Description
Students should be divided into groups prior to the residency session. Each group will submit a research paper and a presentation through iLearn (using SafeAssign). These should be submitted before students depart from the residency session.
Papers are typically 10 pages of original content (not included title page, TOC page, and the references page) and presentation times vary on class (typically 10 - 15 minutes). Each group member should participate in both portions of the assignment. I expect an additional 2-3 pages for figures, tables, and references. Thus, total is 12-13 pages APA format.
Be sure to review with students that APA format is REQUIRED.
Research Topics:
- The localization of a malicious software in Mobil Application.
Example of Abstract,
Abstract
Examined are the three core themes: the role of education in cybersecurity, the role of technology in cybersecurity, and the role of policy in cybersecurity. These topics are essential for organizations seeking to establish environments that allow them to be successful irregardless of location while examining external and internal conditions. This study examined the research gaps within cybersecurity as it relates to core themes to develop stronger policies, education programs, and hardened technologies for cybersecurity use. This work illustrates how cybersecurity can be broken into these three core areas and used together to address issues such as developing training environments for teaching real cybersecurity events. It will further show the correlations between technologies and policies for system Certification and Accreditation. Finally, it will offer insights on how cybersecurity can be used to maintain wirelessly security for international and national security for global organizations.
Papers are typically 10 pages of original content (not included title page, TOC page, and the references page) and presentation times vary on class (typically 10 - 15 minutes). Each group member should participate in both portions of the assignment. I expect an additional 2-3 pages for figures, tables, and references. Thus, total is 12-13 pages APA format.
Be sure to review with students that APA format is REQUIRED.
Note: The presentation should be (10-15 slides). Each group should present their presentation in class. The presentation time may vary on class (typically 10-15 minutes).
Explanation & Answer
Attached.
Running head: LOCALIZATION OF MALICIOUS SOFTWARE IN MOBILE APP
The Localization of Malicious Software in Mobile Application
Details
Name
Institutional Affiliation
Date
Abstract
❑The discussion is focused on the malicious software localization in devices.
❑The mobile applications are the major targets of the same.
❑It is good to detect the malicious programs and operate as recommended.
❑The various malware such as Trojan horse, spyware, and phishing sites affect the
quality of mobile operation.
❑Detection measures are also discussed.
❑The prevention of the malicious software localization are also identified.
Introduction
❑Mobile phones have enabled connectivity and are useful in the connection, which
is fundamental in society as recommended (Yang et al., 2015).
❑As required, the mobile phones are supposed to function optimally and enhance a
good record of quality and applied security which is necessary for the
accomplishment of the required goals.
❑Basically, some of the challenges which exist in the various mobile applications
are based on the malicious software which is localized.
❑ Malicious software is programs that are designed to cause distraction or to reduce
the optimal performance of mobile phones, which reduces the competence and the
quality recommended for the success of the various applications.
❑A good approach is necessary for the promotion of effective transformation and
other issues that make the applications good. Most of the mobile applications are
developed with specific needs and other approaches for the solution to the
challenges which are experienced.
Malicious software
❑These are unwanted software which cause alterations in the systems.
❑The software causes altered operational procedures (Ynang et al., 2015).
❑The software are bad for the mobile applications.
❑Their localizations cause challenges in quality device usage.
❑There are various types of malware.
Type of Malicious Software
i. Spyware
❑This is a type of malicious software which, when installed, collects the secret
information from the various handsets and transmits them to the parties which
installed them.
❑Spyware, just as its name suggests, is used to spy on the various systems and
channel all the information which is necessary for usage and therefore cause the
challenges.
❑The confidential information is transmitted to the unintended parties such as those
who carry out operations such as eavesdropping or tapping.
Trojans
• These are various forms of malicious software which when installed or run on
computer rates, the calls and causes additional charges on the user, which is
unintended; it is recommended that various approaches are applied in the
promotion of quality and identification of best operational needs (Nalluri et al.,
2015).
• Since monetary intentions are best described as the major issues which impact the
various individuals, Trojans are planted with the aim of collecting money and
other unnecessary payments from various people.
• Trojans are sophisticated, and they promote a quick transfer of funds from the
individual accounts to the malicious user without a known process.
• Usually, Trojans appear as additional websites and extensions, which lead the user
to some secret and uncensored website whereby the money will be used and the
challenges of payment observed, which is not recommended.
Phishing sites
• These are additional pages which are created as result of malicious software.
• The software results in additional pages which reduce the speed usability of the
browsers.
• Phishing sites are also avenues of conning and extra charges contrary to
requirements.
Hidden processes
❑These are malicious software that runs secretly in the background of the device
and causes the challenges of poor compliance with the needed processes and other
issues as recommended.
❑A good policy is, therefore, supposed to be focused on the needed approach and
ensure that success is accomplished (He, Chan, & Guizani, 2015).
❑The hidden processes affect the devices since they slow down the various
processes and regulate the operational approaches which are supposed to be
optimal as recommended.
❑The hidden processes cause various challenges and limit the operational processes
which are supposed to be implemented.
❑A good approach to the processes is by following the best procedure in critical
analysis of the gadgets and getting the software which are later remove.
Localization of the malicious software in the mobile applications
❑Localization occurs when the software are embedded in the mobile applications.
❑The challenges are exacerbated when the malicious software causes adverse
effects.
❑The mobile applications change and become less useful (Gu et al., 2015).
❑The challenges advance and the poor quality measures result in diminished
applicability.
❑The mobile applications are reduced in importance and the speed are also
compromised.
❑Applications downloaded from other sources such as Google, Apple and Huwei
are often affected.
Detection of the Software localization in mobile applications
❑Detected by observation of the changes in mobile functionality (Flores et al.,
2015).
❑Reduced quality approaches are identified as the major challenges.
❑Applications that lead to unique websites are also a way of detection.
❑Slowed processing of the devices are good for detection.
Prevention of Malicious software localization in mobile applications
❑Mobile applications are supposed to be downloaded from legitimate sources so
that quality can be applied in the success and accomplishment of the needed
information technology.
❑Scanning for malicious software is also considered a good approach in the
mitigation of the challenges related to the localization of the software within the
devices (Alme, 2016).
❑The best approach is, therefore, to ensure that there are periodical scans that are
good. Some of the challenges which affect the quality of the devices are related to
the issues which limit the competence as recommended. Better approaches are
therefore considered for the diagnostics, which is good.
Conclusion
❑Localization of malicious software is a common phenomenon with modern
handsets applications.
❑The mobile phones are affected adversely by the challenges such that the issues
identified are bad and result in undesirable consequences.
❑Some of the issues which affect re mobile phones are related to the poor
approaches and the challenges associated with the malicious software in the
applications.
❑ It is good to follow the best approach and ensure that the applications are free
from malicious software localization.
❑Detection of the software requires observation of the mobile phone for symptoms
such as compromised behavior and other challenges, which reduce the
competence and the recommended approaches which limit the operational
techniques.
References
1.
2.
3.
4.
5.
6.
7.
8.
9.
Alme, C. (2016). U.S. Patent No. 9,246,938. Washington, DC: U.S. Patent and Trademark Office.
Das, S., Divakarla, J., & Sharma, P. (2015). U.S. Patent No. 9,152,784. Washington, DC: U.S. Patent
and Trademark Office.
Flores, J., Lu, W., Blewer, R., & Kaplan, Y. (2015). U.S. Patent No. 9,171,157. Washington, DC: U.S.
Patent and Trademark Office.
Gu, J., Sun, B., Du, X., Wang, J., Zhuang, Y., & Wang, Z. (2018). Consortium blockchain-based
malware detection in mobile devices. IEEE Access, 6, 12118-12128.
He, D., Chan, S., & Guizani, M. (2015). Mobile application security: malware threats and
defenses. IEEE Wireless Communications, 22(1), 138-144.
Huang, H., Yang, S. F., Su, C. T., Twu, G. H., & Liu, H. (2015). U.S. Patent No. 8,966,632.
Washington, DC: U.S. Patent and Trademark Office.
Ismael, O. A., Song, D., & Xue, H. (2016). U.S. Patent No. 9,367,681. Washington, DC: U.S. Patent
and Trademark Office.
Nalluri, S., Kulkarni, D., Sinha, R., Krishnapur, V., Nagarajan, V. K., Dhruw, K. K., & Halder, K.
(2015). U.S. Patent Application No. 14/126,866.
Yang, W., Xiao, X., Andow, B., Li, S., Xie, T., & Enck, W. (2015, May). Appcontext: Differentiating
malicious and benign mobile app behaviors using context. In Proceedings of the 37th International
Conference on Software Engineering-Volume 1 (pp. 303-313). IEEE Press.
Running head: LOCALIZATION OF A MALICIOUS SOFTWARE IN MOBILE APP
Localization of a Malicious Software in Mobile Application
Details
Name
Institutional Affiliation
Date
1
LOCALIZATION OF A MALICIOUS SOFTWARE IN MOBILE APP
2
Abstract
Localization of malicious software in mobile applications is an interesting topic which is
a concern for most of the mobile users in modern society. The issues which are discussed in the
paper are related to the challenges of poor compliance with the strategies of good software. The
main focus of the discussion is the malicious software such as Trojans, Spyware, phishing sites,
and hidden processes. The mobile applications are affected by the malicious software and result
in compromised processes which reduce the competence and the recommended approaches as
required. A good policy is focused on the elimination of the challenges and promotion of a good
approach, which is necessary and required for better operation. Also, the detection processes for
the malicious software in mobile applications are discussed and the measures to prevent them
from developing. Basically, the challenges associated with the mobile processes are based on the
various issues which limit the competence of the various mobile phones. The manifestations of
the same such as reduced mobile speed and other challenges associated with the mobile, are also
discussed promptly.
Introduction
Mobile phones have enabled connectivity and are useful in the connection, which is
fundamental in society as recommended (Yang et al., 2015). As required, the mobile phones are
supposed to function optimally and enhance a good record of quality and applied security which
is necessary for the accomplishment of the required goals. Basicall...