Download
mobile operating system security n.
Skip this Video
Loading SlideShow in 5 Seconds..
Mobile Operating System Security PowerPoint Presentation
Download Presentation
Mobile Operating System Security

Mobile Operating System Security

147 Vues Download Presentation
Télécharger la présentation

Mobile Operating System Security

- - - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript

  1. Mobile Operating System Security A presentation by Daniel Adams CSC 345 Dr. box

  2. A brief history • Palm OS • First mobile operating system • Released in 1996 • Lacked a file system • Windows CE • Windows for embedded systems • Also released in 1996 • Symbian OS • Released on Ericsson R380 in 1999 • First modern OS on a smartphone

  3. A brief history • BlackBerry • Released first smartphone in 2002 • Many business productivity applications • iOS • Released in 2007 • Marketed as an “Internet communicator” • Android • Version 1.0 released on HTC Dream in 2008 • Free and open source, developed by Google

  4. Why should I worry about protecting my device? • Loss of services • Loss of data • Compromise of privacy • Potential fraudulent charges

  5. Types of threats • Denial of service • Unable to access resources • Caused by bugs or attacks • Malware • Not as prevalent on mobile devices as computers • Can include • Viruses • Worms • Trojans • Rootkits

  6. Safeguards • Malware prevention • iOS: Apple must approve apps put on app store • Android: Google scans apps put on store and on phone • Windows Phone: Microsoft must approve apps put on app store • Malware removal • Multitude of antimalware Android apps in app store • Secure Boot • Uses known cryptographic signatures during boot to detect tampering by a rootkit

  7. Safeguards • SELinux • Security Enhanced Linux • Used by Android to control access to rescources • File Permissions • Prevent processes from accessing whatever file they want • Can stop malware from accessing critical OS files • Memory Protection • Prevents processes from gaining higher privledges

  8. Safeguards • Authentication • PIN, passcode, pattern, facial recognition • Thin layer of protection against theft • Device encryption • Renders data on phone unreadable without key • Virtually impossible to crack