This essay has been submitted by a student. This is not an example of the work written by professional essay writers.
Uncategorized

Developers and technologies

This essay is written by:

Louis PHD Verified writer

Finished papers: 5822

4.75

Proficient in:

Psychology, English, Economics, Sociology, Management, and Nursing

You can get writing help to write an essay on these topics
100% plagiarism-free

Hire This Writer

Developers and technologies

It is evident that from the model All developers and technologies should take into consideration the key features that will design the devices. The model has fully illustrated that though trust boundary is still there, an external attacker can impersonate the session and get access to an android device. Spoofing and denial of service are very evident from the design.

On the screenshot 2 above though we have a trust boundary and an attacker was able to exploit vulnerable points and attack assets and repudiate that he/she hasn’t received any data.it is advisable to mitigate the issue through checking of logs, auditing to record source and summarize.

 

Figure 3 above shows 2 possible threats i.e. spoofing and denial service-the attacker may decide to spoof the network device, in this case, the router in the network making data be written to the device rather the network device. Either in the model possible denial of service may take place hence making the device not receive data from the network device. Ideally, according to the model, the assembler of the mobile devices should access all vulnerability and ensure integrity,

Confidentiality and availability of data that result from a denial of services, tampering, and spoofing respectively.

More fundamentally the model advises on the following threats that need to addressed by the manufacturing companies technologies;

Repudiation-The companies technologies should consider timely audits of the system

Spoofing-Easily has done over the network and wireless design should be well taken care of; IEE

Standards should well suit i.e. 802.11n wireless fidelity of the phone.

Weak access control of resource-Improper data protection of Network devices can allow an attacker to read information not intended for disclosure. Review authorization settings.

Manufacturing technologies of android security should aware of malware in computing devices in the network. From the model, the attacker may execute malicious code silently hence causing an attack. Remote code execution leads to denial of service attacks. Achieved through execution of Bluetooth daemon, if discoverable devices mac address is known.

  Remember! This is just a sample.

Save time and get your custom paper from our expert writers

 Get started in just 3 minutes
 Sit back relax and leave the writing to us
 Sources and citations are provided
 100% Plagiarism free
error: Content is protected !!
×
Hi, my name is Jenn 👋

In case you can’t find a sample example, our professional writers are ready to help you with writing your own paper. All you need to do is fill out a short form and submit an order

Check Out the Form
Need Help?
Dont be shy to ask