Topic > Android OS Review

Android OS is extremely secure and it is really difficult for attackers to get into other people's phones and corrupt them without the user giving them permission, but this was not always the case . Since the Linux kernel can be accessed directly, this means that developers must use advanced software and hardware to ensure that the integrity of applications, data, and networks are kept confidential. Say no to plagiarism. Get a tailor-made essay on "Why Violent Video Games Shouldn't Be Banned"? Get an original essay The main security feature that Android incorporates to protect your phone or tablet is the Google Play app from which users download most of their applications. Google Play now has a license checker and Google Play Protect that scans apps when you download them from the app store. Android also has an app and website to locate if a device is stolen/lost. It also has a feature that, when downloading from a website, for example, and the device is unable to verify the application's certificate, a popup appears that users must uncheck to allow installation from an unknown source . Additionally, the device, if enabled, can be subjected to periodic scans that will notify the user of potentially harmful apps. This is shown in the diagram. The basic Android security features presented are a pin, password, and pattern, or in some newer devices, they can be unlocked via the user's face. One service that Android phones offer is device encryption. This involves scanning the data on the device and only when the device is presented with the correct key can the data be accessed, such as a password or pin. If a user does not enter the correct step after a certain number of attempts, users are sometimes able to set a clear everything option. Android uses dm-crypt to encrypt data. This encrypts data up to the root file system, therefore working at the kernel level and has a 128-bit algorithm. Allows you to encrypt the entire disk. However, once the encryption key is set, you cannot change it without performing a hard reset of your device and losing all your data. Newer versions of Android have built-in fast encryption, which means you are prompted to enter the key at startup, this results in a slightly long time to boot the device. At the application level, Android introduced sandbox security and authorization. Sandbox is an old concept and originated from the UNIX operating system which separated file permissions from processes. This means that once the application is up and running, unless permission is granted by the user, the application remains within its parameters and runs on a virtual machine. This ensures that one app does not have access to another app. It works like a sand toy, meaning once the sand is in the toy, unless the child allows the sand to come out, the sand will never leave the walls of the sandbox. This is seen when users first download their app from the Play Store or, once downloaded, they go to the application settings and can change it from there. For example, simple applications such as a photo editing application should not access your phone but, however, it may need to access your storage such as photos or videos, it may also ask for permission to access your camera. With Android there is no specific way an app must strengthen its own”.