Monday, April 15, 2019

Investigating the effectiveness of Mobile Antivirus Application on Android and Windows Mobile Phone Essay Example for Free

Investigating the effectiveness of industrious Anticomputer virus Application on mechanical man and Windows brisk earpiece EssayChapter 1 Anti-virus Applications on wandering DevicesMobile border anti-virus softw are package refers to security measure software package programs which capture been professionally developed to protect thingumajig substance ab partrs from viruses, worms, Trojans and other(prenominal) vixenish programs and removing them where manageable. Anti-virus software programs have deep gained popularity due the increased incidences of malicious threats of attack on the web. at that place are several new viruses that are detected on a day to day priming on the cyberspace. While some of these viruses whitethorn be harmless, others are annoying and quite destructive. Certain viruses replicate themselves, but others may cause weighty problems to the extent of erasing all data on a device drive. The use of anti-virus for device tax shelter pot be applied to multiple operating constitutions including Mobile Windows and humanoid diligent phones (iSoftwareReviews 2010).Antivirus software works in various technical ways to give protection to and remove viruses from smooth devices. This normally occur with two security scanning functions namely On-Access Scanning and On-Demand Scanning. The On-Access scanning works in real-time to batten a lively device is protected at all times by monitoring for viruses to e very accessing in the mobile device, for example while opening a file or opening an covering program. condescension of the fact that this software slows d protest the speed of a device, its role in antivirus protection is so deprecative and should thus be enabled at all times. On-Demand Scanning offers antivirus protection only when activated to scan whatsoever particular area, folder, file, or drive. The program then provides a scan report about how many viruses that have been found in the scanned item. In the event that a virus is detected, the program will give out the user and recommend an action which takes either to deleting or quarantine the virus (iSoftwareReviews 2010).The rapidly increasing advancements of mobile phone technology to include a number of useful attributes have made humanoid and windows mobile phones very popular pocket personal computers. This increased popularity has not however come with its own setbacks. Just same the ordinary personal computers, android and windows mobile phones have withal been subjected to increased viruses attack. Virus attack has indeed become the latest and single biggest threat to the mobile phone industry. Subsequently, numerous companies dealing in software have come up with anti-virus for use in the android and windows mobile phones. These are mainly anti-virus software packages developed to provide anti-virus protection to mobile phones (iSoftwareReviews 2010).There are a number of anti-virus software programs for mobile p hones that are available to the users. The main mobile phone anti-virus software includes AhnLab Mobile Security, Avast PDA Edition, Avira Antivir Mobile, BitDefender Mobile Security, BullGuard Mobile Antivirus, Dr.Web Mobile Security cortege, F-Secure Mobile Security, Kaspersky Mobile Security, and Norton Smartphone Security. AhnLab Mobile Security software provides a solution for viruses and worms protection and removal. It runs under windows mobile and android mobile phones. Avast PDA Edition is an antivirus protection for PalmOS and Windows CE, Android phones, and Pocket PC based devices (iSoftwareReviews 2010).Avira AntiVir Mobile provides professional virus and malware protection for pocket PCs, Windows mobile and Android mobile phones. BitDefender Mobile Security provides solution for virus protection and removal for PDAs and Smartphone that run on Windows mobile or Android mobile phones. BullGuard Mobile Antivirus provides solutions for protecting Pocket PCs and Windows mob ile against viruses and other malicious programs. Dr.Web Mobile Security Suite is designed to provide anti-virus security solutions for pocket PCs that runs on Windows Mobile operating system. F-Secure Mobile Security is a complete mobile security software package that includes anti-virus, anti-spyware, a firewall and a remote control anti-theft feature for protection. Kaspersky Mobile Security also provides a complete protection package including Anti-theft protection, virus protection, firewall and anti-spam for SMS, EMS, and MMS. Norton Smartphone Security offers anti-virus, anti-spam, and firewall for Windows mobile and Android mobile protection (iSoftwareReviews 2010).Protecting an android and window mobile phone from attack requires a complete representing of all application communication. This is important because software can only protect a device if and only if it is able to read the same information as the mobile phone device, afterward application layer threats. It may not be possible at heart the technological framework for antivirus software to understand application communications or analyse application behavior through the deep brushup of intrusion prevention packets, whether on individual basis or when reassembled into their original sequence. Similarly, network-level antivirus may detect a small number of cognize, easily identifiable security threats by simply examining pre-programmed patterns (Citrix Systems 2006).Installation of antivirus is the best known way of protecting android and windows mobile phones. The best types of antivirus are the application firewalls since they operate at the application layer instead of the network level. The application firewalls are able to enforce correct application demeanor while preventing any malicious activeness. This is because the firewalls are able to inspect the actual internet communication and understand the context of all client requests and application responses through which they are sent to the internet. A complete mobile phone security application needs to offer full protection of all the elements of an application as well as users of the application. In most cases however, security applications for mobile phones are only limited to the application programme and application data (Citrix Systems 2006).Thesis StatementDespite web devices continuing to face satisfying security threats, mobile phones go completely unprotected while web browsing, downloading applications, checking e-mail, conducting online banking and connecting to social networking sites like chirrup and Facebook. While mobile attacks are increasing rapidly and hackers are financially motivated to steal data, identities, and rap corporate communications, it has become critical to protect mobile devices such as android phone and Windows phones. screen background of the studySmartphone security is the touch on of preventing and detecting unlicensed use of your system. Prevention measures help y ou to s filch unauthorized users (also known as intruders) from accessing any part of your mobile phone system. Detection helps you to determine whether or not someone attempted to break into your system, if they were successful, and what they may have done. We use android and windows mobile for everything from banking and investing to obtain and communicating with others through email or chat programs. Although you may not consider your communications top secret, you probably do not want strangers yarn your email, using your phone to attack other systems, displace forged email from your phone, or examining personal information stored on your phone (such as financial statements).There are a variety of antivirus software packages that operate in many different ways, depending on how the trafficker chose to implement their software. What they have in common, though, is that they all look for patterns in the files or memory of your Smartphone that indicate the possible presence of a known virus. Antivirus packages know what to look for through the use of virus profiles (sometimes called sense of touchs) provided by the vendor. saucy viruses are discovered daily. The effectiveness of antivirus software is dependent on having the latest virus profiles installed on your Smartphone so that it can look for recently discovered viruses. It is important to keep these profiles up to date.Chapter 2 Android Phone EmulatorsAn android mobile phone is a phone fitted with a set of software consisting of operating systems, middleware and other major applications. The main features of android include application framework for facilitating reuse and replacement of components, Dalvik virtual shape which is optimised for mobile devices, optimised graphics, an integrated browser, media tools for common audio, video and still image formats, SQLite for structured data storage, and GSM Telephony. Other features include Bluetooth, Camera, and Rich development consisting of a devic e emulator, tools for debugging, memory and performance profiling. Android technology is dependent on Linux version 2.6 to power the main system servicing including security, memory management, process management, network stack, and driver models (Android Developers 2010).Android technology is made up of a multi-process system in which each application runs in its own process. A standard Linux facility is responsible for coordinating security between different applications such as user and group identifications assigned to the applications in Android mobile phone. The crux of the security applications is on the basis of the concept that no application, by default, has access to perform any operation with a potential of adversely impacting on other applications, the operating system, or the user. The applications that the Linux facility must grant licence include reading or writing the users private data, reading or writing another applications file, performing network access, and k eeping the device awake. The permission that an application requires is statistically declared in that application so that Linux facility can master the upfront during installation and not subject to smorgasbord thereafter (Android Developers 2010).The antivirus software for mobile forms utilises various virus undercover work methods. The two main virus detection methods include signature based detection and behaviour based detection. Signature Based Detection sours use of virus signatures dictionary to compare the files when checking for viruses. A signature dictionary is a database containing very many virus signatures which the software manufacturer has so far found. The user is expected to continually update the virus signature directory as when new viruses, worms, Trojans, and other malicious programs appear. Failure to update the dictionary may lead to ill fortune of the software to detect emerging viruses. The behaviour Based Detection is designed to monitor and control a ny activities in the device system for suspicious program behaviour. In the event that a suspicious behaviour is detected, the software probes further into that suspicious behaviour by applying the signature based detection to countercheck whether the activity is malicious or not. In the event that the suspicious program is malicious, an alert will be generated to notify the user.Android emulator is a virtual mobile device which runs on a phone system and allows the user to prototype, develop, and test android applications for possible malicious programs without necessarily using a physical device. This device mimics all the hardware and software features of a phone save for the fact that it cannot receive or make a call. As soon as a particular application starts to run on the emulator, it may make use of the services of the android platform to invoke other applications, access the network, and notify the user. The emulators also contain various debug capabilities like console from which the user can log kernel output, feign application interrupts, and simulate latency effects and dropouts on the data channel (Android developers 2010).As stated earlier, android utilises a multi-process system in which each and every application runs on its own process. Since majority of the security between applications is granted at the process level, android emulators provide more detailed security features through a permission mechanism that enforces restriction on the specific operations that any particular process can perform and permission for granting ad-hoc access to specific pieces of data. While the emulators ensures that no application acts in a manner that can adversely affect another application, it is still possible for an application to encroach into the actions of another application as long as permission is forehand obtained in order to perform the external function not provided by the basic nucleus (Vennon 2010).The android emulators can also disallow thes e orthogonal permissions on the basis of the certificates that were used to sign the application or by simply prompting the user. The permission that an application will require to function outside its nucleus is statistically declared by the emulators within the application and will be relayed to the Smartphone user, and the permission will not change. The android emulators consider malware to be malicious software designed to infiltrate a Smartphone system without the users informed consent (Vennon 2010).

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.