This week, we had a new topic that introduced us again to the world of security. Since the last few weeks were focused on PESTEL analysis, I was excited about our new lesson in Mobile security. This made me realize that security could be implemented in different platforms to provide assurance and no compromises on the device.

     The first half of the lesson that we had was about Apple’s implementation of security into their devices. I learned a lot from the half portion of the class, for example; there is a term called sandboxing, which prevents the sharing of files to other applications installed in the device. The app store also contributes to security since they would verify the app first before publishing the application into the app store. This is to prevent any unwanted tampering of the said device.

 For our second half of the class, we dived in the security implementation of Android devices. There are antivirus application for Android devices that would detect known signatures and implement countermeasures to prevent any mobile malware spread in the device. There is also the possibility of having a device going back to its previous OS version. The version of the device could also depend on the manufacturer or the company who sells the device. Sometimes, there are third-party apps that would be installed into the device and it cannot be uninstalled unless you root the device.

New terms surfaced when I listened to the lecture. One term is root where you upgrade the privilege of the user residing inside the Android device. Another set of terms that I learned was about mobile malware and that the biggest target of malware in the realms of mobile devices is Android


Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )


Connecting to %s