Android User Security
- Author Cee Simpson
- Published March 2, 2012
- Word count 1,359
Ten years ago, the Operating System workhorses for US Government IT networks were Windows for unclassified And Solaris for classified traffic. There were sprinklings of Novell (due to its unique messaging system) and Mac OSx But there was no way a Systems Administrator was going to be allowed to put Linux on any government operational network.
However work was ongoing within one of the groups belonging to the keepers of the cryptographic gateway to Utilize the versatility of the Linux operating system to create an acceptable and capable version of Linux. The National Security Agency presented the scalable Security Enhanced Linux, which did not initially catch on with the Academics (due to its heavy reliance on compartmentalization) but it has evolved and withstood the test of time for The security administrators.
Government Mobile Problem (Background)
The governments mobile platform has been RIM's BlackBerry. This past decade they have provided a stable environment with security measures to prevent outsiders from easily tapping into communications; however; RIM couldn't do much because they don't have direct access to the encrypted network their customers use. However, it has since come to Light that while Blackberry may encrypt their network the first layer of encryption happens to use the same key every-where meaning that should it be broken once (by a government or
authorities) it can be broken for any Blackberry. This has limited the Blackberry's clearance level. This is the reason the android devices (with the new kernel) can be secured at a higher clearance level than Blackberry devices. They have Many characteristics that allow them to be groomed like SELinux.
Since the White House Communications Office decided to move the executive branch from Blackberry Devices to Android-based phones, the boys at NSA have now teamed up with Google, NIS and members of The academic community to certify the android. The Department of Defense has decided that Once the Android Kernel is sufficiently hardened and certified by the agencies required, each member (from General to Private) will Soon be issued an android phone as part of the standard equipment.
The androids sandboxed Java environment has similarities with what has already been created with SELinux. Each individual having the same system will make it simpler to manage and track. The ability to remotely locate And zero the systems will also eliminate the debacles that have resulted in the past two decades of lost Laptops By everyone from FBI Agents to VA officials.
Google Security Benefit
Google will benefit from the security research relationship they now have with NSA, NIST and the subject Matter experts working on this project from academia because the net is a virtual battlefield and the Agency Has been fighting this battle for many years. As a work in progress, the Linux based OS of the Android will also integrate mandatory access controls to enforce the separation of information based on Confidentiality and integrity requirements.
Ads by Google
This allows threats of tampering and bypassing of application security mechanisms to be addressed and enables The confinement of damage (and compromise) that can be caused by malicious or flawed applications. Using the System's type enforcement and role-based access control abstractions, it is possible to configure the android to Meet a wide range of security needs which will be passed on to commercial users.
Locating a flawed application or process is the first step in trying to exploit it. Once you've found a flaw, the Next step is to try to exploit it or connect to it. While bad apps do occasionally show up in the Market, Google Removes them swiftly and they have the ability to remotely kill bad apps on the customer phones. The expertise Of the Intelligence community (NSA. GCHQ, etc) will shore up Google's proficiency. The security Relationships they now have will enhance user protection against data sniffing and exploitation tools.
Android Market
Critics and experts claim free antivirus apps from the market miss nine out of ten potential threats. The free apps guide users Through the capabilities of the apps detection abilities but, many users don't examine the potential they are getting. The paid apps Are able to scan and detect about half of all installed threats but they are limited by the sandboxed environment.
On installation blocking, the Zoner app blocked 80% of malware, while free apps typically failed to detect any infiltration. The Zoner app springs into action (as intended) to stop most infection processes. The paid apps (AVG, Kaspersky, etc) blocked All malware from being installed, even those not spotted with manual scans.
Zoner is a great app but (with the best outcome for the free apps), with Zoner AV scanning in real-time as apps are installed, 20% of known threats slipped right through. These free apps are used by millions of people who have absolute confidence in The Android Market. Users should be careful not to become complacent with proper security practices (avoid downloading Apps from the seedier side of the net).
The paid solutions will stop all of the current threats from being installed. This is good for an Android phone right out of the box. If a user has a unit that has been in use with no antivirus, many previously-installed malware apps will be missed. Basically the user (Paying for the app) is not going to be able to sweep their phones clear of malware.
Android User Security
The typical android user does not have the security research resources of the NSA available for their personal Protection on the networks (with the communication protocols used by most smart phones and tablets). Many users Are quick to adopt android antivirus (paid and free) apps assuming they are receiving the same expertise available In the desktop market. They lack the kind of low-level system access on mobile that desktop antivirus apps have had for years.
A new phone (should be backed up immediately for recovery operations) is better with a free antivirus app than it is with none at all, but an infected Android (or smart phone) is not going to benefit from a free security app (because most android malware will not be swept out) and will probably be in trouble even with a paid security app (20% of malware gets
through). Most of these have trouble cleaning a phone which is already full of malware.
Users Getting That New Droid
The best way to stay safe on Android is to back up your android and just stick to established apps from the official Android Market, Amazon Appstore or go straight to the paid security vendor sight (such as AVG, Bulldog, Kaspersky. Etc) to avoid the most Serious Android Malware threats in the wild.
The user's should stick to the official Android Market repositories, verified security vendor sights, leave the ‘unknown Sources' option disabled (in the ‘Android Settings)' and always scrutinize the security permissions and app requests.
Remember, when an app is installed, the system will always display the permissions requested. "SMS Trojans" Usually come in the form of a single app (like a website add-on) that asks for permission to send and receive SMS messages. When the infected app is given permission to access background processes, it also allows the Trojan to do the same. The Trojan then works unrestricted behind the scenes to send messages.
The Trojans typically are software apps the user installs willingly not knowing it is infected (from third party sites With porno, pirated music, games, etc). When they are installed, initially the user will be informed the app was not compatible, leading the user to believe the app did not install… then it goes after the country code to retrieve the phone Number… they then text premium rate numbers to rack up Charges for the unsuspecting user. They also employ this Tactic for apps that include phone calling permissions; that could call premium rate numbers without the users knowledge.
The most dangerous threats have been detected on forums and third party sights pretending to be well known apps. Users should proceed with caution on third party sights. By leaving the ‘Unknown Sources" option disabled in the ‘Android Settings" apps can not be side loaded effectively, blocking malicious vendors.
Cee Simpson is a Security Systems Analyst with EZMobilePC.com
Article source: https://articlebiz.comRate article
Article comments
There are no posted comments.
Related articles
- Luxury Chauffeur Services: A Journey of Elegance and Convenience
- Acura MDX and Honda Pilot: Which one will you choose?
- How to Save Money Every Day With Promo Codes
- Fresh Paint for a Fast Sale: Here's Why You Should Paint Before Listing
- The Invisible Impact of Missing Teeth: Why Replacing Them Matters
- Detecting Dental Beauty: 5 Core Traits of a Beautiful Smile
- Timeless Toothcare: Dental Hygiene Tips for Seniors
- Saving Old Smiles: How In-House Dental Discount Plans Help Seniors
- Too Much of a Good Thing? Signs You’re Brushing Your Teeth Too Hard
- Why a Root Canal Might Be the Best News for Your Tooth
- 10 Techniques for Achieving a Lean and Efficient Supply Chain
- What is DuckDuckGo?
- The Role of Lighting Stores in Brampton: Shaping Spaces for the Future
- The Role of Commercial Cleaning Services in Auckland: A Comprehensive Guide
- Exploring the World of Chauffeur Service: Benefits, Challenges, and Best Practices
- Nerds and Geeks: They still live on!
- IQ Tests: History, Uses, and Choosing a Reliable Resource
- 8 Great Ways To Teach Kids About Oral Hygiene
- App Development as a Catalyst for Business Growth
- Costs of arranging a Mortgage in Spain
- TikTok and Instagram: Ways you will grow and learn.
- Mustang GT: Ford Motor Company is a Rising Force!
- 10 Ways to Transform Production Scheduling in Business Central
- Elevating Your Home with Bold Decor and Vintage Carved Doors
- The Ultimate Skin Care Guide for Every Weather
- Do I Need Insurance When I Rent a Boat?
- Casino Bonuses: How to Maximize Your Rewards and Enhance Your Gameplay
- Was Joseph Stalin a good or bad leader of the Soviet Union?
- Top 5 Slots with the Highest RTP: A Winning Guarantee or a Myth?
- The Thrill of the Hunt Discovering the World of Location-Based Entertainment