Galaxy S6 Edge is a newly released Samsung invention whose release date was in 2015. It is featured by a metallic frame that is sturdy at the back and the front. The frame, therefore, is an assurance of the durability and stability, in addition to giving it a look that is so stunning. Its uniqueness enables the owner to identify the caller even when the phone is facing downwards. This is enhanced by its ability to be programmed to a maximum of five colors, each representing a person on the list of contact. The screen show the specific color when a particular person makes a call. It is, however, prone to vulnerabilities and these can be prevented using the applicable security measures (ATIS & in Batten, 2014).
Galaxy S6 Edge
Galaxy S6 Edge upon its invention has satisfied the users' needs due to its stability and efficiency regarding memory. Samsung Company has over the years ensured that all its devices are up to date with the appropriate security software to keep the devices safe from any vulnerability. The vulnerabilities for Samsung Galaxy S6 Edge include a loophole that hackers were likely to use to access the victims’ mobile devices. A weakness in the emailing software is one of the vulnerabilities. This could allow the hackers to access and extract email messages from the device of the victim.
Delegate your assignment to our experts and they will do the rest.
Further, other vulnerabilities arise from where hackers can easily change the settings of the app that enables viewing of the photos (German Informatics Society (GI), 2015). Also, the device is has a lot of bugs especially in the Wi-Fi section of the phone. With this vulnerability, provision of any malicious activity into the software would enable the hacker to interfere with the targeted areas of security. Samsung Company has however addressed these security concerns by developing various security measures applicable to the users. KNOX has therefore been identified as the most effective security solutions given that it meets the users need for protection against the vulnerabilities. KNOX will, therefore, meet the safety needs regarding providing security, efficiency as well as increasing productivity of the mobile device. Users can also utilize other security measures such as creating passwords and utilizing the enabled rock screen using their fingerprints or a particular pattern.
The reason why Galaxy S6 edge mobile device needs to be secured is that of the possibilities of unlocking the lock screen by swiping the screen. This indicates that one of the security measures is likely to allow vulnerability and therefore is not adequate for offering the intended security. This aspect is enabled by a feature within the device, known as a smart lock. Disabling this feature, however, is the only way of ensuring that the security measure of using a locked screen offers the intended security.
According to ATIS & in Batten (2014), there is also a question on the security of the information regarding the fingerprints of the devices users. Therefore, there is the need to secure this information, ensuring the fingerprints of the devices users are not available for use by other companies. Cryptography is used to provide security to Galaxy S6 edge by using the algorithm to ensure encryption, symmetric and asymmetric key establishment and generation. The algorithm also provides authentication of messages in the Galaxy S6 edge. The support of these functions is protected and has the key destruction of data, random bit and salt generation, generation of initialization vector, as well as storage of secure key. The resulting functions that are cryptographic create protocols that are security related. These include HTTPS, IPsec; TLS and perform media encryption.
In the implementation of cryptography in Galaxy S6 edge, the first step is choosing the appropriate toolkit for cryptography. There are various toolkits of cryptography that the intended user may choose from. These include Java cryptography extension, openSSL, Cryptix and Legion of the Bouncy Castle. The second step in the implementation is the generation of keys. There is need of taking precaution in selecting keys if the security of the system which requires a cryptographic application, is intended to be dependent on key security.
The next important aspect of implementation is generating a random number. This step is important because it ensures that the numbers used are complicated. This makes them difficult for unintended users of the device to guess or predict. This can be performed using a generator of random numbers that can be trusted. Some of the useful devices at this point include EGADS and YARROW. Determination of the length of the keys is the final step, and the length of keys is an important consideration. This is because keys that are long enough will be suitable for cover time provision (Sharma & Ohja, 2010).
In future, the security mechanism for Galaxy S6 edge should be improved to ensure that the mobile device is more efficient and reliable for the users. The areas of improvement in the device’s security include data protection as well as increasing its productivity. Improving data security will ensure enhanced privacy in the users' contents. This will involve implementing security measures that will make sure that emails, messages, and other files are safe from unauthorized persons. It will also be important to make improvements to the stability and performance of the device as well as enhancing stability and security of calls made (GI, 2015).
In conclusion, Galaxy S6 Edge is a mobile device invention by Samsung Company. The device is subjected to vulnerabilities which every time they are identified, the company comes up with the appropriate measures to ensure the security of the users. Users can, therefore, apply these security measures to prevent threats and vulnerabilities.
References
ATIS (Conference), & In Batten, L. M. (2014). Applications and techniques in information security: 5th international conference, ATIS 2014. Melbourne, VIC, Australia: proceedings .
German Informatics Society (GI). (2015). Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA). Conference of SIG SIDAR . Retrieved from http://www.dimva.org/.
Sharma, A. & Ohja, V. (2010). Implementation of cryptography for privacy preserving data mining. International Journal of Database Management Systems , 2(3): 57-65. doi: 10.5121/ijdms.2010.2306.