Analysis of android mobile device vulnerabilities as a result of the unique operating system and out-of-the-box security model | | Posted on:2017-03-26 | Degree:M.S | Type:Thesis | | University:Utica College | Candidate:Mileham, Todd Aiden | Full Text:PDF | | GTID:2448390005476161 | Subject:Information Technology | | Abstract/Summary: | PDF Full Text Request | | Android mobile devices have quickly risen to prominence over the last decade and now control a market share of the mobile device marketplace. With this rise however have come numerous security risks and vulnerabilities due to the nature of the Android Operating System and Security model. Being an open source operating system and having minimal out-of-the-box security standards, Android devices are the common attack target for those looking to gain illegal access to mobile devices.;This Capstone Project shows what vulnerabilities and security deficiencies exist due to these faults specific to Android devices and the different types of information that are exposed in the event of a successful breach. Once established this Project will also describe numerous specific vulnerabilities that exist in Android devices and the ways in which they exploit its deficiencies. Finally, a review of the different protective measures will be reviewed and recommended to better protect Android users from exploitation.;After each of the above topics were researched in detail and reviewed for this Project it was discovered that the level of security for out-of-the-box Android mobile devices is dangerously lacking. Any and all information that is stored on Android devices is easily susceptible to exploitation as a direct result of flaws in the OS and Security model and without proper preventive measure instilled there is little the user can do to prevent them. The conclusion of this report is for Android device owners to take a proactive stance on the security of their mobile device and to utilize some if not all of the recommendations presented throughout this report. It is also recommended that further research on the inherent flaws of the Android OS and security model be taken to better protect future devices. Keywords: Cybersecurity, Professor Robert DeCarlo, technology, telecommunications, cellular devices. | | Keywords/Search Tags: | Android, Security, Device, Operating system, Vulnerabilities, Out-of-the-box | PDF Full Text Request | Related items |
| |
|