Value of Smartphone Security Proposal

Exclusively available on Available only on IvyPanda® Written by Human No AI

The rapidly spreading enhanced technology, the use of Smartphone becomes inevitable. They are reliable considering the privacy of information as they contain standard security. The security standards include the use keystroke dynamics, monitoring the time of key holding, the flight time, multiplayer access regulations, priority regarding the application accessibility.

All phone security related phones get resolved through these standards. This project focuses on creating a device administrator’s phone application to be installed on the Smartphone. The entire test conducted on volunteers possessing an Android Smartphone. The dynamic application quantifies and analyzes the keystroke of a user and differentiates between a genuine or not genuine user regardless of a correct password.

It is a way of ensuring authentication through a static or continuous approach. Users of these Smartphone will not know about the technology unless informed hence enhancing the utilization of the multiplayer access technology. The access technology enables a device owner to put different priorities to the device accessibility.

Different users need privacy differently, making this project relevant. In many occasions, the access control technology is essential. They include company security protocols, sharing of cell phones, parental control over the use of cell phones etc. However, this access authentication does not prevent the popular privacy attacks like dictionary attack but the new keystroke dynamic application does.

Therefore, the combination of the two, results into a strong and stable device access authentication. The user of the Smartphone with the dynamic application will enjoy privileges of assigning unique access to their phones. For instance, the application monitors privacy from the password level, username and mode of password entry by user. Actually, the combination resolves the issues of security gaps and the technological drawbacks.

The project is basing its arguments on various studies that concentrated on the effectiveness resulting from the separate application of the two and not their combination. Most of these studies focused on the single-layer authentication without the ability to alert the genuine device owner in case of any security sabotage e.g. the Personal Identification Number (PIN).

Another related technology id the DiffUser where users have full device access, access main function and but cannot install or uninstall any software. The combination idea of the project will allow users to have full access and control of their device privacy in the best personal way possible. Other studies have influenced the project by showing the possibility that a device owner can assign settings for a borrower.

Based on the combination, the project focuses on creating a security system that is applicable to any Smartphone device with an Android operating system. Therefore, the project will provide a solution to the existing technology challenge of combining the two authentication technologies.

Primarily, the results of the project will consist of a password authentication using keystroke dynamics followed by access depending on that. Another an influential factor in this project, is the fact that the Android operating system originally contains security factors like security models & designs, codes, fixation of all bugs or backdoors and a reliable 24-hour support team that respond to any concerns.

In addition, this operating system consists of a robust design where user data and system resources are separate. It also contains an application mandatory sandbox and security inter-process communication, making it efficient for the project two technologies technique.

The advantages provided by the Android operating system play a crucial role in the success of this project. These advantages undergo transformation to create enhanced Smartphone security based on the accessibility of the phone by the user. The project incorporates privileges of character features for the security gaps and a double Authentification system. The different security levels include limited user level and administration level.

Administration level allows users’ full device access, utilization, camera usage, GPS, software installation or uninstallation options etc. Administrators have full control of the security system for example, in companies where employees can try to interfere with the database.

Parents are also an excellent example, mostly those who tend to monitor their children social interactions closely. The limited level depends on the administrators pre-authorization. The Administrator controls it. The users at this level can only change lower access privileges. They include children and employees.

This project will use the Eclipse Integrated Development Environment created in the Java Programming language and the Extensible Markup language. The Eclipse is suitable for this project because it is compatible with the operating system and is an open source. The new software resulting from this project will undergo testing through the installation into any Android-based device.

The application will prompt the user to enter the Administration username & password then re-enter for confirmation. After this, an option of continued usage or creation of a limited user appears. In the case of creating a limited user level, the Administrator will set the privileges for the limited user.

The handling of android smart phone is quite different from the rest; upon installation of new programs, creation of user window is crucial for administration purposes. The super user interface contains user log in information and can change at users will. Application choice appears on the super user interface where the user can select the application that will be suitable.

SQLITE database remains to be the main storage location. Background service counterchecks running applications, and when the user is a limited user, it blocks applications. When the super user logs in, the background service shuts down.

The demonstration of android smart phone appears relatively easy to many. Upon turning on the phone Android Smartphone, the application will automatically run, each time the phone starts or unlocked. The duration it takes for the splash screen to appear is three seconds. The application checks for first time users, the creation of the display window normally determined by the user status.

The windows vary from first time user, super user to limited user. If the application ran earlier, a log in window screen will appear. If it is for the first time, account creation window will appear with user name, password, and confirm password fields filling by the user. The log information then stored in memory that is SQLITE application database. Super users have full access to the phone and can modify, delete and create other users.

After the creation of super user account, options for creation of new accounts appear. The window appearing consists of three options: create a new user, modify user access, and continue.

Create a new user option allows the user to create limited accounts; the limited users will have limited access to applications in the phone. Modify option allows the super user to modify the limited user accounts and limit or add applications that can be accessed by the user. Continue option allows the user to proceed without making any changes.

Android Smartphone evaluation experiment bases on volunteers. Ten volunteers must be well conversant with the use of the Smartphone’s provided to them these are Motorola Razr and Samsung Galaxy S3. The evaluation will determine the security of the phones through examination of user log in information.

Dwell time is the time they key presses on board. While flight time that is the time between pressing two buttons on the keyboard. The volunteers must check for random applications both for limited and super user to see if the applications will work or not.

The testing of the smart phones carried out through the installation of application to Motorola Razr and Samsung Galaxy S3. The creation of Super user account and two users created with different applications that they could access. The name and password stored in the memory database given to each user. After a thorough analysis, the users could not access blocked applications.

The background service was at its best through the checking or running applications, when the application blocks, the user cannot access it. The other users with the application allowed to them could access the application without problem, hence confirming the hypothesis that the android multiuser is functional.

The super user could delete or modify other user accounts. The testing mainly carried out in two phases: the first phase tested the keystroke dynamics authentication; the test carried out through asking the volunteers to key in name and passwords. The second phase encompassed testing of the multilayer access authentication.

This involved the creation of limited users’ accounts and an application blacklist to the user. The success rate of the second phase was 100 percent, in that the users were able to access applications that were accessible to them and not those in the block list.

The future of android Smartphone seems bright. Improvement of the project through constant modification and improving the security level of the users are key features in development of the android phones.

The processor speed, internal phone memory and the display characteristics of the android Smartphone are key areas to improve. Application monitoring trough minute-to-minute and second to second can be the key areas that development of the application can progress in the right direction. Notification details and tones improvement will occur through modification of the present applications.

In summary, the increased demand and use of Smartphone in the world requires changes in terms of security and application services. The authentication of security details could prove to be the future of the phones as normal security is not strong enough with the technologies improving.

The authentication technologies coupled with multilayer access control is the key authentication processes. The processes can monitor key strokes and detection of short passwords. Technological improvement geared towards increasing phone privacy are tested and implemented.

The advantage that android operating system has over the others is that it is an open source. This means an application or software written in java in the Google store easily downloaded and used with no expertise needed.

The installer directs the program in a manner that the user waits for installation to complete without doing anything. The program can then run on the background when the smart phone turns on. The password technology mostly improved to give a more secure phone and application use.

More related papers Related Essay Examples
Cite This paper
You're welcome to use this sample in your assignment. Be sure to cite it correctly

Reference

IvyPanda. (2019, June 17). Value of Smartphone Security. https://ivypanda.com/essays/smartphone-security/

Work Cited

"Value of Smartphone Security." IvyPanda, 17 June 2019, ivypanda.com/essays/smartphone-security/.

References

IvyPanda. (2019) 'Value of Smartphone Security'. 17 June.

References

IvyPanda. 2019. "Value of Smartphone Security." June 17, 2019. https://ivypanda.com/essays/smartphone-security/.

1. IvyPanda. "Value of Smartphone Security." June 17, 2019. https://ivypanda.com/essays/smartphone-security/.


Bibliography


IvyPanda. "Value of Smartphone Security." June 17, 2019. https://ivypanda.com/essays/smartphone-security/.

If, for any reason, you believe that this content should not be published on our website, please request its removal.
Updated:
This academic paper example has been carefully picked, checked and refined by our editorial team.
No AI was involved: only quilified experts contributed.
You are free to use it for the following purposes:
  • To find inspiration for your paper and overcome writer’s block
  • As a source of information (ensure proper referencing)
  • As a template for you assignment
1 / 1