{"title":"Android移动设备的网络安全","authors":"Yordan Shterev, Kaloyan Kolev","doi":"10.55630/stem.2023.0516","DOIUrl":null,"url":null,"abstract":"This article presents, summarizes, and develops cybersecurity technology concepts for Android mobile devices according to the current state of the problem. Based on the OSI model for android mobile devices, security protocols and applications, and also the main vulnerabilities and threats on the other hand, the current defenses against cyber attacks are revealed.","PeriodicalId":183669,"journal":{"name":"Innovative STEM Education","volume":"84 9","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-07-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Cyber Security to Android Mobile Devices\",\"authors\":\"Yordan Shterev, Kaloyan Kolev\",\"doi\":\"10.55630/stem.2023.0516\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This article presents, summarizes, and develops cybersecurity technology concepts for Android mobile devices according to the current state of the problem. Based on the OSI model for android mobile devices, security protocols and applications, and also the main vulnerabilities and threats on the other hand, the current defenses against cyber attacks are revealed.\",\"PeriodicalId\":183669,\"journal\":{\"name\":\"Innovative STEM Education\",\"volume\":\"84 9\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-07-24\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Innovative STEM Education\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.55630/stem.2023.0516\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Innovative STEM Education","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.55630/stem.2023.0516","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
This article presents, summarizes, and develops cybersecurity technology concepts for Android mobile devices according to the current state of the problem. Based on the OSI model for android mobile devices, security protocols and applications, and also the main vulnerabilities and threats on the other hand, the current defenses against cyber attacks are revealed.