{"title":"A method of countering the vulnerabilities of applications based on the Android operating system through permission management","authors":"B. V. Hoholʹ","doi":"10.31673/2409-7292.2022.024552","DOIUrl":null,"url":null,"abstract":"The article explores vulnerabilities and ways to protect mobile applications based on the Android operating system. The security problem has been investigated and various types of mobile application security threats have been analyzed. On the basis of the research carried out in the article, recommendations have been developed for the protection of mobile applications from cyber attacks by means of permission management.","PeriodicalId":107068,"journal":{"name":"Modern information security","volume":"73 7","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Modern information security","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.31673/2409-7292.2022.024552","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
The article explores vulnerabilities and ways to protect mobile applications based on the Android operating system. The security problem has been investigated and various types of mobile application security threats have been analyzed. On the basis of the research carried out in the article, recommendations have been developed for the protection of mobile applications from cyber attacks by means of permission management.