Data and mobile device protection

Android is developed by Google and used as a mobile operating system based on Linux. Its primarily purpose is for touchscreen mobile devices such as tablet and smartphones with unique user interfaces for others types of devices such as Android TV or Android Wear. According to online research company...

Full description

Saved in:
Bibliographic Details
Main Author: Low, Yi Sheng
Other Authors: Tan Kheng Leong
Format: Final Year Project
Language:English
Published: 2015
Subjects:
Online Access:http://hdl.handle.net/10356/62544
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Nanyang Technological University
Language: English
id sg-ntu-dr.10356-62544
record_format dspace
spelling sg-ntu-dr.10356-625442023-03-03T20:32:02Z Data and mobile device protection Low, Yi Sheng Tan Kheng Leong School of Computer Engineering DRNTU::Engineering::Computer science and engineering::Software::Software engineering DRNTU::Engineering::Computer science and engineering::Software::Operating systems Android is developed by Google and used as a mobile operating system based on Linux. Its primarily purpose is for touchscreen mobile devices such as tablet and smartphones with unique user interfaces for others types of devices such as Android TV or Android Wear. According to online research company Gartner, Android has reached close to a billion end users in 2014, expected to reach two billions units in 2016. With this much end users, it has make Android a valuable targets for black hat hackers to compromise the operating system and profit from it. This project has two Android applications. The first application aims to develop an application which has two special security features that will allow the users to encrypt and hash files in Android mobile devices. This application was developed in java eclipse using various library functions. It is able to encrypt and hash files using AES-256. The second application is similar to parent monitoring applications. Its aim is to allow parents to control their child from installing or using applications that are not allow, monitoring the browser history and lastly to detect if there are any unauthorized processes running in the background. Bachelor of Engineering (Computer Engineering) 2015-04-15T06:07:25Z 2015-04-15T06:07:25Z 2015 2015 Final Year Project (FYP) http://hdl.handle.net/10356/62544 en Nanyang Technological University 45 p. application/pdf
institution Nanyang Technological University
building NTU Library
continent Asia
country Singapore
Singapore
content_provider NTU Library
collection DR-NTU
language English
topic DRNTU::Engineering::Computer science and engineering::Software::Software engineering
DRNTU::Engineering::Computer science and engineering::Software::Operating systems
spellingShingle DRNTU::Engineering::Computer science and engineering::Software::Software engineering
DRNTU::Engineering::Computer science and engineering::Software::Operating systems
Low, Yi Sheng
Data and mobile device protection
description Android is developed by Google and used as a mobile operating system based on Linux. Its primarily purpose is for touchscreen mobile devices such as tablet and smartphones with unique user interfaces for others types of devices such as Android TV or Android Wear. According to online research company Gartner, Android has reached close to a billion end users in 2014, expected to reach two billions units in 2016. With this much end users, it has make Android a valuable targets for black hat hackers to compromise the operating system and profit from it. This project has two Android applications. The first application aims to develop an application which has two special security features that will allow the users to encrypt and hash files in Android mobile devices. This application was developed in java eclipse using various library functions. It is able to encrypt and hash files using AES-256. The second application is similar to parent monitoring applications. Its aim is to allow parents to control their child from installing or using applications that are not allow, monitoring the browser history and lastly to detect if there are any unauthorized processes running in the background.
author2 Tan Kheng Leong
author_facet Tan Kheng Leong
Low, Yi Sheng
format Final Year Project
author Low, Yi Sheng
author_sort Low, Yi Sheng
title Data and mobile device protection
title_short Data and mobile device protection
title_full Data and mobile device protection
title_fullStr Data and mobile device protection
title_full_unstemmed Data and mobile device protection
title_sort data and mobile device protection
publishDate 2015
url http://hdl.handle.net/10356/62544
_version_ 1759856655929966592