|By Business Wire||
|May 15, 2014 02:20 PM EDT||
Research and Markets (http://www.researchandmarkets.com/research/jx2vls/hardening) has announced the addition of the ""Hardening" Android: Building Security into the Core of Mobile" report to their offering.
The use cases of mobile devices result in different risk than traditional PCs. The availability of Internet-based application stores provides uniquely mobile conduits for mobile malware, with Android malware being the favored mobile attack vector. Research by the United States Computer Emergency Readiness Team (US-CERT) confirms that the majority of known mobile threats target Android devices.
Overview of Mobile Security
Mobile security cannot be viewed through the same lens or paradigm as personal computer (PC) security. The PC market began as general purpose computing platforms. Due to the evolution of the PC market, the operating system (OS) and the ecosystem of applications that run on the OS are independent. The PC application ecosystem is fundamentally open, designed that way from the start. Historically, a PC user would obtain applications from a number of sources, and install those applications, as long as the user had the proper permissions.
Mobile, due to its evolution from tightly controlled platform, is different. For mobile devices, which are defined here as smartphones and tablets, applications are generally provisioned from an application store such as Google Play or Apple iTunes. The mobile device, the mobile device OS, and the mobile device application store are tightly coupled. As a result, mobile device security cannot be discussed without discussing the application store(s) that provision applications to the device.
What is a Threat in the Mobile World?
Malicious or compromised applications are the most significant attack vector for mobile devices, making application and application store management especially germane to mobile security. In its 3Q 2013 Mobile Threat Report, F-Secure Labs classifies mobile threats into two categories based on their potential for damaging the user's device or data: Malware' and Potentially Unwanted Application' (PUA). See Figure 1 below. A key takeaway from the F-Secure Lab mobile threat classification is that mobile threats are application centric.
Key Topics Covered:
- Overview of Mobile Security
- What is a Threat in the Mobile World?
- Contrasting Android and iOS
- Android Application Stores
- Rooting and OS Settings to Access Alternative Market
- Third Party App Stores
- When Mobile Threats Are Not Black and White
- Good Security Hygiene Practices for Android .
- Leveraging Hardware Technology to Improve Android Security
- The Foundation of SecurityA Root of Trust
- Mobile Challenges with Roots of Trust
- Roots of Trust in Android
- Companies Leading Innovation
- ARM TrustZone
- StudioAccess Technology
- Enterprise and BYOD security
- Device & Data Security
- Container Usability
- Easy Enrollment
- Cloud-based Mobile Device Control
- Centrify for Samsung KNOX
- Intel Identity Protection Technology (IPT)
- Intel Device Protection Technology (DPT) for Android
- The Last Word
For more information visit http://www.researchandmarkets.com/research/jx2vls/hardening