Security And Privacy Of Mobile Operating Systems

Overview of Mobile Operating Systems

This research report depicts the crucial necessity of security and privacy of mobile operating system to keep the confidential information secured from unauthenticated externals. Mobile operating system has high level build in security characteristics which can significantly minimize the impact and frequency of the application security level issues. This particular system is designed and modeled to ensure that the users can build the security app along with the default system as well as the file permission. It helps to avoid different difficult decisions about the operating system security.  Besides

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

The aim of the research report is to identify different high level security and privacy practices those are necessary for the OS developers to consider before its final application. Different security tools and technologies are there that may help to avoid system threats, attack trends and related statistics. Another aim of the research report is to identify the social, ethical and legal issues associated to Mobile operating system.

  • To identify all security level issues that may interrupt the running application of mobile operating system
  • To investigate the security tools and policies those are helpful to mitigate the operational issues of mobile OS
  • To  examine and discuss all related standard industry level practices

Based on the model details and application level features of the mobile phones the best suited Mobile Operating Systems (OS) is considered. Among the available mobile operating systems some of the OS are elaborated below:

 iOS: Only for the Apple devices such as iphone this iOS operating system is used.  Over last few years the market share of the iOS is growing rapidly and reached up to 16% (Mutchler et al. 2015).  The iOS operating system is consists of core OS, core services and media. The service of iOS is comprises of high level framework that are used for the graphics, videotechnologies etc.

Android: Google and Open Handset alliance has combiningly developed the Android operating system.  The market usability implies that android is the second widely used OS that is comprises of Linux Kernel, using C and C++ coding open source Library, application framework (Turland et al. 2015).

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

Apart from iOS and Android, windows blackberry OS are used for windows phone and blackberry mobile phones respectively (Chen et al. 2016). Security is the most important aspect that has to be considered for any mobile device to keep their data secured from the external attackers.  

In order to secure the mobile operating system, different security practices and policies are available in the market those are strictly needed to be adopted and maintained by the system developers. According to Abirami and Venkataraman (2016), it has already been established that, Smartphone requires good security software to fight against the battle of array of hacks and flaws.  Due to cybercrime rather StageFright the reputation of mobile operating systems is getting damaged each day (Xu et al. 2017).  As android phone is open sourced and in this operating system the developers can utilize different complex C ++ programming or JAVA also as a result the cyber criminals can easily insert the malicious codes to the application.  Mainly for the malware this is referred to as one of the massive targets. Talha, Alper and Aydin (2015), stated that, over 96% of malware targeted android are reported in the last 2 to 3 years over 24 million of apps attack.  

Security Risks Associated with Mobile Operating Systems

The Android Operating System fails to develop automatic alert for any highlighted issue.  With the technical development in the business areas the Smartphones have become widely used tools for successful web access. As a result the users are avoiding incorporating IT to their source of technical leadership. This is all done because Mobile phones give cutting edge technologies (Harris and Patten 2014).  The user of the mobile phones look for consumer focused vendors who are catering to their personal requirements. 

Mostly for fraudulent and unethical hackers the Smartphones are becoming the most attractive targets because of the combination of increasing ownership of the Smartphones and usage of different valuable data services with the devices. Regardless of the type of the Smartphones, proper even best of the security practices are required to be adopted by the developers (Islam 2014).  Security practices are intended to assist the business for taking the necessary phases required to use the best security practice for the users of the mobile devices. The best levels of security practices for mobile devices are as follows:

Choosing Mobile devices: While question raise regarding security of Smartphones, it can be said that, all the devices are not created considering similar types of security approaches.  Ipods are developed for the general consumers thus; it is less focused on security (Shahzad 2014).  On the other hand, the blackberry operating system is much focused on its operational security because it is mainly designed for the enterprises users like law enforcement, android and apple Smartphones. Device access is the most important component that has to be considered. Proper authentication should be implemented to make sure that only the authorized users are capable to access the device and its operational applications (Roesner, Kohno and Molnar 2014). Professional setup of the operating system is the most import thing that has to be considered to protect the mobile device from unauthorized access.  

Mobile app update: Whenever update is required the mobile devices gives notification for the requirement (Shin et al. 2014).  Whereas there are certain phones which enable the users to set up phones in a way so that it can update the application automatically. It allows the users to get a secured and updated mobile device.

Installation of antimalware and necessary application software: Each day new malwares attacks are getting exploited in the android and iOS application. Like other software the antivirus software are needed to be updated accordingly. For any employee or mobile phone user the software update should be considered as a compulsory or mandatory one (Sajid, Abbas and Saleem 2016).  Sometimes the mobile devices are found to be connected with office data server also. Thus, accurate software update is require keeping both the office server and mobile data protected from the external attackers.

Best Security Practices for Mobile Devices

Communication should be encrypted: In the current technology era, wireless communication has become the most widely used application for communication. It is found that most of the times, wireless communication is intercepted that is allowing the information getting manipulated. (Rahimi et al. 2014) Thus, it is the responsibility of the employees and users to encrypt all possible communication.

For different brand the mobile operating system differs and the policies for the different OS are as follows:

Policy

Android 3.0 OS

Windows OS

IOS

Blackberry OS

Implemented   password  

YES

EAS

YES

BES

Password is complex

YES

NO

YES

BES

Remote locking

YES

EAS

YES

BES

Remote Wipe

YES

EAS

YES

BES

Over air management

YES

EAS

YES

BES

Encrypted storage

YES

NO

YES

BES

Restriction

YES

EAS

YES

BES

Security policy for Windows phone:

  • Required password
  • Minimum length of the password
  • Allowance for simple password
  • History of the password

For the iOS operating system the policies are as follows:

  • Pass-code needed
  • Allowance for simple values
  • Length of the pass-code
  • Length of the pass-code
  • Maximum age for the pass-code

The policy for android (3.0) phone:

  • Complex password is needed
  • In password minimum number of letter are needed
  • Minimum letters and lowercase letters
  • Requirement for storage encryption

Conclusion

From the overall discussion it can be concluded that, in this current age of technology, each of the mobile operating system supports different kinds of policies and practices enforcement. Thus, this is the responsibility of the consumers to choose the most suitable OS that has to be deployed.  OS helps the users to run all necessary application in the mobile devices with proper security and privacy. Any particular Mobile app can become a profitable business only when it is an embedded operating system that is researching the EOS.  Companies those are dependent on rugged operating devices helps to run windows embedded operating system which needs to consider their next step for supporting the business. Moreover it can be said that with the help of mobile operating system the issues of traditional business can be eventually reduced and minimized accordingly. In order to secure the mobile operating system certain mandatory recommendations are needed to be followed by and the recommendations for the research are elaborated below:

Credential password usage:  In order to secure the mobile operating system from the external assaults it is necessary for the users to develop credential password so that the no unauthenticated users can access the information from the OS platform.

Cryptography support: It is necessary for the developers to incorporate proper cryptographic support to encode confidential information.  With accurate cryptography key generation only the authenticated users will be able to decrypt the data whenever required. However during the application of the cryptography algorithm potential function and condition are also required to be considered.

Antivirus software: In order to avoid all unwanted file corruption and data hijack proper antivirus is required to be applied to the mobile operating system. 

References

Abirami, G. and Venkataraman, R., 2016. Access control policy on mobile operating system frameworks–a survey. Indian Journal of Science and Technology, 9(48).

Chen, M., Qian, Y., Mao, S., Tang, W. and Yang, X., 2016. Software-defined mobile networks security. Mobile Networks and Applications, 21(5), pp.729-743.

Harris, M. and P. Patten, K., 2014. Mobile device security considerations for small-and medium-sized enterprise business mobility. Information Management & Computer Security, 22(1), pp.97-114.

Islam, S., 2014. Systematic literature review: Security challenges of mobile banking and payments system. International Journal of u-and e-Service, Science and Technology, 7(6), pp.107-116.

Mutchler, P., Doupé, A., Mitchell, J., Kruegel, C. and Vigna, G., 2015, May. A large-scale study of mobile web app security. In Proceedings of the Mobile Security Technologies Workshop (MoST).

Rahimi, M.R., Ren, J., Liu, C.H., Vasilakos, A.V. and Venkatasubramanian, N., 2014. Mobile cloud computing: A survey, state of art and future directions. Mobile Networks and Applications, 19(2), pp.133-143.

Roesner, F., Kohno, T. and Molnar, D., 2014. Security and privacy for augmented reality systems. Communications of the ACM, 57(4), pp.88-96.

Sajid, A., Abbas, H. and Saleem, K., 2016. Cloud-assisted iot-based scada systems security: A review of the state of the art and future challenges. IEEE Access, 4, pp.1375-1384.

Schulz, T., Gladhorn, F. and Sæther, J.A., 2015. Best Practices for Creating Accessible Mobile Applications. Report Norsk Regnesentral-Norwegian Computing Center, (1031), p.19.

Scott-Hayward, S., 2015, April. Design and deployment of secure, robust, and resilient SDN Controllers. In Network Softwarization (NetSoft), 2015 1st IEEE Conference on (pp. 1-5). IEEE.

Shahzad, F., 2014. State-of-the-art survey on cloud computing security Challenges, approaches and solutions. Procedia Computer Science, 37, pp.357-362.

Shin, S., Song, Y., Lee, T., Lee, S., Chung, J., Porras, P., Yegneswaran, V., Noh, J. and Kang, B.B., 2014, November. Rosemary: A robust, secure, and high-performance network operating system. In Proceedings of the 2014 ACM SIGSAC conference on computer and communications security (pp. 78-89). ACM.

Slavin, R., Wang, X., Hosseini, M.B., Hester, J., Krishnan, R., Bhatia, J., Breaux, T.D. and Niu, J., 2016, May. Toward a framework for detecting privacy policy violations in android application code. In Proceedings of the 38th International Conference on Software Engineering (pp. 25-36). ACM.

Talha, K.A., Alper, D.I. and Aydin, C., 2015. APK Auditor: Permission-based Android malware detection system. Digital Investigation, 13, pp.1-14.

Turland, J., Coventry, L., Jeske, D., Briggs, P. and van Moorsel, A., 2015, July. Nudging towards security: Developing an application for wireless network selection for android phones. In Proceedings of the 2015 British HCI conference(pp. 193-201). ACM.

Xu, Y., Hunt, T., Kwon, Y., Georgiev, M., Shmatikov, V. and Witchel, E., 2017. EARP: Principled Storage, Sharing, and Protection for Mobile Apps. GetMobile: Mobile Computing and Communications, 20(3), pp.29-33.

What Will You Get?

We provide professional writing services to help you score straight A’s by submitting custom written assignments that mirror your guidelines.

Premium Quality

Get result-oriented writing and never worry about grades anymore. We follow the highest quality standards to make sure that you get perfect assignments.

Experienced Writers

Our writers have experience in dealing with papers of every educational level. You can surely rely on the expertise of our qualified professionals.

On-Time Delivery

Your deadline is our threshold for success and we take it very seriously. We make sure you receive your papers before your predefined time.

24/7 Customer Support

Someone from our customer support team is always here to respond to your questions. So, hit us up if you have got any ambiguity or concern.

Complete Confidentiality

Sit back and relax while we help you out with writing your papers. We have an ultimate policy for keeping your personal and order-related details a secret.

Authentic Sources

We assure you that your document will be thoroughly checked for plagiarism and grammatical errors as we use highly authentic and licit sources.

Moneyback Guarantee

Still reluctant about placing an order? Our 100% Moneyback Guarantee backs you up on rare occasions where you aren’t satisfied with the writing.

Order Tracking

You don’t have to wait for an update for hours; you can track the progress of your order any time you want. We share the status after each step.

image

Areas of Expertise

Although you can leverage our expertise for any writing task, we have a knack for creating flawless papers for the following document types.

Areas of Expertise

Although you can leverage our expertise for any writing task, we have a knack for creating flawless papers for the following document types.

image

Trusted Partner of 9650+ Students for Writing

From brainstorming your paper's outline to perfecting its grammar, we perform every step carefully to make your paper worthy of A grade.

Preferred Writer

Hire your preferred writer anytime. Simply specify if you want your preferred expert to write your paper and we’ll make that happen.

Grammar Check Report

Get an elaborate and authentic grammar check report with your work to have the grammar goodness sealed in your document.

One Page Summary

You can purchase this feature if you want our writers to sum up your paper in the form of a concise and well-articulated summary.

Plagiarism Report

You don’t have to worry about plagiarism anymore. Get a plagiarism report to certify the uniqueness of your work.

Free Features $66FREE

  • Most Qualified Writer $10FREE
  • Plagiarism Scan Report $10FREE
  • Unlimited Revisions $08FREE
  • Paper Formatting $05FREE
  • Cover Page $05FREE
  • Referencing & Bibliography $10FREE
  • Dedicated User Area $08FREE
  • 24/7 Order Tracking $05FREE
  • Periodic Email Alerts $05FREE
image

Services offered

Join us for the best experience while seeking writing assistance in your college life. A good grade is all you need to boost up your academic excellence and we are all about it.

  • On-time Delivery
  • 24/7 Order Tracking
  • Access to Authentic Sources
Academic Writing

We create perfect papers according to the guidelines.

Professional Editing

We seamlessly edit out errors from your papers.

Thorough Proofreading

We thoroughly read your final draft to identify errors.

image

Delegate Your Challenging Writing Tasks to Experienced Professionals

Work with ultimate peace of mind because we ensure that your academic work is our responsibility and your grades are a top concern for us!

Check Out Our Sample Work

Dedication. Quality. Commitment. Punctuality

Categories
All samples
Essay (any type)
Essay (any type)
The Value of a Nursing Degree
Undergrad. (yrs 3-4)
Nursing
2
View this sample

It May Not Be Much, but It’s Honest Work!

Here is what we have achieved so far. These numbers are evidence that we go the extra mile to make your college journey successful.

0+

Happy Clients

0+

Words Written This Week

0+

Ongoing Orders

0%

Customer Satisfaction Rate
image

Process as Fine as Brewed Coffee

We have the most intuitive and minimalistic process so that you can easily place an order. Just follow a few steps to unlock success.

See How We Helped 9000+ Students Achieve Success

image

We Analyze Your Problem and Offer Customized Writing

We understand your guidelines first before delivering any writing service. You can discuss your writing needs and we will have them evaluated by our dedicated team.

  • Clear elicitation of your requirements.
  • Customized writing as per your needs.

We Mirror Your Guidelines to Deliver Quality Services

We write your papers in a standardized way. We complete your work in such a way that it turns out to be a perfect description of your guidelines.

  • Proactive analysis of your writing.
  • Active communication to understand requirements.
image
image

We Handle Your Writing Tasks to Ensure Excellent Grades

We promise you excellent grades and academic excellence that you always longed for. Our writers stay in touch with you via email.

  • Thorough research and analysis for every order.
  • Deliverance of reliable writing service to improve your grades.
Place an Order Start Chat Now
image

Order your essay today and save 30% with the discount code ESSAYHELP