Seminar paper from the year 2018 in the subject Computer Science - IT-Security, grade: 1,0, Technical University of Munich, course: Seminar Mobile Application Security, language: English, abstract: Smartphones are being used as the preferred device for as many things as possible in today's world. This is why having secure phones that are resilient against attacks targeting their users' data, becomes more and more important. This paper tries to assess what measures device vendors have taken to ensure those attacks will not be successful. Because the market is mostly divided between Google's Android and Apple's iOS, we put our focus on those two operating systems and compare their respective security models. Additionally this comparison will be evaluating how those models have changed over time since the beginning of the smartphone era around 2010. The last part of this analysis will take a look at a different view on smartphones, the perspective of so-called "power users": Those are people that do not only use their smartphone for downloading some apps and surfing the Internet but rather want to do some lower-level customization to the operating system, by rooting their Android device or jailbreaking their iPhone. This process of gaining full privileges on the phone not only creates advantages for the user but can also have rather negative implications on the device's security. How exactly does this affect the protections implemented by the vendor?
"Sinopsis" puede pertenecer a otra edición de este libro.
Librería: BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Alemania
Taschenbuch. Condición: Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -Seminar paper from the year 2018 in the subject Computer Science - IT-Security, grade: 1,0, Technical University of Munich, course: Seminar Mobile Application Security, language: English, abstract: Smartphones are being used as the preferred device for as many things as possible in today's world. This is why having secure phones that are resilient against attacks targeting their users' data, becomes more and more important. This paper tries to assess what measures device vendors have taken to ensure those attacks will not be successful. Because the market is mostly divided between Google's Android and Apple's iOS, we put our focus on those two operating systems and compare their respective security models. Additionally this comparison will be evaluating how those models have changed over time since the beginning of the smartphone era around 2010. The last part of this analysis will take a look at a different view on smartphones, the perspective of so-called 'power users': Those are people that do not only use their smartphone for downloading some apps and surfing the Internet but rather want to do some lower-level customization to the operating system, by rooting their Android device or jailbreaking their iPhone. This process of gaining full privileges on the phone not only creates advantages for the user but can also have rather negative implications on the device's security. How exactly does this affect the protections implemented by the vendor 16 pp. Englisch. Nº de ref. del artículo: 9783668987524
Cantidad disponible: 2 disponibles
Librería: buchversandmimpf2000, Emtmannsberg, BAYE, Alemania
Taschenbuch. Condición: Neu. Neuware -Seminar paper from the year 2018 in the subject Computer Science - IT-Security, grade: 1,0, Technical University of Munich, course: Seminar Mobile Application Security, language: English, abstract: Smartphones are being used as the preferred device for as many things as possible in today's world. This is why having secure phones that are resilient against attacks targeting their users¿ data, becomes more and more important. This paper tries to assess what measures device vendors have taken to ensure those attacks will not be successful.Because the market is mostly divided between Google¿s Android and Apple's iOS, we put our focus on those two operating systems and compare their respective security models. Additionally this comparison will be evaluating how those models have changed over time since the beginning of the smartphone era around 2010.The last part of this analysis will take a look at a different view on smartphones, the perspective of so-called 'power users': Those are people that do not only use their smartphone for downloading some apps and surfing the Internet but rather want to do some lower-level customization to the operating system, by rooting their Android device or jailbreaking their iPhone.This process of gaining full privileges on the phone not only creates advantages for the user but can also have rather negative implications on the device's security. How exactly does this affect the protections implemented by the vendor Books on Demand GmbH, Überseering 33, 22297 Hamburg 16 pp. Englisch. Nº de ref. del artículo: 9783668987524
Cantidad disponible: 2 disponibles
Librería: AHA-BUCH GmbH, Einbeck, Alemania
Taschenbuch. Condición: Neu. Druck auf Anfrage Neuware - Printed after ordering - Seminar paper from the year 2018 in the subject Computer Science - IT-Security, grade: 1,0, Technical University of Munich, course: Seminar Mobile Application Security, language: English, abstract: Smartphones are being used as the preferred device for as many things as possible in today's world. This is why having secure phones that are resilient against attacks targeting their users' data, becomes more and more important. This paper tries to assess what measures device vendors have taken to ensure those attacks will not be successful. Because the market is mostly divided between Google's Android and Apple's iOS, we put our focus on those two operating systems and compare their respective security models. Additionally this comparison will be evaluating how those models have changed over time since the beginning of the smartphone era around 2010. The last part of this analysis will take a look at a different view on smartphones, the perspective of so-called 'power users': Those are people that do not only use their smartphone for downloading some apps and surfing the Internet but rather want to do some lower-level customization to the operating system, by rooting their Android device or jailbreaking their iPhone. This process of gaining full privileges on the phone not only creates advantages for the user but can also have rather negative implications on the device's security. How exactly does this affect the protections implemented by the vendor. Nº de ref. del artículo: 9783668987524
Cantidad disponible: 1 disponibles
Librería: preigu, Osnabrück, Alemania
Taschenbuch. Condición: Neu. Differences Between the Security Models of Android and iOS | Samuel Hopstock | Taschenbuch | 16 S. | Englisch | 2019 | GRIN Verlag | EAN 9783668987524 | Verantwortliche Person für die EU: BoD - Books on Demand, In de Tarpen 42, 22848 Norderstedt, info[at]bod[dot]de | Anbieter: preigu Print on Demand. Nº de ref. del artículo: 117348442
Cantidad disponible: 5 disponibles