Preview

Threat Analysis of the Android Market

Better Essays
Open Document
Open Document
1039 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Threat Analysis of the Android Market
Threat Analysis of the Android Market | ANDROID MARKET
In keeping with the Open Handset Alliance goals of Android being the first open, complete, and free platform created specifically for mobile devices, Google offers the Android Market. The Android Market offers the ability for developers to create any application they choose with the community regulating whether the application is appropriate and safe, as opposed to relying on a formal screening process.
The pros and cons of this open approach to an application store have been discussed in great detail. Notwithstanding, Spyware and other malicious applications have made their way onto even controlled application stores and these controls have not negated the need for mobile device security software, such as Anti-Malware applications. The desire for open source applications by mobile device owners on even strictly controlled operating systems is evidenced by the vast amount of iPhone devices that are jailbroken to allow for the running of out-of-market applications which have not been approved by Apple.
The Android Market offers flexibility that markets such as the Apple App Store do not by allowing anyone to develop and publish an application to the Market’s consumers. This presents the opportunity to easily defraud innocent consumers for financial gain. Financial gain drives the paradigm of information security and attackers now see consumer and enterprise smartphones as targets. Since today’s Smartphone devices are the equivalent of mobile computers, it is logical that attackers have expanded their focus from PC-based malware to Smartphone malware and an open application repository lends itself to these types of attackers.

ANDROID MARKET SECURITY MODEL
The Android Market relies on the community to identify and flag applications that either malfunction or are malicious in nature. This would imply that there will always be a window where a number of consumers would need to use, test and determine if an

You May Also Find These Documents Helpful

  • Satisfactory Essays

    In this article, the authors not only cite the article by A. Fishman and M. Marquis-Boire but also used their own thoughts to make their story effectively “Cyanogen Mod is an open-source firmware distribution based on Android that lets users install apps without granting all requested permissions.” and “Blackphone has an OS that is based on a fork of Android. / Despite the Blackphone’s focus on security, a data-type confusion vulnerability in its code was disclosed and fixed in January 2015. The vulnerability could have allowed remote attackers to execute arbitrary code on Blackphones.” (3), these stories will cause attention to the readers…

    • 143 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    CIS 500 Term Papaer

    • 3105 Words
    • 10 Pages

    "Lookout 's State of Mobile Security Identifies Malware Designed for Profit and Privacy as 2012…

    • 3105 Words
    • 10 Pages
    Powerful Essays
  • Good Essays

    In this new mobile platform world, app developers are the new kingmakers. Not a day goes by when someone doesn 't introduce their own app store. As the world of mobile apps continues to gain importance in our lives, the space will continue to be ruled by app devlopers .In many ways, it’s a good way of moneymaking opportunities for independent app developers as well as big companies.…

    • 1334 Words
    • 6 Pages
    Good Essays
  • Satisfactory Essays

    Fire Truck Crash

    • 318 Words
    • 2 Pages

    likely candidates to house malware, and often is difficult to distinguish the legitimate apps from fake…

    • 318 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    “A mobile application, most commonly referred to as an app, is a type of application software designed to run on a mobile device, such as a smartphone or tablet computer. Mobile applications frequently serve to provide users with similar services to those accessed on PCs. Apps are generally small, individual software units with limited function. Mobile applications are a move away from the integrated software systems generally found on PCs. Instead, each app provides limited and isolated functionality such as a game, calculator or mobile Web browsing. Although applications may have avoided multitasking because of the limited hardware resources of the early mobile devices, their specificity is now part of their desirability because they allow consumers to hand-pick what their devices are able to do.” (Techopedia, N.D.)…

    • 749 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Lawton, G. (2008). Is it finally time to worry about mobile malware? Computer, 41(5), 12-14.…

    • 781 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Android vs Iphone

    • 2355 Words
    • 10 Pages

    We really like that the Android operating system is open source, but what's more important to most end users is openness in terms of what you can run on these devices. The operating systems themselves are clearly important, but one thing's abundantly clear: the applications make the phone. And while Google has yet to get in hot water for rejecting apps based on anti-competitive fear or…

    • 2355 Words
    • 10 Pages
    Powerful Essays
  • Better Essays

    Androids vs Iphones

    • 1132 Words
    • 5 Pages

    Cited: “Android Market Tops 10B Downloads Google 458134”.eWeek 7 Dec. 2011. Academic OneFile. Web. 24 Mar. 2013.…

    • 1132 Words
    • 5 Pages
    Better Essays
  • Better Essays

    Smartphone’s are extremely popular. Ninety-seven percent of all smartphone users use mobile applications. Fifty-eight percent of those smart phone users use location based applications. There were surveys done by a nonprofit global information security association called…

    • 2082 Words
    • 9 Pages
    Better Essays
  • Good Essays

    Social Security

    • 707 Words
    • 3 Pages

    The author stated in source 2 "Downloading and installing an application (or app, for short) could endanger your data privacy, too, if the app collects information from your cell phone without your permission. Some apps explicitly ask for permission to access your cell phone in different ways." This also means that some apps are not safe because they take in your personal information from your phone and your privacy is in danger. Hackers all over the internet waiting for something like this to happen because they see it as a opportunity When using the internet use the right websites so your personal information is…

    • 707 Words
    • 3 Pages
    Good Essays
  • Good Essays

    “They have an app for that” is the mantra of most smartphone users, but an improperly configured smartphone can be an open invitation to hackers looking for easy information. Today’s modern smartphone can do anything from controlling your home computer to handling your online banking to watching TV to making video calls. With all the features included in them, they are very easy to stockpile important (and sometimes sensitive) information about the user. Since smartphones are essentially tiny computers, they suffer the same vulnerabilities of PC’s, including viruses, malicious applications, and hacking. If there is the tiniest flaw in the smartphone’s armor, hackers can gain access and take an enormous amount of data from it.…

    • 913 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    The security upgrades in Android Lollipop are expected to let clients inhale less demanding if their gadgets are lost or stolen, yet protection promoters are cheering them—and additionally comparable late changes from Apple. A little yet critical change that showed up decisively in Android 4.4 Kitkat, Selinux is a Linux-based construction modelling intended to ensure such frameworks from benefit rise assaults. Not new by any methods, yet judging from Google's short comments in Android 5.0 this goes structure being conceivable to obligatory for all applications. Tightens up security against programming vulnerabilities and astute malware…

    • 1120 Words
    • 5 Pages
    Powerful Essays
  • Better Essays

    Travel Advisory

    • 4474 Words
    • 17 Pages

    (U) This report analyzes the newly launched Google Voice service, which is a unified communications service that is currently in closed beta testing and is only available to users invited by Google. A general description of Google Voice is provided, and the use of Google Voice by small businesses is introduced as a likely popular use of the service once it is officially launched to the general public. The various services and applications are described in detail. General privacy and security issues are described. The service is currently available only in the US.…

    • 4474 Words
    • 17 Pages
    Better Essays
  • Good Essays

    Nicolas Seriot built an application for iOS users called “SpyPhone” which was capable of tracking users and all their activities, then, sending this data to different servers without the user (people) knowledge. The “SpyPhone” app proved that even smartphones are capable of being hacked and be inflicted with malicious software for as long as one is connected to the Internet.…

    • 380 Words
    • 2 Pages
    Good Essays
  • Good Essays

    6a. Urbanization refers to much more than simple population growth; it involves changes in the economic, social and political structures of a region. Rapid urban growth is responsible for many environmental and social changes in the urban environment. The rapid growth of cities strains their capacity to provide services such as energy, education, health care, transportation, sanitation and physical security. *3…

    • 1024 Words
    • 5 Pages
    Good Essays