Download Analysis And Research Of System Security Based

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts

Airborne Networking wikipedia , lookup

Recursive InterNetwork Architecture (RINA) wikipedia , lookup

Cracking of wireless networks wikipedia , lookup

Wireless security wikipedia , lookup

Piggybacking (Internet access) wikipedia , lookup

Computer security wikipedia , lookup

Transcript
Analysis And Research Of
System Security Based On
What is Android?
• Android is a software
stack for mobile devices
that includes an operating
system, middleware and
key applications.
3
• Android SDK
• Uses Java programming
language
• Planned to run on different types of devices.
•First phone
launched HTC G1
in 2008
•30+
industrial
partners
•Software
updates
every few
months
• Android platform is based on Linux
technology.
• Composed of OS, user interface and
application components.
• Its issuance breaks the monopoly status of
Microsoft windows mobile OS and Nokia’s
Symbian OS.
• Allows anyone to develop him own
applications.
• User is likely to download and install
malicious softwares written by software
hackers.
PHONES
HTC G1,
Droid,
Tattoo
Suno S880
Motorola Droid (X)
Samsung Galaxy
Sony Ericsson
7
Tablets
Velocity Micro Cruz
Dawa D7
Gome FlyTouch
Toshiba Android
SmartBook
Acer beTouch
Cisco Android Tablet
8
Android Platform
Architecture
• Android has built in tools.
• Android platform composed of Linux
kernel, system libraries, android run
time, application framework and so on
five parts.
Linux kernel
• Android relies on Linux 2.6 version
• It provides core system services
security,memory management, process
management, network group, driven model.
• The core part is equivalent to an abstract level
between the hardware layer and other software
in the systems.
Libraries
• Android includes a set of C/C++ libraries.
• Android’s core libraries provide most of the
function to the Java class libraries.
Android runtime
• Android runtime consists of two
components.
• First, a set of core libraries.
• Second, the Virtual machine Dalvik.
• Java programs are received and
translated by the VM Dalvik.
• Applications will be encapsulated in
Dalvik.
• A VM is available for each and every
program even if some programs are
running in parallel.
Application Framework
• An application framework is a software
framework that is used to implement a standard
structure of an application for a specific OS.
• Any application can publish its own features.
• These functions can be used by any other
application.
Applications
• Applications are written in Java programming
language.
• The Android SDK tools compile the code into an
android package,an archive file with a .apk
suffix.
• The android software platform come with a set of
basic applications.
• These applications can run simultaneously.
Important Features
•
•
•
•
•
•
•
•
•
•
Application framework
Dalvik VM
Integrated browser
Optimized graphics
SQLite
Media support
GSM telephony
Bluetooth,EDGE,3G and WiFi
Camera,GPS,compass and accelerometer
Rich development environment.
Android System
Security
• In the default settings, no application has
permission to perform any operations that
would adversely impact other applications,
the OS, or the user.
• Android’s security mechanism is mainly
reflected in 2 aspects:Android system
security and data security.
Android system security
protection
• Android system safety inherited the design of
Linux in the design ideology.
• In practice, each Android application runs in its
own process.
• In the OS, each application runs with a unique
system identity.
• Most of the security functions are provided by
the permission mechanism.
• Permission can be restricted to particular
specific process operations.
Android data security
protection
• Android is privilege
separated.
• Data security mainly
relies on software
signature
mechanism.
• It uses AndroidManifest.xml file
• When specified software services are
called,the system first checks this file.
• To make use of protected features of the
device, one must include in
AndroidManifest.xml,one or more <usespermission> tags declaring the
permissions.
<manifest>
<uses-permission
android:name=“android.permission.READ”/>
<uses-permission
android:name=“android.permission.RECEIVE”/>
<uses-permission
android:name=“android.permission.SEND”/>
</manifest>
Example Applications
• Android anti theft security
• Junos pulse for Android
• Phone security alarm system
Android anti theft security
The ultimate security for Android device
in case it is ever lost or stolen
.
FEATURES
•
•
•
•
Accurate tracking
Data encryption
Spy camera activation
Device lockdown
• Some reasons why Android Anti-Theft Security
by Snuko is a must for your smartphone or
tablet device:
✔ DEVICE LOCATION TRACKING
✔ DATA BACKUP
✔ ENCRYPTION AND HIDING OF DATA
✔ AUTOMATIC REGISTRATION
✔ SPY CAMERA
✔ SOUND AUDIBLE ALARM
✔ SIM CHANGE DETECTION
✔ UNAUTHORISED SIM INFORMATION
CAPTURE
✔ LOCK DOWN OF THE DEVICE
✔ SET YOUR OWN LOCK
✔ LOST DEVICE REPORT GENERATION
• Other supported platforms: WINDOWS, MAC,
BLACKBERRY
PERMISSIONS
• SEND SMS MESSAGES
• HARDWARE CONTROLS
TAKE PICTURES AND VIDEOS
• YOUR LOCATION
FINE (GPS) LOCATION
• RECEIVE SMS
• READ SMS OR MMS
• EDIT SMS OR MMS
• FULL INTERNET ACCESS
• READ CONTACT DATA
• WRITE CONTACT DATA
PERMISSIONS
• READ PHONE STATE AND IDENTITY
• MODIFY/DELETE USB STORAGE CONTENTS
MODIFY/DELETE SD CARD CONTENTS
• DISABLE KEYLOCK
• PREVENT TABLET/PHONE FROM SLEEPING
• CHANGE NETWORK CONNECTIVITY
• DISCOVER KNOWN ACCOUNTS
• VIEW WI-FI STATE
• VIEW NETWORK STATE
• DEFAULT
POWER ON OR OFF
JUNOS PULSE FOR ANDROID
Junos Pulse secures
connectivity to your
corporate web-based
applications via
Juniper Networks
SSL VPN gateways
FEATURES
• Safe, secure access to webbased applications,
enterprise networks, and
bookmarks
• Secure access to corporate
email through Outlook Web
Access.
• Real-time antivirus
protection.
• Background scanning of all
network traffic and interfaces
for malware, viruses and
spyware.
Permissions
•
•
•
•
•
•
•
•
•
•
•
DIRECTLY CALL PHONE NUMBERS
YOUR LOCATION
YOUR MESSAGES
NETWORK COMMUNICATION
YOUR PERSONAL INFORMATION
PHONE CALLS
STORAGE
SYSTEM TOOLS
YOUR ACCOUNTS
NETWORK COMMUNICATION
SYSTEM TOOLS
Phone Security Alarm System
An alarm sound will play when a voice/noise
is too loud, on movement or on touch.
Go!!! Fool your friends…
★★★Features★★★
• ✔ High quality sounds
✔ Nice graphics
✔ All configurable
✔ Many different sounds
✔ etc.
PERMISSIONS
•
HARDWARE
CONTROLS
*RECORD AUDIO
• NETWORK
COMMUNICATION
*FULL INTERNET ACCESS