Description
I need help in writing 1 page about mobile app with app style with reference and similarity less than 10% Thanks
Explanation & Answer
Attached.
Running head: THE DANGERS OF MOBILE APPS PERMISSIONS
The dangers of mobile apps permissions
Student’s name:
Institutional affiliation:
1
THE DANGERS OF MOBILE APPS PERMISSIONS
2
THE DANGERS OF MOBILE APPS PERMISSIONS
History of mobile applications
Mobile applications permissions was introduced in android version 3.0 and was geared at
helping applications become more dynamic and automatic in their functionality. The permissions
were introduced to help applications to retrieve certain information from a user’s device, and in
turn use the information to carry out transactions and services in the background at the benefit of
the user (Chen, 2016). As such, applications were expected to carry out user tasks in the
background, helping the user in carrying out transactions and updating their accounts.
Initially, android application permissions were designed to be requested at the time of
installing the applications, but has later been changed to request of permissions during runtime –
when the application is running for the first time or every time the application runs. Both at
install and runtime, the permissions guide the user to know whether an application can be
dangerous to personal data or not (Carrascosa, Kalutarage & Huang, 2017). If an application is
deemed to be dangerous to the information requested, the user is at will to decline its installation
or running, after which the application exits and does not run. This ensures complete protection
of the user data and information.
Apart from that, the introduction of the android application permissions was to restrict
application access, only giving applications access to the data they need to access. This was in a
bid to increase the security of the user, giving the user the authority to decide which areas of the
handset can be accessed and which areas they do not want them to access (Chen, 2016). This is
critical in protecting personal information and data, which can be misused by cybercriminals.
This option helped the user to decide which data will need to be moved or removed from the
handset to ensure security of the data and information.
THE DANGERS OF MOBILE APPS PERMISSIONS
3
Top 12 abused android application permissions
According to Carrascosa, Kalutarage & Huang (2017), mobile app permissions can easily
be misused by cybercriminals for their own selfish gains. Such application permissions can be
used to steal personal information such as passwords, track an individual, store and format data
on the user’s device as well as erase user’s data on the device.
One of the most abused permission is the network-based location tracking. This
permission can be used by cyber criminals to identify a device’s region and location, and equally
using this data to redirect a user to malicious sites. By directing a user to malicious sites, an
application might not be accountable for the malicious effects caused by the website, since they
are two independent entities (Doherty, 2016). Apart from that, GPS location tracking can also be
used by cybercriminals to track and launch attacks on users in certain regions. This might be due
to the ignorance of the users in such regions or other variable. The network state permission can
also be misused by using the available network to download malicious codes or sending
messages, which equally has negative effects on users (Doherty, 2016). Apart from that, the W...