Abstract
In Chapter 2, we looked at a simple example of how we can protect information using encryption. However, that example did not make use of Android’s built-in security and permissions architecture. In this chapter, we will take a look at what Android is able to offer the developer and end user with regard to security. We will also look at some direct attacks that can take place on applications and how to take the necessary safeguards to minimize the loss of private data.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Rights and permissions
Copyright information
© 2012 Sheran Gunasekera
About this chapter
Cite this chapter
Gunasekera, S. (2012). Android Security Architecture. In: Android Apps Security. Apress, Berkeley, CA. https://doi.org/10.1007/978-1-4302-4063-1_3
Download citation
DOI: https://doi.org/10.1007/978-1-4302-4063-1_3
Publisher Name: Apress, Berkeley, CA
Print ISBN: 978-1-4302-4062-4
Online ISBN: 978-1-4302-4063-1
eBook Packages: Professional and Applied ComputingApress Access BooksProfessional and Applied Computing (R0)