10. Market Overview of Mobile OS and Security Aspects Flashcards

1
Q

Long term trends

A

Big players often have some market share due to high investment (e.g. Microsoft)
–> killer application champions are very successful for some time until their application is also available from big players (e.g. Palm = 1st small/affordable PDA with address book)
–> due to limitations of mobile devices, mobile OS have to cope with challenges:
limited device capabilities & resource, usability issues (e.g. size), security & system integrity issues

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which Mobile OS are unavailable to other device manufacturers?

A

PALM OS & Apple iOS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Advantage/Disadvantage of Mobile OS that are unavailable to other device manufacturers?

A

+ not as much affected by malware

- less flexible (3rd party software cannot be easily installed)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Name Manufacturer-independent mobile OS

A

embedded Linux, Symbian platform, Android (open by Handset Alliance), Firefox OS (by Mozilla), Windows Mobile & Windows Phone

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Problem of Manufacturer-independent mobile OS

A

Many mobile OS allow execution of 3rd party software: malware can be executed!!
Threats for users: device malfunction, loss of data & money, short battery runtime

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Malware

A

programs/files created to do harm (viruses, worms, trojan horses)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Grayware

A

programs without viruses & not obviously malicious, but annoying or even harmful (hacking tools, access-ware, spyware, adware, joke programs)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Malware

A

aggressive techniques to place advertising in phone

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Security precautions & measures regarding malware

A

Memory protection (processes not able to access memory of other processes) – File protections (encryption, access control) – Access controls (every user has certain assigned access rights & OS monitors) –Support for security modules –Secure I/O –Code integrity management (integrity of programs checked before started) –Additional security (virus scanner, firewall)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly