Mobile Device Against Brute Force Attacks Essay

1397 Words Aug 13th, 2015 null Page
4.5.4 Pin, Gesture and Password. Similarly to iOS, Android supports a four digits long (from 0 to 4) to gain access to the system. Android gives the opportunity to use a password of variable length, and is able to include numbers, symbols, and letters. Gesture is a pattern between symbols given; It is necessary to repeat the same gesture previously saved to gain access to the system. (Abalenkovs et al. 2012).
The use of the PIN access is probably the most extended method to protect the phone from unauthorized access, but it can be used to protect access to the filesystem. It is commonly provided by the manufacturer, and includes the possibility of change if the user wants. As security feature, in order to protect the mobile device against brute force attacks (10000 possible combinations from 0 to 9999) after 3 erroneous efforts of access to the system using the PIN number, the card will be block, and no more PIN access attempts will be permit, being the only method to unblock the PIN access the use of the PUK (PIN Unblocking Key). (Androulidakis. 2012).

4.5.5 Protected Stored Data and Hidden Files. Android do not provide by default the mechanism to protect/hidden files by default, but being an open source, it can recommend some applications to do it, such as HideNseek, File Cover, or Top Secret. (Abalenkovs et.al. 2012).
In relation to the stored data, it is recommended the use of a principle called “Least Privilege” that recommends store basic and necessary information…

Related Documents