Presentation is loading. Please wait.

Presentation is loading. Please wait.

Analysis And Research Of System Security Based On.

Similar presentations


Presentation on theme: "Analysis And Research Of System Security Based On."— Presentation transcript:

1 Analysis And Research Of System Security Based On

2

3 3 What is Android? Android is a software stack for mobile devices that includes an operating system, middleware and key applications.

4 Android SDK Uses Java programming language Planned to run on different types of devices.

5 First phone launched HTC G1 in 2008 30+ industrial partners Software updates every few months

6 Android platform is based on Linux technology. Composed of OS, user interface and application components. Its issuance breaks the monopoly status of Microsoft windows mobile OS and Nokia’s Symbian OS. Allows anyone to develop him own applications. User is likely to download and install malicious softwares written by software hackers.

7 7 HTC G1, Droid, Tattoo Motorola Droid (X) Suno S880Samsung Galaxy Sony Ericsson PHONES

8 8 Tablets Velocity Micro Cruz Gome FlyTouchAcer beTouch Dawa D7 Toshiba Android SmartBook Cisco Android Tablet

9 Android Platform Architecture Android has built in tools. Android platform composed of Linux kernel, system libraries, android run time, application framework and so on five parts.

10

11 Linux kernel Android relies on Linux 2.6 version It provides core system services security,memory management, process management, network group, driven model. The core part is equivalent to an abstract level between the hardware layer and other software in the systems.

12 Libraries Android includes a set of C/C++ libraries. Android’s core libraries provide most of the function to the Java class libraries.

13 Android runtime Android runtime consists of two components. First, a set of core libraries. Second, the Virtual machine Dalvik. Java programs are received and translated by the VM Dalvik. Applications will be encapsulated in Dalvik. A VM is available for each and every program even if some programs are running in parallel.

14 Application Framework An application framework is a software framework that is used to implement a standard structure of an application for a specific OS. Any application can publish its own features. These functions can be used by any other application.

15 Applications Applications are written in Java programming language. The Android SDK tools compile the code into an android package,an archive file with a.apk suffix. The android software platform come with a set of basic applications. These applications can run simultaneously.

16 Important Features Application framework Dalvik VM Integrated browser Optimized graphics SQLite Media support GSM telephony Bluetooth,EDGE,3G and WiFi Camera,GPS,compass and accelerometer Rich development environment.

17 Android System Security In the default settings, no application has permission to perform any operations that would adversely impact other applications, the OS, or the user. Android’s security mechanism is mainly reflected in 2 aspects:Android system security and data security.

18 Android system security protection Android system safety inherited the design of Linux in the design ideology. In practice, each Android application runs in its own process. In the OS, each application runs with a unique system identity. Most of the security functions are provided by the permission mechanism. Permission can be restricted to particular specific process operations.

19 Android data security protection Android is privilege separated. Data security mainly relies on software signature mechanism.

20 It uses AndroidManifest.xml file When specified software services are called,the system first checks this file. To make use of protected features of the device, one must include in AndroidManifest.xml,one or more tags declaring the permissions.

21

22 Example Applications Android anti theft security Junos pulse for Android Phone security alarm system

23 Android anti theft security The ultimate security for Android device in case it is ever lost or stolen.

24 FEATURES Accurate tracking Data encryption Spy camera activation Device lockdown

25 Some reasons why Android Anti-Theft Security by Snuko is a must for your smartphone or tablet device: ✔ DEVICE LOCATION TRACKING ✔ DATA BACKUP ✔ ENCRYPTION AND HIDING OF DATA ✔ AUTOMATIC REGISTRATION ✔ SPY CAMERA ✔ SOUND AUDIBLE ALARM ✔ SIM CHANGE DETECTION ✔ UNAUTHORISED SIM INFORMATION CAPTURE ✔ LOCK DOWN OF THE DEVICE ✔ SET YOUR OWN LOCK ✔ LOST DEVICE REPORT GENERATION Other supported platforms: WINDOWS, MAC, BLACKBERRY

26 PERMISSIONS SEND SMS MESSAGES HARDWARE CONTROLS TAKE PICTURES AND VIDEOS YOUR LOCATION FINE (GPS) LOCATION RECEIVE SMS READ SMS OR MMS EDIT SMS OR MMS FULL INTERNET ACCESS READ CONTACT DATA WRITE CONTACT DATA

27 PERMISSIONS READ PHONE STATE AND IDENTITY MODIFY/DELETE USB STORAGE CONTENTS MODIFY/DELETE SD CARD CONTENTS DISABLE KEYLOCK PREVENT TABLET/PHONE FROM SLEEPING CHANGE NETWORK CONNECTIVITY DISCOVER KNOWN ACCOUNTS VIEW WI-FI STATE VIEW NETWORK STATE DEFAULT POWER ON OR OFF

28 JUNOS PULSE FOR ANDROID Junos Pulse secures connectivity to your corporate web-based applications via Juniper Networks SSL VPN gateways

29 FEATURES Safe, secure access to web- based applications, enterprise networks, and bookmarks Secure access to corporate email through Outlook Web Access. Real-time antivirus protection. Background scanning of all network traffic and interfaces for malware, viruses and spyware.

30 Permissions DIRECTLY CALL PHONE NUMBERS YOUR LOCATION YOUR MESSAGES NETWORK COMMUNICATION YOUR PERSONAL INFORMATION PHONE CALLS STORAGE SYSTEM TOOLS YOUR ACCOUNTS NETWORK COMMUNICATION SYSTEM TOOLS

31 Phone Security Alarm System An alarm sound will play when a voice/noise is too loud, on movement or on touch. Go!!! Fool your friends…

32 ★★★ Features ★★★ ✔ High quality sounds ✔ Nice graphics ✔ All configurable ✔ Many different sounds ✔ etc.

33 PERMISSIONS HARDWARE CONTROLS *RECORD AUDIO NETWORK COMMUNICATION *FULL INTERNET ACCESS

34

35


Download ppt "Analysis And Research Of System Security Based On."

Similar presentations


Ads by Google