27 Jan 2023

65

How to Secure Mobile Computing Devices: Galaxy S6 Edge

Format: APA

Academic level: College

Paper type: Research Paper

Words: 875

Pages: 3

Downloads: 0

Galaxy S6 Edge is a newly released Samsung invention whose release date was in 2015. It is featured by a metallic frame that is sturdy at the back and the front. The frame, therefore, is an assurance of the durability and stability, in addition to giving it a look that is so stunning. Its uniqueness enables the owner to identify the caller even when the phone is facing downwards. This is enhanced by its ability to be programmed to a maximum of five colors, each representing a person on the list of contact. The screen show the specific color when a particular person makes a call. It is, however, prone to vulnerabilities and these can be prevented using the applicable security measures (ATIS & in Batten, 2014). 

Galaxy S6 Edge 

Galaxy S6 Edge upon its invention has satisfied the users' needs due to its stability and efficiency regarding memory. Samsung Company has over the years ensured that all its devices are up to date with the appropriate security software to keep the devices safe from any vulnerability. The vulnerabilities for Samsung Galaxy S6 Edge include a loophole that hackers were likely to use to access the victims’ mobile devices. A weakness in the emailing software is one of the vulnerabilities. This could allow the hackers to access and extract email messages from the device of the victim. 

It’s time to jumpstart your paper!

Delegate your assignment to our experts and they will do the rest.

Get custom essay

Further, other vulnerabilities arise from where hackers can easily change the settings of the app that enables viewing of the photos (German Informatics Society (GI), 2015). Also, the device is has a lot of bugs especially in the Wi-Fi section of the phone. With this vulnerability, provision of any malicious activity into the software would enable the hacker to interfere with the targeted areas of security. Samsung Company has however addressed these security concerns by developing various security measures applicable to the users. KNOX has therefore been identified as the most effective security solutions given that it meets the users need for protection against the vulnerabilities. KNOX will, therefore, meet the safety needs regarding providing security, efficiency as well as increasing productivity of the mobile device. Users can also utilize other security measures such as creating passwords and utilizing the enabled rock screen using their fingerprints or a particular pattern. 

The reason why Galaxy S6 edge mobile device needs to be secured is that of the possibilities of unlocking the lock screen by swiping the screen. This indicates that one of the security measures is likely to allow vulnerability and therefore is not adequate for offering the intended security. This aspect is enabled by a feature within the device, known as a smart lock. Disabling this feature, however, is the only way of ensuring that the security measure of using a locked screen offers the intended security. 

According to ATIS & in Batten (2014), there is also a question on the security of the information regarding the fingerprints of the devices users. Therefore, there is the need to secure this information, ensuring the fingerprints of the devices users are not available for use by other companies. Cryptography is used to provide security to Galaxy S6 edge by using the algorithm to ensure encryption, symmetric and asymmetric key establishment and generation. The algorithm also provides authentication of messages in the Galaxy S6 edge. The support of these functions is protected and has the key destruction of data, random bit and salt generation, generation of initialization vector, as well as storage of secure key. The resulting functions that are cryptographic create protocols that are security related. These include HTTPS, IPsec; TLS and perform media encryption. 

In the implementation of cryptography in Galaxy S6 edge, the first step is choosing the appropriate toolkit for cryptography. There are various toolkits of cryptography that the intended user may choose from. These include Java cryptography extension, openSSL, Cryptix and Legion of the Bouncy Castle. The second step in the implementation is the generation of keys. There is need of taking precaution in selecting keys if the security of the system which requires a cryptographic application, is intended to be dependent on key security. 

The next important aspect of implementation is generating a random number. This step is important because it ensures that the numbers used are complicated. This makes them difficult for unintended users of the device to guess or predict. This can be performed using a generator of random numbers that can be trusted. Some of the useful devices at this point include EGADS and YARROW. Determination of the length of the keys is the final step, and the length of keys is an important consideration. This is because keys that are long enough will be suitable for cover time provision (Sharma & Ohja, 2010). 

In future, the security mechanism for Galaxy S6 edge should be improved to ensure that the mobile device is more efficient and reliable for the users. The areas of improvement in the device’s security include data protection as well as increasing its productivity. Improving data security will ensure enhanced privacy in the users' contents. This will involve implementing security measures that will make sure that emails, messages, and other files are safe from unauthorized persons. It will also be important to make improvements to the stability and performance of the device as well as enhancing stability and security of calls made (GI, 2015). 

In conclusion, Galaxy S6 Edge is a mobile device invention by Samsung Company. The device is subjected to vulnerabilities which every time they are identified, the company comes up with the appropriate measures to ensure the security of the users. Users can, therefore, apply these security measures to prevent threats and vulnerabilities. 

References 

ATIS (Conference), & In Batten, L. M. (2014). Applications and techniques in information security: 5th international conference, ATIS 2014. Melbourne, VIC, Australia: proceedings . 

German Informatics Society (GI). (2015). Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA). Conference of SIG SIDAR . Retrieved from http://www.dimva.org/. 

Sharma, A. & Ohja, V. (2010). Implementation of cryptography for privacy preserving data mining. International Journal of Database Management Systems , 2(3): 57-65. doi: 10.5121/ijdms.2010.2306. 

Illustration
Cite this page

Select style:

Reference

StudyBounty. (2023, September 14). How to Secure Mobile Computing Devices: Galaxy S6 Edge.
https://studybounty.com/how-to-secure-mobile-computing-devices-galaxy-s6-edge-research-paper

illustration

Related essays

We post free essay examples for college on a regular basis. Stay in the know!

Security Implication of the Internet of Things

The Internet of Things (IoT) can be described as s system of interconnected devices that have the ability to transfer information over a computer network without the need of human-to-computer or human-to-human...

Words: 892

Pages: 3

Views: 96

Modern Day Attacks Against Firewalls and VPNs

Introduction The need to have an enhanced security of the computer connectivity happens to be one of the reasons that attract companies and organizations towards wide usage of VPNs. Several simple techniques...

Words: 2025

Pages: 7

Views: 134

How to Deploy and Administer Windows Server 2012

Securing a reliable, and expandable configuration for a company is important to build a strong network. The new and enhanced features of the Windows Server 2012 can be used to implement the network. In this...

Words: 1673

Pages: 6

Views: 87

Deployment Model in Cloud Computing

Deployment model is a representation of a cloud environment primarily distinguished by parameters such as accessibility, proprietorship, and storage size. The National Institute of Standards and Technology gives the...

Words: 254

Pages: 1

Views: 81

How to Use Web Search Engines for Business Research

The advancement of technology has made it possible for many people around the world to have easy access to information whenever they want. The development of the Wide World Web-enabled different kinds of information...

Words: 773

Pages: 3

Views: 86

Distributed Database Management System (DDBMS)

Introduction Data management has been a headache to many technology enthusiasts for quite a long period of time. They have successfully managed to logically collect interrelated data and share it. If the data is...

Words: 799

Pages: 3

Views: 127

illustration

Running out of time?

Entrust your assignment to proficient writers and receive TOP-quality paper before the deadline is over.

Illustration