Donna McDuffey
Kentucky State University Graduate Student
Nicholasville, KY
859-382-3480
donna.mcduffey@kysu.edu
ABSTRACT
An introduction to the security risks to android users, how hackers target these platform devices, and how users can better protect themselves and sensitive data.
Categories and Subject Descriptors
Introduction
Android Platform introduction
Android Security Features and Shortcomings
Types of Android Hacking
Android Security Measures to Prevent Hacking
General Terms
Android, Android Hacking, Android Security
Keywords
Android, security, android security, hacking, android hacking, user settings, personal data and mobile devices, mobile device security, open source, wireless security.
1. INTRODUCTION
In this research paper, I will review security issues for mobile devices using the Android platform specifically. I’ll detail threats and vulnerabilities and how android device users can better secure their devices and data.
2. ANDROID BASICS
Android is a mobile operating system. The OS was developed by Android, Inc. who was eventually bought by Google. Android is an open source platform, which means the OS can be customized by anyone. Anyone can develop for Android and all the developer tools are free to access and download.
2.1 Android vs. Other Mobile OS
There are different types of mobile operating systems. Android and iOS by Apple, are the two main offerings on the market today. As of 2013 over 60% of all smart phones purchased were android devices [8]. Windows is now producing a mobile OS that resembles the desktop version their users are accustomed to. Currently, there are not many offerings for devices or applications, although it is an emerging market. The unique aspect of Android is that it is an open source operating system, which anyone with the right tools can customize.
2.2 Android Rooting and Modification
Often, individual mobile service providers and manufacturers modify the OS on the devices
References: [1]Indiana University. 2011. “How Can I Protect Data on my Mobile Device.” Web. https://kb.iu.edu/d/bcnh. [2]Lookout Mobile. 2014. “Mobile Security Technology”. Web. https://www.lookout.com/mobile-security-technology/. [3]Mittal, S. 2014. InfoSec Institute. “Android Application Security Testing.” Web. 17 February 2014. http://resources.infosecinstitute.com/android-application-security-testing-guide-part-1/. [4]Mossman, M. 2011. InfoSec Institute. “Android Security: Taking Control.” Web. 11 May 2011. http://resources.infosecinstitute.com/android-security-take-control/ . [5]Mossman, M. 2011. InfoSec Institute. “Android Security: Tips and Settings.” Web [6] Paul, I. 2013. PCWorld. “Security to go: Three tips to keep your mobile data safe.” Web. 15 October 2013. http://www.pcworld.com/article/2052810/security-to-go-three-tips-to-keep-your-mobile-data-safe. /. [7]Taous, T. 2014. Sitepoint. “A Brief Guide to Rooting Android.” Web. 5 June 2014. http://www.sitepoint.com/brief-guide-rooting-android/. [8]Violino, B. 2013. Infoworld. “A Clear-Eyed Guide to Android’s Actual Security Risks”. Web. 9 December 2014. [9]Wikipedia. 2014. “Rooting (Android OS)”. Web. Accessed 19 November 2014. http://en.wikipedia.org/wiki/Rooting_%28Android_OS%29.