SECURITY AND HACKING ANDROID MOBILE DEVELOPMENT .pdf

IRENEANASTASIAPATRIC 693 views 14 slides May 07, 2024
Slide 1
Slide 1 of 14
Slide 1
1
Slide 2
2
Slide 3
3
Slide 4
4
Slide 5
5
Slide 6
6
Slide 7
7
Slide 8
8
Slide 9
9
Slide 10
10
Slide 11
11
Slide 12
12
Slide 13
13
Slide 14
14

About This Presentation

Mobile development security


Slide Content

Security and
Hacking

Security
Security for information technology (IT) refers to the
methods, tools and personal used to defend an
organization's digital assets.
The goal of IT security is to protect these assets,
devices and services from being disrupted, stolen or
exploited by unauthorized users, otherwise known as
threat actors.
These threats can be external or internal and
malicious or accidental in both origin and nature.

Hacking
Hacking is the act of identifying and then
exploiting weaknesses in a computer
system or network, usually to gain
unauthorized access to personal or
organizational data.
Hacking is not always a malicious activity,
but the term has mostly negative
connotations due to its association with
cybercrime.

Android
Security Model
Linux Kernel Security: Android is built on a
Linux kernel, which provides a robust
security foundation.
App Sandbox: Each Android app runs in its
own sandboxed environment, isolated from
other apps.
Google Play Protect: Google Play Protect is
a built-in security feature that scans apps
on the device and in the Play Store for
potential threats.

Security
Features
Potential Threats
Objectives of the
Security Features
Primary Security
Features

Potential
Threats
Disclosure of information in violation of
policy
Loss or destruction of data.
Unacceptable delay in restoring data in
case of catastrophic failure.
Undetected modification of data.

Objectives of the
Security Features
Protect encrypted data from disclosure.
Minimize exposure to attacks.
Provide sufficiently high reliability and
availability.

Primary Security
Features
Authentication: Ensuring that only authorized
individuals get access to the system and data
Access Control: Control to system privileges
and data; this access control builds on
authentication to ensure that individuals only
get appropriate access
Audits: Allows administrators to detect
attempted breaches of the authentication
mechanism and attempted or successful
breaches of access control.

Types of
Android Attacks
Untrusted APK’s: Attackers lure users to
download applications from untrusted sources.
SMS: The user may come across a suspicious
SMS giving them big bounty’s.
Email: Phishing emails may redirect the users
to malicious websites compromising the user’s
details.
Spying: Some applications may spy on the
mobile users and report to the remote
attackers.

Hacking Threats
to Android
Physical security: physically securing our
mobile devices.
SIM hijacking: the abuse of a legitimate
service offered by telecom firms when
customers need to switch their SIM and
telephone numbers between operators or
handsets.
Open Wi-Fi: They are intended to be a
customer service, but their open nature
opens them up to attack.

Countermeasures
DO NOT
DOWNLOAD
APPLICATIONS
FROM UNTRUSTED
THIRD PARTY
SOURCES.
DO NOT CLICK ON
SUSPICIOUS
EMAILS.
DO NOT OPEN
SUSPICIOUS SMS.
USE STRONG
PASSWORDS/PATT
ERNS.
DO NOT STORE
PASSWORDS ON
PHONE.
UPDATE THE
OPERATING
SYSTEM
REGULARLY.
USE STRONG
ANTI-VIRUS.

Advantages of Security
INCREASED
CUSTOMER TRUST.
IMPROVED
REPUTATION AND
BRANDING.
INCREASED SALES
AND MARKET SHARE.
REDUCED
SOFTWARE SYSTEMS
MAINTENANCE
COSTS.
REDUCED LEGAL
FEES AND EXPENSES.

Disadvantages of Security
HIGH COST OF
IMPLEMENTATION.
COMPLEX
MANAGEMENT.
POTENTIAL FALSE
SENSE OF
SECURITY.
COMPATIBILITY
ISSUES.
INCONVENIENCE
TO USERS.
Tags