Loading...

Messages

Proposals

Stuck in your homework and missing deadline?

Get Urgent Help In Your Essays, Assignments, Homeworks, Dissertation, Thesis Or Coursework Writing

100% Plagiarism Free Writing - Free Turnitin Report - Professional And Experienced Writers - 24/7 Online Support

Malware Targeting IOS And Android Platform

Category: Computer Sciences Paper Type: Report Writing Reference: MLA Words: 1850

        Malware is software which is found harmful and can damage or disable the system or devices that can interact in the normal functioning of a system. It can’t damage devices physically, but it can encrypt or hack data. Android and iOS are operating systems used by mobile devices. Malware can target both systems. Apple and Google have taken precautions to avoid this malicious software, but still, it can be harmful to systems.  

        Android devices are almost 50% risky to be infected by malware than Apple devices. Different reasons are behind that malware attack on mostly google-created platform.

          Cyber-crime is commonly aiming the system at large scale. The major cause of it is, the increasing number of phones and tablets. The more likely devices increase, the more is a risk. Phenomena are, there is a big difference between iOS and Android at least not surely right. Apps are nearly the same offered by both. People have a choice between Android and iOS, and some selection is competitive between both due to the same approach. Both platforms borrow a lot of functions from each other. However, there is still some point where these two operating systems differ from each other, and this means the choice is still tough to make as there is still a difference between iOS and Android. Apple’s iOS has the different function of iTunes, which is only supported by iPhone iPod etc. (M.Sikorsk and Honig) .

            The number of devices increases rapidly threat factor also increased. The priority of business corporate should be to protect the system. The one reason is also that most transactions take place by mobile, which becomes a cause of risk. 

Security Measures of Malware Targeting IOS And Android Platform

            In case of Android phone, always use an updated version of Android Operating System as these are designed to protect from the latest security threats. While Apple’s iOS is required to install as soon as they released in the market. For security measures, both companies can introduce automatic updating version to overcome this problem.

        Often, users install different apps which could be infected by malware. Inform the user about the app, which is harmful to the device so a user should avoid to install it (M.Ligh, Adair and B.).

         Sometimes users connect network connection from the different platform where a wireless connection is being operated by corporate authority, which could be affected by a malicious virus.

            The business organization should apply “bring your own device” rule to the employees as users could properly defend their device with great care. If they use their devices, they will surely follow the instructions written in policies.

            Root devices could access Operating System without any restrictions, which means device allow to install any app, including malicious app. So this is better for Android and iOS to avoid introduced root-enabled devices.

With a strong set of password, there is less risk of hacking. Encrypt the devices to make it incredible.

        Device security policies should install security framework. If the security features do not comply with the device, it could not access the corporate network.

Apps should install from reliable resources such as Google Play and Apple Store as policies secure it. If an irrelevant source is used to, it may cause damage to data or device.

User installs cloud sharing to download data. Mostly user wants to access data from any device by using cloud sharing. Provide different alternatives for cloud sharing process.

Android devices should secure with anti-malware software, which helps to reduce the risk of malware infection. iOS and BlackBerry already have anti-malware software.

History of Malware of Malware Targeting IOS And Android Platform

            A glance at malware history shows that the malicious virus has been computing our date from years. The computer virus is attacking since almost 1949. In the early years, floppy disks were the cause of widespread malware. The very first file was viruses in the 1970s name “Creeper Worm”. Creeper accessed through ARPANET with a message “I’m the creeper, catch me if you can!”

However, the term “virus” wasn’t common till the 1980s then a program that infects or damage the program was termed as a virus. In the very beginning, there was a low rate of damage by malware, but with time, now almost one-third computer of the world is damaged by malware. The major cause of this is cybercrime, which is increasing day by day. In the last decade, malware spread rapidly due to the increasing number of internet and devices use (F.Tchakounté and Dayang) .

            Although malware-infected much of the devices in the last era, today, devices are at risk as hundred of the devices are a target of malware. The fight with malware is across the globe, and it could be never to end. Anti-virus industry keenly working to control this curse but it is impossible to remove it completely, but it could slow down its process.

            In early years, malware damage data through connection of corporate network but now a days it is being used by black hat hackers and government to get information about the people’s financial position, identification number bank’s credit cards etc. in modified form and with the widespread of malware, this malicious software is being used for the beneficial purpose.

            The way the people use the devices with different network, the malware is targeting the Android and iOS with new infection vectors. As malware is increasing, precautions are also adopted to overcome by both Android and iOS. Mostly malware interacts with devices through is internet email as you can connect with anyone online. To overcome this problem, install the new toolbar from an unknown source, open the malicious file and processed it with anti-malware security application. Don’t install the application when it is mentioned that it could be accessed or get your personal information.

            Malware attack is always to access your device by your permission. When you install file from an untrustworthy source, malware enters in your document or device and get ready to spoil it. So don’t use any vague or risky app on your device. Another way for malware is social links through device or mobile phones. A user connects mobile phones with their social sites and unknowingly clicks an irrelevant link which could allow the malicious malware to access the files in the user device. To avoid this, we should take an overview of the link before opening it because it is possible that by just opening the link, you could get infected. However, if you are not using an adequate source to banned the malicious infection, you are still on the risk.

Common Infection Vectors for Mobile Devices of Malware Targeting IOS And Android Platform

            Currently, people using networks all over the world; the number of malware infection is increasing. Mobile phones are using corporate networks, which is the main cause of being infected. These mobile phones can become a hurdle in the programming of software.

As many malware infection vectors are growing. Followings are the different vectors involve with mobile phones:

            Mobile phones are using different cloud to download data from the website, which can cause an invitation to the malware vectors. With the use of outdated software, such as old browsing or old Operating System, could enhance the risk of drive-by downloads.

While using a corporate network connection in mobile phones, often Ad stream lives, which could be malicious. Simply by viewing this ad can inject malicious malware in the phone.

The mobile phone is in a vicious circle by a new technique, known as mouse hovering. When hovers used by the user this may infect the device.

Scamware disguised as malware protection is a more advanced technology being used to protect mobile phones. This software works as a cleanup booster, but hackers were able to inject malware in the product, many users have faced that problem.

Organization concern with mobile phones of Malware Targeting IOS And Android Platform

            As with growing new technology, mobile phones used corporate networks, which is a tough task to handle for the IT department. The organization uses mobile device management (MDM) to secure devices within the enterprise to remove the insufficient corporate network. Manufacturers of mobile devices are attentively working on security measures for corporate networks. Strong password and security VPN is used to secure the connections, so the unauthorized network could not approach the device. In an organization, many businesses offer benefits connected with networks, which is more flexible and hurdle in security.

            Companies present the devices in the market with official trademark and anti-malware protection, which help to work smoothly with corporate networks. Data could be encrypted from SD card using corporate networks, so at very least precaution, use strong password and storage devices.

                Mostly organizations, networks based on Wi-Fi networks, which is offered by the malicious software. These networks demand confirmation through Google are social accounts which are not usually secured. Another problem is that users put the same passwords for different apps, which results in security problems. The precaution is not to use public networks, which requires your personal information to obtain access.

                Another issue is the use of communication channels, such as text writing for mobile phones. Any hacker can access data through sending a message and after getting a reply via a specific application. The mobile number helps the hacker top get data just after a callback. So it is better to confirm the number before making a callback.

                Hackers are well aware of the use of Google account and iCloud to control mobile device play store. One can access data with iCloud account through backup along with all apps, messages, contacts and call logs, etc. Anyone who can hack data one time, he could permanently track the device and can control some key functions. This problem can overcome by using complex and strong passwords for iCloud and Google accounts.

                Organizations enforce different policies to avoid the malware vector. There is a platform at which organization has great concern with the corporate connections so that that big issues could overcome such as:

Make sure that the device used in an organization should buy it from the manufacturer, not from the first user.

Use complex and strong passwords.

Never connect any corporate network like public Wi-Fi.

Don’t use the apps which are not supported by an authentic source.

 References of Malware Targeting IOS And Android Platform

F.Tchakounté and P. Dayang. "System calls analysis of malwares on android." International Journal of Science and Technology 2.9 (2013): 669-674.

M.Ligh, et al. " Wiley Publishing." Malware analyst's cookbook and DVD: tools and techniques for fighting malicious code. (2010).

M.Sikorsk and A Honig. " no starch press." Practical malware analysis: the hands-on guide to dissecting malicious software (2012).

Our Top Online Essay Writers.

Discuss your homework for free! Start chat

Top Class Engineers

ONLINE

Top Class Engineers

1218 Orders Completed

Quality Assignments

ONLINE

Quality Assignments

0 Orders Completed

Coursework Assignment Help

ONLINE

Coursework Assignment Help

63 Orders Completed