Sistema

Wed
04
May

Current Security Issues within the Android Operating System

Contributed by Leonard M. Pickering

Android is a mobile Operating System (OS) developed by Google based on the Linux kernel. The OS was initially developed by Android, Inc. with the backing of Google in 2005. After three years of development, the first Android based mobile phone was available for sale in November of 2008. As of today, the Android operating system has been installed on over 1.4 billion devices, and is currently the most widely used computer operating system in the world. Due to the constantly increasing number of Android specific malware and other exploits, it has also become the most targeted and most vulnerable.

This document is in PDF format. To view it click here.

Wed
13
Apr

Android and iOS Security

Contributed by Jeremiah Everett

This paper will discuss security for the Android OS and Apple's iOS. So for a little background we will look at when Android and iOS were first released. Android was released to the public on the HTC Dream in October of 2008, and Apple’s iOS came out in March of 2008. Since the time of release more and more malware has been created and need for better security has been realized. In the article Android Security: A Survey of Issues, Malware Penetration, and Defenses, they state that increased popularity of the Android device and associated monetary benefits attracted malware developers, and this resulted in a big rise of Android malware apps between 2010 and 2014.

This document is in PDF format. To view it click here.

Thu
31
Mar

Mobile Device Security

Contributed by Dietrich Lehr

I will be focusing on mobile device security as it pertains to methodologies used to secure critical components of smartphone use. I will analyze and compare the two smartphone platform leaders, Apple and Android and the way they secure their devices. I will also provide insight as to which methods may be stronger and better for users to implement chose if multiple options are available.

This document is in PDF format. To view it click here.

Tue
01
Mar

Fun things to do with a Honeypot

Contributed by Alberto Gonzalez and Jason Larsen

Honeypots are a hot topic in the security research community right now. Everyone is starting up their own honeypot system. While most of current literature available on them deals with the potential gains a honeypot can give you, and how to monitor them, not very many of them deal with the mechanics of honeypots themselves.

Most honeypots as deployed from spare parts. Many start as just an extra box someone has lying around. A security savvy technician has slapped an OS on it, checksummed all the files, installed an IDS, and set about waiting for the hackers to arrive. These haphazard kinds of honeypots ignore some of the most interesting capabilities of honeypots. Honeypots can be used to ensnare and beguile potential hackers, entice them to give you more research information, and actively defend a production network.

Mon
11
Jan

Implementation of a File Integrity Check System

Contributed by Don Mosley

The area of real-time Intrusion Detection and Prevention utilizing intelligent routers or various network attached appliances has received much press in the last few years. Should any of these defenses provide less than 100% effective coverage the user will be left unaware of any 'mischief' that might have gotten through. There is still a need for non real-time scanning of system files to determine any unauthorized modifications. This type of audit is often the only effective way to spot malicious activity originating from inside the enterprise network. This paper will outline mechanisms and practices for effective file integrity checking.

This document is in PDF format. To view it click here.

Pages

Subscribe to RSS - Sistema