- Android Application Security Essentials
- Pragati Ogal Rai
- 195字
- 2021-08-13 16:25:30
Chapter 3. Permissions
Permissions are the focus of this chapter. They are an integral part of an Android application and almost all application developers and users will encounter them at one time or the other. As we discussed in Chapter 1, Android Security Model – the Big Picture, install time application review is the most important security gate. This step is an all or nothing decision by the user; a user either accepts all the listed permissions or declines to download the app. So, as a user of an Android phone, it is important to understand permissions to make prudent decisions about which application to install. Permissions form the basis for securing components and protecting user data.
This chapter begins with an introduction of an existing permission in the Android system. We discuss the four permission protection levels namely Normal, Dangerous, Signature, and SignatureOrSystem. Then, we will discuss about how to secure an application and its components using permissions. Next, we learn how to extend the permission model by adding user defined permissions. This section will discuss permission groups, permission trees, and the syntax to create a new permission in the manifest file.
- Extending Symfony2 Web Application Framework
- 可信計算3.0工程初步
- INSTANT Metasploit Starter
- 軟件開發安全之道:概念、設計與實施
- Kali Linux Network Scanning Cookbook(Second Edition)
- 數據安全與隱私計算(第3版)
- 從實踐中學習Kali Linux滲透測試
- 隱私計算
- Advanced Penetration Testing for Highly:Secured Environments(Second Edition)
- 先進云安全研究與實踐
- 數據保護:工作負載的可恢復性
- 網絡關鍵設備安全檢測實施指南
- 網絡服務安全與監控
- VMware vCloud Security
- 企業數據安全防護指南