Android Is One Of The Best Computer Science Essay


This essay has been submitted by a student. This is not an example of the work written by our professional essay writers.

Android is one of the best mobile operating system in the present market. Approximately, most of the people are now using the android enable smart mobile phones. In our daily life, we regularly use the email applications, bank applications, and social network applications. The data we use in these applications are very sensitive, personal and important too. Due to the advancement of the mobile operating system technology, some malicious applications can gain access over the user's sensitive, private and social information. This type of applications can gain the control of the device itself. One biggest problem is that these modern devices will have continuous internet connectivity through the Wi-Fi or mobile data services. Most of the applications in the market are vulnerable such that they can easily affected Trojans and viruses, which indirectly android mobile security. And also, there are some malicious applications which directly attack on the mobile file system. Therefore it is the mandatory to take precaution and to provide the best security for these mobile devices and securing the devices. Security should be provided even when the device lost or stolen or damaged. This paper provides a brief insight of security breaches in android operating system level and android applications level. It also provides a successful phenomenon to overcome these security breaches.


In recent years the mobile operating system technology is advancing on the other hand it is getting easily focused for most of the various malicious attacks. According to latest security surveys, the chance of attacking mobile operating system is becoming more through malicious exploits and executed attacks in 2011.This development can be lead to two important factors: the overwhelming user response to the android operating system and the advancement of android phone technology. The scope of mobile device market is openly noticeable from the reports issued by the ITU [3] that explains the strength of the mobile phone users in the world. Therefore android mobile phone technology has been constantly improving over the last decade and the constraints for both hardware and operating systems have limited attacks. Thus, android mobile operating system proves to be turning point in malicious exploits for devices by providing the high end features and open source functionalities. From this we can observe that the share of the market among the smart phone in the US can surpass 50% of the total mobile devices market share by the end of 2011[6]. This represents that the platform of the mobile devices is getting weaker, so that malicious can be attacked easily.

In addition to these standards, now a day's android smart phones are used like personal computers. So the attacks applicable to our computers can be indirectly attack the android smart phones also in various ways. So, the standard threats for computers are also application to the mobile platforms. Most of the applications we use in the android devices are developed by third party providers, so there is a chance for intrusion of various malwares and other security issues can rise. The main aim of the attackers is intrude the data rather than using functionalities provided by the android devices.

In this paper i present various security threat models for the android mobile platforms. These models stress on the three key problems in android device security: goals of attackers, attack vectors and mobile malware. This threat models explains various interests and goals of the attackers which in turn leads to identify the types of attacks and area of the attack. Finally, the model considers threat types applicable to mobile platforms if the presented attack vectors are successfully utilized. This paper is also includes the best practices to reduce the security issues in android devices.

Android Security Threat Models

This section of the paper present the overview of the challenges faced by mobile devices while the protecting the user private data. This security models is divided in to three types: attack goals, attack vectors and mobile malware, based on the analysis of attacker's goals and interests.

A. Attack Goals

The first two goals described here are less harmful, while the latter is harmful. Most of the attacks are type of attacks which perform the operations without the user detection. The use of such attacks is to interrupt the operation of the mobile phone to the possible extent and making activities which are useful to the attacker. On the other hand, harmful attacks are concentrated at disturbing the normal operation of the mobile device.

1) Collecting User's Sensitive Data

Generally, the android devices are now being used for the data storage and hub of the personal data. So they became primary target for the breaking user's privacy. The main infected area will be the confidentiality and integrity of the stored data. A success attempt to attack can make the attacker to read the SMS, MMS messages, electronic mail messages, call logs, and lastly contact details. Furthermore, the attacker can make an attempt to send the fake SMS, send e-mails and accessing information to personal details, contacts and calendar events. Personal data located in devices memory or on SD card, like documents, photos etc. can also be intruded.

Writing Services

Essay Writing

Find out how the very best essay writing service can help you accomplish more and achieve higher marks today.

Assignment Writing Service

From complicated assignments to tricky tasks, our experts can tackle virtually any question thrown at them.

Dissertation Writing Service

A dissertation (also known as a thesis or research project) is probably the most important piece of work for any student! From full dissertations to individual chapters, we’re on hand to support you.

Coursework Writing Service

Our expert qualified writers can help you get your coursework right first time, every time.

Dissertation Proposal Service

The first step to completing a dissertation is to create a proposal that talks about what you wish to do. Our experts can design suitable methodologies - perfect to help you get started with a dissertation.

Report Writing

Reports for any audience. Perfectly structured, professionally written, and tailored to suit your exact requirements.

Essay Skeleton Answer Service

If you’re just looking for some help to get started on an essay, our outline service provides you with a perfect essay plan.

Marking & Proofreading Service

Not sure if your work is hitting the mark? Struggling to get feedback from your lecturer? Our premium marking service was created just for you - get the feedback you deserve now.

Exam Revision

Exams can be one of the most stressful experiences you’ll ever have! Revision is key, and we’re here to help. With custom created revision notes and exam answers, you’ll never feel underprepared again.