Current location - Loan Platform Complete Network - Big data management - Preface to the Secret of Mobile Internet Smart Terminal Security
Preface to the Secret of Mobile Internet Smart Terminal Security

Preface 1

In 2007, iPhone rewrote the definition of smartphones; in 2009, Android opened the door to smartphone systems; in 2011, China had nearly 1 billion mobile phone users. Among them, there are more than 100 million 3G mobile phone users. The wave of mobile Internet and smart terminals has swept the world and is unstoppable.

360 provides users with free products on the PC Internet, using Internet ideas to solve security problems, and has made security the same basic service as email and IM. In the field of mobile Internet, users still need to obtain basic security services, because with the rapid development of the number of users and market size, many security problems that have been encountered on PCs will reappear in the mobile Internet in various forms. And based on the characteristics of mobile phones, new security issues have also emerged, such as data consumption, loss of phone bills, etc.

360 began to enter the field of mobile Internet security in 2009 and launched the free 360 ??Mobile Guard. Starting from the most basic anti-harassment and anti-deduction, it solved mobile phone security problems for users and gradually developed and established Complete mobile cloud security system. In the process of practice, we gradually realized that not only users will encounter security risks, but also participants in the entire mobile Internet industry chain face different security challenges. Only providing security protection at the user's terminal cannot completely solve the problem. Security issues of mobile Internet. For example, application markets and download websites as communication channels are good at resource integration and content operation, but it is difficult to prevent software with security risks from entering the channel. Nowadays, the number of individual developers and small and medium-sized startups engaged in mobile Internet is still increasing. Various innovative products emerge every day. However, in addition to making good products that meet user needs, we must also guard against viruses and Trojans. . These viruses will be disguised through tampering, embedding, etc., and along with the downloading and dissemination of software applications, they will enter the user's mobile phone and cause harm. This will not only harm the vital interests of the user, but also bring injustice to good software. If a large number of users are troubled by security and lose confidence in the mobile Internet, it will also delay the development of the entire industry. Therefore, 360 also provides free security testing services to partners in the mobile Internet industry chain, hoping that more developers and participants will realize the importance of security and provide more services in different links of the industry chain. security guarantee, thereby purifying the entire industrial environment, allowing users to receive more protection, and allowing the mobile Internet to develop in a healthier and more prosperous manner.

What is gratifying is that "Mobile Internet: Smart Terminal Security Revealed" follows the development boom of mobile Internet and smartphones, and comprehensively introduces all aspects of security from hardware to network, terminal to system. specifications and protective measures to quickly establish a comprehensive overview of mobile Internet security. What is particularly rare is that this book provides in-depth and simple explanations for each mainstream smartphone operating system, which has more practical reference value for developers active on different platforms.

Zhou Hongyi

Chairman of Qihoo 360 Technology Co., Ltd.

Preface 2

The rapid development of mobile Internet has led to the number of smart terminals It has increased dramatically and its functions have been enhanced day by day. With the trend of terminal intelligence and network broadband, mobile Internet services are emerging one after another and becoming increasingly prosperous. However, smart terminals as business carriers face various security threats, such as malicious ordering, account theft, and call monitoring. At the same time, smart terminals increasingly involve sensitive information such as business secrets and personal privacy. As the main carrier of mobile Internet services, smart terminals face severe security challenges.

At present, there are many smart terminal operating systems, and the inherent security mechanisms are also very different. As a result, smart terminals from different manufacturers face completely different security risks; even the same operating system, due to different OEMs, Different levels of security reinforcement also present different security features.

The book "Intelligent Terminal Security of Mobile Internet Revealed" systematically introduces the risks faced by terminals and countermeasures. What is commendable is that the author introduces the security mechanisms of mainstream mobile operating systems Windows Mobile, Android, iPhone, Symbian, MeeGo, BlackBerry and Windows Phone7, and analyzes the security of the operating system from the system level, which greatly improves the instructiveness and convenience of this book. Practicality. This book helps information security practitioners understand the security mechanisms of smart terminal operating systems, and can also be used as a textbook to introduce content related to smart terminal security. This book is also the first book on the market to introduce smart terminal security, which can help readers understand smart terminal security from multiple perspectives.

I hope readers can start exploring smart terminal security from this book and gain an in-depth understanding of terminal security in the mobile Internet era.

Huang Xiaoqing

. President of China Mobile Communications Research Institute