Smartphone antivirus
    • 2.5 Smartphone Security for enterprises
  • Chapter 3 An overview of iOS and Android security features
    • 3.1 Introduction
    • 3.2 Security features of Apple iOS
    • 3.3 Security features of Google Android
  • Chapter 4 Testing ‘Proof of Concept’ Smartphone malware against antivirus software
    • 4.1 Introduction
    • 4.2 The testing process
      • 4.2.1 Rooting Android for HTC G1
      • 4.2.2 Running the BOT application as root
      • 4.2.3 Testing the Smartphone Antivirus
    • 4.3 Test results
  • Chapter 5 Attacks on Smartphones
    • 5.1 Introduction
    • 5.2 Attacks and threats to Smartphone
      • 5.2.1 Malicious Applications such as, Virus, Malware and Trojan
      • 5.2.2 Vulnerabilities
      • 5.2.3 False positive detection
      • 5.2.4 Removable card
      • 5.2.5 Loss of device
      • 5.2.6 Social Engineering
  • Chapter 6 Analysis of cloud based security solutions

Zielsetzung und Themenschwerpunkte (Objectives and Key Themes)

This project examines the threats to smartphones and discusses potential protective measures. It explores security solutions and best practices for both individual users and businesses, analyzing possible threats, their sources, likelihood of impact, and corresponding preventative measures. The project aims to provide a comprehensive overview and conclusion.

  • The differences and similarities between conventional computer antivirus and smartphone antivirus solutions
  • The security features implemented by Apple iOS and Google Android platforms
  • The effectiveness of smartphone antivirus software in detecting malicious activity by root applications
  • Common attacks on smartphones, including malicious applications, vulnerabilities, false positive detections, removable card vulnerabilities, device loss, and social engineering attacks
  • The potential of cloud-based security solutions for enhancing smartphone security

Zusammenfassung der Kapitel (Chapter Summaries)

Chapter 1 provides an overview of the project, outlining the background, objectives, and methods used. It defines key terms such as smartphone, malware, Trojan horse, and root kit, which will be referenced throughout the document.

Chapter 2 delves into the components of antivirus software for both computer and smartphone users, analyzing their differences and similarities. It explores how traditional antivirus features may be applied to enhance smartphone security.

Chapter 3 investigates the security features of Apple iOS and Google Android platforms, focusing on traditional access control, application provenance, encryption, isolation, and permission-based access control. It discusses vulnerabilities and exploits for both operating systems.

Chapter 4 tests a proof-of-concept smartphone malware against trial versions of antivirus software. The chapter describes the rooting process for an HTC G1 Android phone and explains how the malware was run as root. The results demonstrate limitations of antivirus software in detecting kernel-level malicious activity on smartphones.

Chapter 5 comprehensively analyzes attacks on smartphones, detailing various threats, sources, impacts, and potential protective measures. It covers malicious applications, vulnerabilities, false positive detection, removable card vulnerabilities, device loss, and social engineering attacks.

Chapter 6 explores the potential of cloud-based security solutions to enhance smartphone security, highlighting their benefits for both individual users and businesses. It discusses the operation of cloud-based security services and identifies key vendors in the market.

Schlüsselwörter (Keywords)

This project focuses on key topics such as smartphone security, antivirus software, mobile device security, iOS, Android, malware, root kits, Trojan horse, vulnerabilities, cloud security, and social engineering attacks. The discussion includes key terms such as access control, application provenance, encryption, isolation, permission-based access control, false positive detection, and device management.

Excerpt out of 53 pages  - scroll top

Details

Title
Potential for Data Loss from Security Protected Smartphones
Subtitle
Investigate how to use protective security measures from the PC world to secure Smartphones
College
Royal Holloway, University of London
Course
M.Sc. Information Security
Grade
75
Author
Vikas Rajole (Author)
Publication Year
2011
Pages
53
Catalog Number
V214409
ISBN (eBook)
9783656426622
ISBN (Book)
9783656437895
Language
English
Tags
potential data loss security protected smartphones investigate
Product Safety
GRIN Publishing GmbH
Quote paper
Vikas Rajole (Author), 2011, Potential for Data Loss from Security Protected Smartphones, Munich, GRIN Verlag, https://www.grin.com/document/214409
Look inside the ebook
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
Excerpt from  53  pages
Grin logo
  • Grin.com
  • Payment & Shipping
  • Contact
  • Privacy
  • Terms
  • Imprint