Smartphone Security and Protection Practices
Smartphone Security and Protection Practices
Today, every smartphone operates based on its operating (+14 million), followed by Indonesia (+9 million) and the
system. Android, iOS, Tizen, KaiOS are the main of this type Philippines (+8 million).
[3]. This smartphone Operating System (OS) allows added
software to run on the phone to which provides varied
functionalities to the users. It enhances the user knowledge, but
security and privacy are the main concern to worry by allowing
3rd party apps on users’ devices. As a result, smartphone OS
developers don’t want to allow 3rd party apps to access root
level and susceptible information. Being a flexible smartphone
OS at the beginning, Google’s Android is also following the
warning access method. Accessing system-level information,
system logs, and other susceptible information is now being
restricted continuously. In our studies, we have found that the
development of many machines’ optimization and security-
related apps had stopped due to permission decline. [1, 2, 3]
There are a few studies that work on Android’s security
problem in the app development and adjustment phase. Jha et
al. [8] studied 13,483 real-world Android applications and
found only 2,373 apps with no configuration errors; this is a
development phase scenario. These security problems become
more severe when studies establish that security and privacy
are not the main tasks of the developers [3]. Security and
privacy are common responsibilities of both the app service Fig.2. Global mobile subscriptions and subscribers (in billions) [10]
providers and the end-users. Usage-pattern and misuse: both
The figure for mobile broadband subscriptions raised 10
intentionally and unintentionally may raise the probability of
percent year-on-year, growing by 120 million in Q3 2019. The
security threats to the end-users. Google’s Android help and
total is at the present 6.2 billion or 77 percent of mobile
support center provide some simple guidelines for the Android
subscriptions. Figure 3 for 4G (LTE) subscriptions amplified
device users for helping the device and information safe and
by 190 million for the period of the quarter to reach a total of
secure [9, 1, 3, 22]
4.2 billion, or 52 percent of all mobile subscriptions. 3G
According to researchers and agencies, mobile computing (WCDMA/HSPA) subscriptions were rejected by 50 million
is a phenomenon worth observing since our habits as and 2G (GSM/EDGE-only) subscriptions were rejected by 70
consumers, a few of which are listed in the following and are million. Other technologies to reject by around 10 million
radically changing [7, 10, 11, 12]: [4,10].
• Over 73%, depending on any age group, of all emails are
opened on mobile devices.
• Already in 2017, around 95% of Facebook users accessed
the social network via mobile devices.
• 80% of users used a mobile device to search the internet in
2019.
• 40% of online transactions are done using mobile devices.
• More than 50% of websites now use responsive web
design technologies that work for all devices.
• More than 75% of shoppers use mobile devices along with
physical shopping.
• Global mobile data traffic is more than 30 exabytes per
month.
Fig.3. Mobile subscription by Technology (in billions) [4, 10]
The figure for mobile subscriptions shown in Figure 2 rises
at 3 percent year on year and currently totals around 8 billion.
High subscription growth continues from previous quarters in
China, which had the most net additions during the quarter
III. SMARTPHONE PROTECTION SECURITY PRACTICES If the bootlaoder is open don’t used the phone. As its EMI
Security is being widely discussed in the field of Number might be change or phone might be stolen. In order to
application development with improving quality for end-to-end check bootlaoder restart the phone and check any sign of
consumer satisfaction at different levels. On the contrary, at warning, in starting stage.
some stages the security requirements typically force barriers to
users (such as passwords or other authentication mechanisms), B. Root Checker
while designers and developer’s effort to minimize their impact It is a method of unlocking an Android device in regulates
on both application performance and user experience [7]. to grant the user privileged control, or root access. It’s a lot like
Figure 6 has depicted the best practice model for smartphone having administrator privileges on a Windows or Linux-based
security and threat protection. OS.
C. Accessibility G. Anti-Malware
In Accessibility which we can find in sitting of our mobile, Malware attacks have been rising quickly from last 10
every think should be off. We can’t give permission to any app, years; these attacks targeted all technology device as well as
which uses our Audio or Video without our permission. mobile phones. Due to the behavior of the mobile usage and
the responsive data they might contain, safeguards against
o Go to Sitting → Top Search Accessibility → ones it is malwares, Anti-Malware or Anti-Virus must be installed in our
open, check in that every think should be off. mobile phone, and it should be updated. [16, 21]
D. Device Admin or Device Manager
H. Update Operating System
The steps.
Update mobile operating systems and on-board applications
o Select "Security" from the Settings Menu-Scroll down with safety patches: keeping the operating system (Android and
and tap "Device administrators" Ensure that iOS) and the installed applications up to date is a must. Both
"Android Device Manager" is checked. Google and Apple provide regular updates to users, which
Except find my device, any other app is there, that should resolve recent vulnerabilities or other threats, as well as sharing
be delete it. additional performance and security features [17].
In addition to above point
E. Apps Manager List o Back up your data regularly.
As soon as you have an Android phone, we can’t wait to o Disable Bluetooth and Wi-Fi when not needed.
install your favorite apps on it. The apps can be regarding
games, media player, bookstore, social, business. The Android IV. CONCLUSION
App Manager is an Android Management tool which helps to
Security is forever is type of an arms race connecting
administer all apps installed on your Android phone. It can
attackers and defenders. Since the mobile application market is
illustrate you the information about an app, rapidly search any
rising, at the same time, mobile security will carry on bringing
app installed, and offer a detail to tell you the frequently used
an excess of issues to countenance. In other words, security is
apps and unused apps and more.
often a substance of opposite risk and reward, as discussed
Check of unused apps as well trusted apps names which during the World Economic Forum of 2019. The participants
you haven’t used for lengthy time, select that apps and click to came to the wrapping up that the past ten years score only the
uninstall them. [15] start of the worldwide cybersecurity trip. New architectures and
collaboration are still required as we need to stand to face risk
F. Permission Manager at the brink of a new era of cybercrime, which will be
Android apps will request for permission when you empowered by new and developing technology. These four
download some apps. In Permission Manager check how technologies, namely, 5G networks, infrastructure
numerous Apps using your Camera, Contract, Photos, convergence, artificial intelligence, and biometrics, are going to
Locations, Microphone etc. The figure 7 of particular Mobile change the next ten years of global cyber and smart devices
has shown below, deny permission which you don’t want it. security.
Whenever you are using give permission otherwise don’t give.
If you don’t have permission manager in your phone, download REFERENCE
it form Play Store. [1] Ratul Sikder , Md Shohel Khan , Md Shohrab Hossain , Wazir Zada
Khan,” A survey on android security: development and deployment
hindrance and best practices”, TELKOMNIKA Telecommunication,
Computing, Electronics and Control, Vol. 18, ISSN: 1693-6930,
February 2020.
[2] uSwitch Mobiles, ”History of mobile phones,” Available:
http://bit.ly/2SfFmwu, Accessed: 11 March 2019, April 2018.
[3] ShoutMeLoud, ”Top 10 mobile phones operating systems,” [Online],
Available: http://bit.ly/2Y2KREh, , November 2017
[4] Statista, Smartphones—Statistics & Facts, Statista, Hamburg, Germany,
2020, https://www.statista.com/topics/840/ smartphone
[5] B. Guo, Y. Ouyang, T. Guo, L. Cao, and Z. Yu, “Enhancing mobile app
user understanding and marketing with heterogeneous crowdsourced
data: a review,” IEEE Access, vol. 7, pp. 68557–68571, 2019.
[6] S. Mavoungou, G. Kaddoum, M. Taha, and G. Matar, “Survey on threats
and attacks on mobile networks,” IEEE Access, vol. 4, pp. 4543–4572,
2016.
[7] Paweł Weichbroth & Łukasz Łysik, “Mobile Security: Threats and Best
Practices “,
Fig.7 App permissions
© 2021 by the author(s); licensee Empirical Research Press Ltd. United Kingdom. This is an open access article
distributed under the terms and conditions of the Creative Commons by Attribution (CC-BY) license.
(http://creativecommons.org/licenses/by/4.0/).