Hardening of Android Based Devices & Plugging the Common Vulnerabilities
Manish Kumar Rana1, Hemant Narayan2

1Mr. Manish Kumar Rana, Student, Masters of Technology, CBS Group of Institutions, Maharishi Dayanand University, Rohtak (Haryana), India.
2Mr. Hemant Narayan, Professor & Head, Department of Electronics and Communication Engineering, CBS Group of Institutions, Maharishi Dayanand University, Rohtak (Haryana), India.

Manuscript received on 13 June 2017 | Revised Manuscript received on 20 June 2017 | Manuscript Published on 30 June 2017 | PP: 228-233 | Volume-6 Issue-5, June 2017 | Retrieval Number: E5033066517/17©BEIESP
Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Technology has developed at a fast pace in last two decades. With the paradigm shift in technology, it has changed the way humans think and simultaneously posed certain challenges to be dealt with in greater depth. While the earlier impetus was on having single window dispensation, however it is being seen that the single window will also not be required and people will have all digital clearence for any service or transaction. With advent of smart devices, the task has become rather simpler, however challenges of personal data safety and related cyber aspects acquires comparatively larger domain to deal with. This paper deals with hardening of ANDROID OS based communication devices by even a novice user. It attempts to throw light on genesis of ANDROID OS, the commonly known vulnerabilities, their threats and strengthening of these devices against hackers of comparable skills. The paper also attempts to touch as to how these ANDROID OS based communication devices, which are potential tools of being soft targets in cyber domain, can be technologically exploited.
Keywords: ANDROID OS, Technology, Vulnerabilities, Communication

Scope of the Article: Real-Time Communication