Question

In: Computer Science

Mobile App security – Explore app permissions, how are they being used, where data being transmitted....

Mobile App security – Explore app permissions, how are they being used, where data being transmitted.

Hi, thesis my topic for the project.Iam in need of help in figuring out how to start my research and also have some questions regarding the topic

1. name 10 apps for which I can use to explore its app permissions and data gathering?.

2.Are there any software or app that can be installed to collect the information regarding the app permissions?

3.I need an introduction for about a 5 lines.

Please I need help with this, give brief explanation for all these questions .

Solutions

Expert Solution

1. for exploring data gathering and permission, you can always use any apps. you can use youtube, google, whatsapp, facebook, snapchat, twitter, mx player, flipkart, amazon, linkedin etc. all apps gather data somehow, and based on the permission given to them they operate on the data.

2. Yes, there are so many applications available which you can use. but you can also use settings app which comes in every android phone, and by navigating to the application and permission settings, you can find which apps is using what permissions. You can use PermissionChecker API and also use aSpotCat app for the same which will show you what permission is used by which apps. You can create your own app also with root priviledge to determine this.

3. You can start your introduction of thesis like as follows:

Android is one of the most popular operating system for hand held devices. Now a days, almost all users of all range uses android smart phone to make their daily life smooth. While android provides so many features to make life easier, at the same time it puts so many danger to users. In short, Mobile App security is a study about how application is using your devices and it's data. As we know, that android app uses concepts of permissions which user can allow and deny based on choice. some apps also requires all permission without which it can not function. Based on this scenario and how people can enable or disable app permission, we can create a comparative scenario called Mobile App Security by using the permission matrix. And based on the study we can say that permission is the most powerful tool to make your device safe or unsafe.

Hope this helps.


Related Solutions

If the analyst does not have the security permissions to access the data directly, then a...
If the analyst does not have the security permissions to access the data directly, then a data request form is required. There are a number of fields that the analyst is required to complete. What fields are necessary in a data request form? Who needs to be included in the routing of this form? Explain the form and the approval process you would recommend. Adapted from Richardson, V. J., Teeter, R., & Terrell, K. (n.d.). Data analytics for accounting. Problems...
Mobile and wireless devices are being increasingly used in the health care industry. Describe three mobile...
Mobile and wireless devices are being increasingly used in the health care industry. Describe three mobile applications that could be used by medical personnel to increase their productivity.
In a multiuser wireless network the data frames are being transmitted when the probability of collision...
In a multiuser wireless network the data frames are being transmitted when the probability of collision during the transmission is 0.75. The transmitters try to send the collision-free frames using up to 4 independent trials (transmission) as needed. The transmitters indefinitely discard the data frames after 4 failures. Calculate the probability that a data frame can be successfully transmitted (not be discarded). Let ? denote the random number of trails until the frame is transmitted without collision, find ?(? ≤...
nalyze how mobile technology is being leveraged in politics.
nalyze how mobile technology is being leveraged in politics.
What controls must be used to protect data that is transmitted across wireless networks?
What controls must be used to protect data that is transmitted across wireless networks?
Describe, in detail, how neurons communicate. Start with a strong EPSP being transmitted, and end with...
Describe, in detail, how neurons communicate. Start with a strong EPSP being transmitted, and end with the next cell receiving an EPSP.  
What are the qualitative and quantitative data are being collected to mobile based remote patient monitoring...
What are the qualitative and quantitative data are being collected to mobile based remote patient monitoring for chronic disease management? And why those data are collected?
Mobile and wireless devices are being increasingly used in the health care industry. Write a two-page...
Mobile and wireless devices are being increasingly used in the health care industry. Write a two-page paper that outlines five applications of these devices in this industry. Also, identify three mobile apps that could be used by medical personnel to increase their productivity.
Explain how Big Data and the Internet of Things are being used in healthcare right now,...
Explain how Big Data and the Internet of Things are being used in healthcare right now, and what the implications for the future might be.
Description of Data The data being used for this lab are based on data collected after...
Description of Data The data being used for this lab are based on data collected after the 2009 war ended that was between Israel and the Hamas militias in the Gaza Strip. Responses were obtained from 200 individuals that were exposed to rocket attacks during that period. The variables in the study include: ID: Used to indicate the ID# of the participant family income: The household income of the individuals (expressed in thousands) gender: The gender of the individuals that...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT