Masterarbeit, 2011
53 Seiten, Note: 75
This project examines the threats to smartphones and discusses potential protective measures. It explores security solutions and best practices for both individual users and businesses, analyzing possible threats, their sources, likelihood of impact, and corresponding preventative measures. The project aims to provide a comprehensive overview and conclusion.
Chapter 1 provides an overview of the project, outlining the background, objectives, and methods used. It defines key terms such as smartphone, malware, Trojan horse, and root kit, which will be referenced throughout the document.
Chapter 2 delves into the components of antivirus software for both computer and smartphone users, analyzing their differences and similarities. It explores how traditional antivirus features may be applied to enhance smartphone security.
Chapter 3 investigates the security features of Apple iOS and Google Android platforms, focusing on traditional access control, application provenance, encryption, isolation, and permission-based access control. It discusses vulnerabilities and exploits for both operating systems.
Chapter 4 tests a proof-of-concept smartphone malware against trial versions of antivirus software. The chapter describes the rooting process for an HTC G1 Android phone and explains how the malware was run as root. The results demonstrate limitations of antivirus software in detecting kernel-level malicious activity on smartphones.
Chapter 5 comprehensively analyzes attacks on smartphones, detailing various threats, sources, impacts, and potential protective measures. It covers malicious applications, vulnerabilities, false positive detection, removable card vulnerabilities, device loss, and social engineering attacks.
Chapter 6 explores the potential of cloud-based security solutions to enhance smartphone security, highlighting their benefits for both individual users and businesses. It discusses the operation of cloud-based security services and identifies key vendors in the market.
This project focuses on key topics such as smartphone security, antivirus software, mobile device security, iOS, Android, malware, root kits, Trojan horse, vulnerabilities, cloud security, and social engineering attacks. The discussion includes key terms such as access control, application provenance, encryption, isolation, permission-based access control, false positive detection, and device management.
Der GRIN Verlag hat sich seit 1998 auf die Veröffentlichung akademischer eBooks und Bücher spezialisiert. Der GRIN Verlag steht damit als erstes Unternehmen für User Generated Quality Content. Die Verlagsseiten GRIN.com, Hausarbeiten.de und Diplomarbeiten24 bieten für Hochschullehrer, Absolventen und Studenten die ideale Plattform, wissenschaftliche Texte wie Hausarbeiten, Referate, Bachelorarbeiten, Masterarbeiten, Diplomarbeiten, Dissertationen und wissenschaftliche Aufsätze einem breiten Publikum zu präsentieren.
Kostenfreie Veröffentlichung: Hausarbeit, Bachelorarbeit, Diplomarbeit, Dissertation, Masterarbeit, Interpretation oder Referat jetzt veröffentlichen!
Kommentare