• Tidak ada hasil yang ditemukan

mobile security

N/A
N/A
Protected

Academic year: 2024

Membagikan "mobile security"

Copied!
7
0
0

Teks penuh

(1)

FACULTY OF EGINEERING & TECHNOLOGY

LECTURE -26

Umesh Kumar Gera Assistant Professor

Computer Science & Engineering

MOBILE SECURITY

(2)

Signs of malware

Protecting against malware

MCQ

References

(3)

Signs of malware

Here are signs you have malware on your phone:

 You're seeing ads constantly, regardless of which app you're using

 You install an app, and then the icon immediately disappears

 Your battery is draining much faster than usual

 You see apps you don't recognize on your phone

 These are all worrying signs that mean you should investigate further.

PROTECTING AGAINST MALWARE

(4)

Protecting against malware

While mobile malware can deliver a serious payload, there are a number of things you can do to protect your device from infection.

Keep applications updated:

By running the newest version of every application on your mobile phone, you can ensure that you are running the version with the latest security patches and updates. Application developers will often release a new update or version if their software is compromised in any way.

Install mobile security software:

Just like antivirus software protects a computer from viruses and malware, a mobile security application will do the same thing.

Consider a firewall:

The majority of mobile phones do not include any type of firewall protection. Firewalls not only protect your online privacy when browsing, but can be used to only allow authorized apps to access the internet through a set of firewall rules.

(5)

Protecting against malware

Use screen lock protection:

Many mobile devices are compromised when they are lost and stolen. Ensure at the very least that a passcode is used to lock the screen. Even better, use facial recognition or fingerprint recognition technology.

Only download apps from official stores:

All vets available on the Apple App Store and Google Play have been vetted to ensure they are safe. That doesn't mean that no app will slip through the net, but you have a much better chance of installing a legitimate app through office sources.

Read and understand app permissions

Finally… Use common sense

PROTECTING AGAINST MALWARE

(6)

Q 1 - How to get a response from an activity in Android?

A - startActivityToResult() B - startActiivtyForResult() C - Bundle()

D - None of the above

Q 2 -How to move services to foreground in android?

A - Services always work in Foreground only B - No,We can't do this query

C - Using startService(Intent intent)

D - startFordgroud(int id, Notification notification).

Show Answer

Q 3 -What are the functionalities of Binder services in android?

A - Binder is responsible to manage the thread while using aidl in android

B - Binder is responsible for marshalling and un-marshalling of the data

C - A & B

D - Binder is a kind of interface E - None of the above

Q 4 - What is the use of content provider in android?

A - To send the data from an application to another application

B - To store the data in a database

C - To share the data between applications D - None of the above.

Q 5 -What is the 9 patch tool in android?

A - Using with tool, we can redraw images in 9 sections.

B - image extension tool C - image editable tool D - Device features

(7)

REFERENCES

https://www.forcepoint.com/cyber-edu/mobile-malware

https://www.kaspersky.com/resource-center/definitions/what-is-ransomware

Geeksforgeeks.com

https://www.cnet.com/how-to/nasty-malware-could-be-hiding-on-your-android-heres-how-to-spot-it/

Referensi

Dokumen terkait

Comparatively cheaper than other security systems: Instead of paying a highly trained technician to install a complex CCTV system, and pay him on an ongoing maintenance arrangement-

Pengujian sistem akan dilakukan dengan pengujian fungsionalitas sistem serta pengujian validasi, guna untuk memastikan sistem pengujian keamanan OWASP Mobile

It is important to consider the category "security" also in a separate context considering the important component of the security in the structure of the

Installing just a module file The software package is in the case above a directory decaywith three files Terminal Terminal> ls decay README decay.py setup.py To install

It is vital that cyber security organizations such as Computer Emergency Response Team CERT develop a malware mitigation framework to protect the Critical National Information

Improving the security of mobile IPV6 signalling using KECCAK / SHA-3 ABSTRACT Most people nowadays use their mobile devices to stay connected to the internet all over the place and

J Investigation Features: Reports include a basic analysis of the malware or attacks found Provide details of the steps that must be taken to improve service security Provide

Overview Overview • Internal and external infrastructure integrity • Supply security is not just a matter of storage • External supply diversity through different supply sources