Android Security
With the arrival of search giant, Google in mobile phone market the Android operating system for mobile devices was introduced. In this article we would discuss the security of android operating system. We would see what threats an android based device faces, what are the vulnerabilities and what measures could be taken to make your android based device safer and secure.
Android is an open source operating system for mobile devices. Since its inception it had became hugely popular and is currently the second most used operating system for mobile devices after Nokia’s symbian. The android market is supported by a huge community of developers writing applications for android based devices. Upon its release, android security was considered to be invincible and there was a debate of why to use resource hogging and battery consuming security softwares when the android operating system itself could not be corrupted. But with the passage of time the android security was compromised. And the biggest security threat that emerged was the android market place applications. Although Google tries its best to ensure all the applications developed for android based devices are secure and safe, the hackers and malicious software always find a way to the devices. With billions of users, this made the android security a burning issue.
Apart from the risks and security issues that are always associated with a mobile device, the biggest security threat that android based mobile devices face is the threats from applications. The applications developed for an android based device can access your private data such as contacts, notes and other personal information stored on your device. A carefully engineering application can use the sensors, camera and microphone of android phone turning your android based device into a mini spy cam. So it is very important for android users to be careful while downloading and installing applications. The best thing to do is never download and install an application until and unless you need it critically. Even if you are going to download and install and application you must verify its developer and ensure that it had passed the Google security checks and quality assurance. Unlike the apple’s Iphone and Ipad, Android based devices do not have a standard version of operating system. It is upto your service provider to make the latest update of android available to you. The inability of a centralized update platform make the android based mobile devices more vulnerable to security threats and exploits. To counter the threat of applications you must set the permissions for these applications. You can view the information that your applications are currently accessing by visiting the Android market, similar to the applications store from your android based mobile device. From here you can select the applications you want to view. After selecting the applications go to security under the menu tab. Here you would be shown all the applications that you have selected earlier. You will be shown which information these applications are accessing. Now you can disable or uninstall the applications that are exhibiting suspicious behavior or accessing your private information that you want to hide. You can also consult the developer documentation to get help on applications. Google allows the users of android based mobile devices to comment on applications that they are using. You must take advantage of these comments, always read the comments of applications that you are using or planning to download and install. If you find anything suspicious in more than 5 comments on an android application, do not download or install it. If your are already using it then check what information it is accessing, if it seems suspicious then disable or uninstall that application. You can also use the ‘app protector’ software to lock the applications on android phone. You can also set a password. If you try to access or launch a locked application it would ask you to enter password. The open source environment of android operating system lets you modify the license library. Though it wont stop an attack, it would make it difficult for muggers to disband the code. The Afirewall is another innovative security application for android mobiles. Afire is a free version of firewall for android based devices. With Afirewall you can block calls for specific numbers.
Another security service for android based mobiles is the DroidHunter. It contains an antivirus program, an intrusion detecting system, incoming alerts and online management system. It is very much like a desktop based antivirus program, apart from the fact that it is sensitive only to android based threats. The droidhunter can also be used to locate your lost or stolen android mobile phone.
After discussing the threats android mobile faces from application now lets move on to more traditional or conventional threats that your android mobile faces.
Prevent unauthorized use of your android mobile. The easiest way to accomplish this task is by never leaving your android mobile alone. Always keep it with you or at a safe location. Use the screen lock feature to protect your device even if it gets lost or is stolen. The android operating system lets you use three methods for screen lock. The conventional passcode mehod in which you specify a combination of letters and numbers to unlock your android phone. You can also use a specific pattern of drawing or signature to unlock your android phone. The third option is to use a biometric lock, you can lock and unlock your android mobile with your fingerprint. The latitude based service of android mobile is used to track your location but if you want increased privacy and security then you must disable the location detection and tracking system in your android mobile. To perform this go to latitude settings and disable the detect your location option.
If you want to connect your android phone to a wifi network or any other device through Bluetooth, always make sure that the network is secure or the device or network do not pose a seriouis security risk. If you do not need connectivity then disable the Bluetooth of your android mobile.
If you are using your android mobile for browsing or surfing the internet then there are a number of browser based settings to increase the security of your device. Make sure you have got the right options turned on. In the browser security settings you can block pop ups, enable or disable java script, enable or disable plug ins, clear browsing history and check your cookies settings. Its important for android users to get themselves familiarized with these settings and adjust them according to their usage habits.
Comments
Post a Comment