Cover Image
市場調查報告書

鞏固Android:建立行動裝置核心安全

"Hardening" Android: Building Security into the Core of Mobile Devices

出版商 Frost & Sullivan 商品編碼 301575
出版日期 內容資訊 英文 28 Pages
商品交期: 最快1-2個工作天內
價格
Back to Top
鞏固Android:建立行動裝置核心安全 "Hardening" Android: Building Security into the Core of Mobile Devices
出版日期: 2014年05月08日 內容資訊: 英文 28 Pages
簡介

行動裝置的使用案例,帶來與傳統的PC不同的風險。由網際網路為基礎的應用程式商店,提供行動惡意程式(特別是針對Android的惡意程式)固有的行動途徑。

本報告以美國的電腦緊急應變團隊(US-CERT)的調查結果為基礎,提供行動安全和行動的威脅、應用程式商店固有的作用、Android的漏洞、良好的行動安全對策、硬體設備技術的有效利用相關驗證,也包含主要企業簡介,為您概述為以下內容。

簡介

行動安全概要

  • 所謂行動界的威脅
  • Android vs. iOS

Android的應用程式商店

  • 由路由和OS的設定,存取替代市場
  • 第三方的應用程式商店
  • 行動的威脅是非不明

針對Android的良好安全對策的實例

活用硬體設備技術,提高Android的安全

革新主動的企業

  • ARM TrustZone
  • Qualcomm
  • Samsung
  • Intel
  • Boeing
  • Blackphone

彙整

圖表

目錄
Product Code: D565-00-06-00-00

The use cases of mobile devices result in different risk than traditional PCs. The availability of Internet-based application stores provides uniquely mobile conduits for mobile malware, with Android malware being the favored mobile attack vector. Research by the United States Computer Emergency Readiness Team (US-CERT) confirms that the majority of known mobile threats target Android devices.

In this market insight, we will:

  • Provide an overview of mobile security and mobile threats
  • Discuss the unique role of the application stores and what makes Android especially vulnerable
  • Review good mobile security hygiene
  • Discuss how hardware technology can be leveraged to improve Android security
  • Elaborate on how some companies are leading innovation by using hardware technology to improve Android security

Table of Contents

Introduction

Overview of Mobile Security

  • What is a Threat in the Mobile World?
  • Contrasting Android and iOS

Android Application Stores

  • Rooting and OS Settings to Access Alternative Market
  • Third Party App Stores
  • When Mobile Threats Are Not Black and White

Good Security Hygiene Practices for Android

Leveraging Hardware Technology to Improve Android Security

  • The Foundation of Security-A Root of Trust
    • Mobile Challenges with Roots of Trust
    • Roots of Trust in Android

Companies Leading Innovation

  • ARM TrustZone
  • Qualcomm
    • SecureMSM
    • StudioAccess Technology
    • Enterprise and BYOD security
  • Samsung
    • Device & Data Security
    • Container Usability
    • Easy Enrollment
    • Cloud-based Mobile Device Control
    • Centrify for Samsung KNOX
  • Intel
    • Intel Identity Protection Technology (IPT)
    • Intel Device Protection Technology (DPT) for Android
  • Boeing
  • Blackphone

The Last Word

List of Figures

  • Figure 1: F-Secure Labs Mobile Threat Classifications
  • Figure 2: Mobile Vulnerabilities by Year (2011-2013)
  • Figure 3: Risk Posture of the Google Play Store
  • Figure 4: Analysis of the Malware Content of Android App Store
  • Figure 5: Mobile Malware Types Common to Sideloading Practices
  • Figure 6: Example Request for Android Application Permissions
  • Figure 7: Changing Face of Mobile Threat Vectors; Malvertising Overtakes Porn
  • Figure 8: ARM TrustZone Environments
  • Figure 9: Attributes and Benefits of TrustZone
  • Figure 10: Intel IPT Example
  • Figure 11: Intel Device Protection Technology Features and Benefits
  • Figure 12: Intel DPT Secure Containerization
  • Figure 13: The Boeing Black Smartphone
Back to Top