This week, we had a new topic that introduced us again to the world of security. Since the last few weeks were focused on PESTEL analysis, I was excited about our new lesson in Mobile security. This made me realize that security could be implemented in different platforms to provide assurance and no compromises on the device.
The first half of the lesson that we had was about Apple’s implementation of security into their devices. I learned a lot from the half portion of the class, for example; there is a term called sandboxing, which prevents the sharing of files to other applications installed in the device. The app store also contributes to security since they would verify the app first before publishing the application into the app store. This is to prevent any unwanted tampering of the said device.
For our second half of the class, we dived in the security implementation of Android devices. There are antivirus application for Android devices that would detect known signatures and implement countermeasures to prevent any mobile malware spread in the device. There is also the possibility of having a device going back to its previous OS version. The version of the device could also depend on the manufacturer or the company who sells the device. Sometimes, there are third-party apps that would be installed into the device and it cannot be uninstalled unless you root the device.
New terms surfaced when I listened to the lecture. One term is root where you upgrade the privilege of the user residing inside the Android device. Another set of terms that I learned was about mobile malware and that the biggest target of malware in the realms of mobile devices is Android