首页> 外文学位 >Analysis of android mobile device vulnerabilities as a result of the unique operating system and out-of-the-box security model.
【24h】

Analysis of android mobile device vulnerabilities as a result of the unique operating system and out-of-the-box security model.

机译:分析由于独特的操作系统和开箱即用的安全模型而导致的android移动设备漏洞。

获取原文
获取原文并翻译 | 示例

摘要

Android mobile devices have quickly risen to prominence over the last decade and now control a market share of the mobile device marketplace. With this rise however have come numerous security risks and vulnerabilities due to the nature of the Android Operating System and Security model. Being an open source operating system and having minimal out-of-the-box security standards, Android devices are the common attack target for those looking to gain illegal access to mobile devices.;This Capstone Project shows what vulnerabilities and security deficiencies exist due to these faults specific to Android devices and the different types of information that are exposed in the event of a successful breach. Once established this Project will also describe numerous specific vulnerabilities that exist in Android devices and the ways in which they exploit its deficiencies. Finally, a review of the different protective measures will be reviewed and recommended to better protect Android users from exploitation.;After each of the above topics were researched in detail and reviewed for this Project it was discovered that the level of security for out-of-the-box Android mobile devices is dangerously lacking. Any and all information that is stored on Android devices is easily susceptible to exploitation as a direct result of flaws in the OS and Security model and without proper preventive measure instilled there is little the user can do to prevent them. The conclusion of this report is for Android device owners to take a proactive stance on the security of their mobile device and to utilize some if not all of the recommendations presented throughout this report. It is also recommended that further research on the inherent flaws of the Android OS and security model be taken to better protect future devices. Keywords: Cybersecurity, Professor Robert DeCarlo, technology, telecommunications, cellular devices.
机译:在过去的十年中,Android移动设备迅速崛起,并控制着移动设备市场的市场份额。但是,由于Android操作系统和安全性模型的性质,随之而来的是众多安全隐患和漏洞。 Android设备是一种开源操作系统,具有最低限度的即用型安全标准,对于那些寻求非法访问移动设备的人来说,它们是常见的攻击目标。此Capstone项目展示了由于以下原因而存在的漏洞和安全缺陷:这些特定于Android设备的错误,以及在成功突破时暴露的不同类型的信息。建立后,该项目还将描述Android设备中存在的许多特定漏洞,以及利用这些漏洞的方式。最后,将对不同的保护措施进行审查,并提出建议,以更好地保护Android用户免遭利用。;在对每个上述主题进行了详细的研究并进行了审查之后,发现该项目的安全级别危险地缺少现成的Android移动设备。 Android设备和安全模型中存在漏洞的直接结果是,存储在Android设备上的所有信息都容易受到利用,并且如果没有采取适当的预防措施,用户几乎无能为力。本报告的结论旨在使Android设备所有者对他们的移动设备的安全性持积极态度,并利用本报告中提出的一些(如果不是全部)建议。还建议对Android OS的固有缺陷和安全模型进行进一步研究,以更好地保护未来的设备。关键字:网络安全,Robert DeCarlo教授,技术,电信,蜂窝设备。

著录项

  • 作者

    Mileham, Todd Aiden.;

  • 作者单位

    Utica College.;

  • 授予单位 Utica College.;
  • 学科 Information technology.
  • 学位 M.S.
  • 年度 2016
  • 页码 68 p.
  • 总页数 68
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类
  • 关键词

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号