Android Security
Clement
Olaosebikan
Android
Security
Popularity of Android Devices
As more than 60% of people use mobile
devices for shopping and get information
online today, smartphones now define
digital identity and businesses’ presence.
And as per the Statista data, over 70% of
mobile users globally use Android. That
makes it vital to secure Android devices.
Introduction to Andriod Security?
Android is a Linux kernel mobile platform. Android runs on a wide range
of devices, from mobile smartphones and tablets, to set-top boxes. The
Android mobile operating system is dependent upon the mobile device’s
processor capabilities for its performance.
Security is a major part of any Android device. Android was created with
openness in mind, and is conducive to the use of third-party applications
and cloud-based services. Android seeks to be a secure and usable
operating system for mobile platforms.
Why Android is targeted by Hackers
Android is more often targeted by hackers,
too, because the operating system powers
so many mobile devices today. The global
popularity of the Android operating system
makes it a more attractive target for
cybercriminals. Android devices, then, are
more at risk of the malware and viruses
that these criminals unleash.
Danger of not securing your Android devices
If you are not protecting your
Android devices, your entire
data is at risk. That’s
because anyone can trace
and steal information from
your insecure phones and
mobile devices.
Android's Five Key Security Features:
1. Security at the operating system level through the Linux kernel
2. Mandatory application sandbox
3. Secure interprocess communication
4. Application signing
5. Application-defined and user-granted permissions
Core Security features to build secure app with
your Android OS
● The Android Application Sandbox, which isolates your app data and code
execution from other apps.
● An application framework with robust implementations of common security
functionality such as cryptography, permissions, and secure IPC.
● Technologies like ASLR, NX, ProPolice, safe_iop, OpenBSD dlmalloc,
OpenBSD calloc, and Linux mmap_min_addr to mitigate risks associated with
common memory management errors.
● An encrypted file system that can be enabled to protect data on lost or stolen
devices.
● User-granted permissions to restrict access to system features and user data.
● Application-defined permissions to control application data on a per-app
basis.
How to stay safe on Android
You need stick to the Google Play
store. Google Play features
countless apps. You really have no
reason to download Android apps
from any other location. If you do
venture outside Google Play, you
could likely increase your chances
of downloading an infected app
Thank You
Clement Olaosebikan