This essay has been submitted by a student. This is not an example of the work written by our professional essay writers.
Android is one of the best mobile operating system in the present market. Approximately, most of the people are now using the android enable smart mobile phones. In our daily life, we regularly use the email applications, bank applications, and social network applications. The data we use in these applications are very sensitive, personal and important too. Due to the advancement of the mobile operating system technology, some malicious applications can gain access over the user's sensitive, private and social information. This type of applications can gain the control of the device itself. One biggest problem is that these modern devices will have continuous internet connectivity through the Wi-Fi or mobile data services. Most of the applications in the market are vulnerable such that they can easily affected Trojans and viruses, which indirectly android mobile security. And also, there are some malicious applications which directly attack on the mobile file system. Therefore it is the mandatory to take precaution and to provide the best security for these mobile devices and securing the devices. Security should be provided even when the device lost or stolen or damaged. This paper provides a brief insight of security breaches in android operating system level and android applications level. It also provides a successful phenomenon to overcome these security breaches.
In recent years the mobile operating system technology is advancing on the other hand it is getting easily focused for most of the various malicious attacks. According to latest security surveys, the chance of attacking mobile operating system is becoming more through malicious exploits and executed attacks in 2011.This development can be lead to two important factors: the overwhelming user response to the android operating system and the advancement of android phone technology. The scope of mobile device market is openly noticeable from the reports issued by the ITU  that explains the strength of the mobile phone users in the world. Therefore android mobile phone technology has been constantly improving over the last decade and the constraints for both hardware and operating systems have limited attacks. Thus, android mobile operating system proves to be turning point in malicious exploits for devices by providing the high end features and open source functionalities. From this we can observe that the share of the market among the smart phone in the US can surpass 50% of the total mobile devices market share by the end of 2011. This represents that the platform of the mobile devices is getting weaker, so that malicious can be attacked easily.
In addition to these standards, now a day's android smart phones are used like personal computers. So the attacks applicable to our computers can be indirectly attack the android smart phones also in various ways. So, the standard threats for computers are also application to the mobile platforms. Most of the applications we use in the android devices are developed by third party providers, so there is a chance for intrusion of various malwares and other security issues can rise. The main aim of the attackers is intrude the data rather than using functionalities provided by the android devices.
In this paper i present various security threat models for the android mobile platforms. These models stress on the three key problems in android device security: goals of attackers, attack vectors and mobile malware. This threat models explains various interests and goals of the attackers which in turn leads to identify the types of attacks and area of the attack. Finally, the model considers threat types applicable to mobile platforms if the presented attack vectors are successfully utilized. This paper is also includes the best practices to reduce the security issues in android devices.
Android Security Threat Models
This section of the paper present the overview of the challenges faced by mobile devices while the protecting the user private data. This security models is divided in to three types: attack goals, attack vectors and mobile malware, based on the analysis of attacker's goals and interests.
A. Attack Goals
The first two goals described here are less harmful, while the latter is harmful. Most of the attacks are type of attacks which perform the operations without the user detection. The use of such attacks is to interrupt the operation of the mobile phone to the possible extent and making activities which are useful to the attacker. On the other hand, harmful attacks are concentrated at disturbing the normal operation of the mobile device.
1) Collecting User's Sensitive Data
Generally, the android devices are now being used for the data storage and hub of the personal data. So they became primary target for the breaking user's privacy. The main infected area will be the confidentiality and integrity of the stored data. A success attempt to attack can make the attacker to read the SMS, MMS messages, electronic mail messages, call logs, and lastly contact details. Furthermore, the attacker can make an attempt to send the fake SMS, send e-mails and accessing information to personal details, contacts and calendar events. Personal data located in devices memory or on SD card, like documents, photos etc. can also be intruded.