Mobile Application Security Platforms Survey

smc case study 1

Iniziamo. È gratuito!
o registrati con il tuo indirizzo email
Mobile Application Security Platforms Survey da Mind Map: Mobile Application Security Platforms Survey

1. MAIN ISSUE :

1.1. Nowadays Smartphone and other mobile devices have become incredibly important in every aspect of our life. Because they have practically offered same capabilities as desktop workstations as well as come to be powerful in terms of CPU (Central processing Unit), Storage and installing numerous applications. Therefore, Security is considered as an important factor in wireless communication technologies, particularly in a wireless ad-hoc network and mobile operating systems. Moreover, based on increasing the range of mobile application within variety of platforms, security is regarded as on the most valuable and considerable debate in terms of issues, trustees, reliabilities and accuracy.

2. OBJECTIVE / IMPORTANCE OF THIS ARTICLE

2.1. help platform providers to improve their security mechanism based on the finding of this study.

3. CONCLUSION:

3.1. from the literature study and researcher prospective threats in data security and communication are going to become more difficult to manage because hackers are looking of different ways to breach smart device platform. This can be done through added levels of security and manufactures access points as well as application programming interfaces API‘s. Hence, mobile applications tackle each aspect of our life and simplified the way that apps can be used for: business, social networking, shopping, travel, education, banking and network utility.

4. INTRODUCTION:

4.1. Currently Smartphone and mobile devices have become incredibly important among people around the world. Because they have offered same capabilities as well as facilities that desktop works stations have provided. However, security aspect still is a big Challenge.

5. CONTENT OF THIS ARTICLE

5.1. Attacks and Threats :

5.1.1. 1)Privilege Escalation

5.1.2. 2)Malicious Applications

5.1.3. 3)Risky In-App Ad libraries

5.2. Security Threats Measurement

5.2.1. Example: by using SSL based access and VPN are some of the possible solutions to avoid obtaining sensitive data.