IntroductionAndroid is considered the modern mobile platform, primarily designed to be open. All Android applications use software and hardware, along with local ones, and serve the data exposed by the platform, in order to bring innovation and value to consumers (Allen, 2011). apart from this value, it is important that the platform offers an application environment, which provides guarantees on the security of the user, the device, the network and the applications. Android is primarily developed for developers, and Android Security Control is designed for the purpose of reducing the burden on developers. Security, which is the open platform in Android, needs a security architecture, which is robust along with various other security programs. Android was primarily designed through multi-layered security that offers flexibility, that requires open platform support, and that offers protection to all users of the platform (Allen, 2011). Android users are given visibility into how the application works and try to control other applications. Android's security design includes all the expectations that might be attempted to carry out common attacks that force users to install malware. Android is able to reduce the probability of all these attacks and even try to limit the impact of these cyber attacks (Pacchiella, 2013). Research Background It is an important part of the current business environment to be updated with the latest technological changes within the environment. It refers to the set of management systems through which organizations manage their technological foundations for the creation of... middle of paper... agement How To. UK: Packt Publishing Ltd. Press, P. (2011). Creating Android applications: development and design. Berkeley: Peachpit Press. Meier, R. (2012). Professional Android Application Development 4. USA: John Wiley & Sons.Burguera, I., Zurutuza, U. & Tehrani, S.N. (2011). Crowdroid: Behavior-based malware detection system for Android. SPSM, 11, 1-11. Memon, A. M. (2012). Using GUI ripping for automated testing of Android applications. ASE, 12, 1-258.McBurney, D.H. & White, T.L. (2009). Research methods. United States: Cengage Learning.Jackson, S. L. (2010). Research methods: a modular approach. United States: Cengage Learning.Cohen, L., Manion, L., Morrison, K., & Morrison, K.R.B. (2007). Research Methods in Education 6th ed. New York: Routledge.Collins, H. (2010). Creative research: the theory and practice of research for the creative industries. London: AVA Publishing.
tags