Study on Smartphones Mobile Device Security and the Existing Solution
| Vol-4 | Issue-5 | May 2019 | Published Online: 25 May 2019 PDF ( 147 KB ) | ||
| Author(s) | ||
| Vimalsinh Bharatsinh Mahida 1; Dr. Jitendra Sheetlani 2 | ||
|
1Research Scholar under the faculty of Computer Application at SSSUTMS, Sehore-MP. (India) 2Professor of Computer Application department at SSSUTMS, Sehore-MP. |
||
| Abstract | ||
Mobile devices are considered as tablet and phones which run a mobile Operating System (OS). All the more explicitly, these are Android (Google), iOS (Apple), or BlackBerry OS (RIM). While it is imperative to take note of these terms there are two primary assault vectors for mobile phones. The first is the point at which a mobile phone interfaces the web; the second is the point at which a mobile phone associates with a network. Since so much personal and financial information is being handled on a phone, this is making the mobile phone condition increasingly speaking to programmers. There are number of security estimates operating in advanced cells today. This paper presents those utilized for the Android platform. First comes the mechanisms identified with security that are accessible through the OS. Second is Google's system for verifying applications accessible in their Play Store. Third, Antivirus (AV) arrangements are inspected. In this paper we will examine on smart-phone mobile device security and the current arrangement. |
||
| Keywords | ||
| Android, OS, Google, device | ||
|
Statistics
Article View: 392
|
||

