Mobile Device Against Brute Force Attacks Essay
The use of the PIN access is probably the most extended method to protect the phone from unauthorized access, but it can be used to protect access to the filesystem. It is commonly provided by the manufacturer, and includes the possibility of change if the user wants. As security feature, in order to protect the mobile device against brute force attacks (10000 possible combinations from 0 to 9999) after 3 erroneous efforts of access to the system using the PIN number, the card will be block, and no more PIN access attempts will be permit, being the only method to unblock the PIN access the use of the PUK (PIN Unblocking Key). (Androulidakis. 2012).
4.5.5 Protected Stored Data and Hidden Files. Android do not provide by default the mechanism to protect/hidden files by default, but being an open source, it can recommend some applications to do it, such as HideNseek, File Cover, or Top Secret. (Abalenkovs et.al. 2012).
In relation to the stored data, it is recommended the use of a principle called “Least Privilege” that recommends store basic and necessary information…