I’ll expose USB vulnerability in some vendor’s customization of the Android system, I’ll also target that vulnerability in a specific vendor, together with a proof of concept of the attack and practical scenario environment, and I will unveil the implications of such vulnerability. Culminating in the flashing of a compromised boot partition, and root access.
Cyber security comprises several components in cyberspace, from information security to network and data security. From the social point of view cybersecurity has different interpretations reflecting different sectorial concerns. For citizens, is the safety and protection of their freedoms, rights and guarantees; in particular their privacy. For companies, is ensuring the availability of critical business activities and the protection of confidentiality and integrity of data. For governments, it is the protection of citizens, businesses, critical infrastructure and government computer systems against attacks or risks. Fundamentally, cybersecurity activities represent the collective resources that allow citizens, businesses and governments to meet their IT objectives in a secure, private and reliable manner.
With the constant evolution of cyberspace given the influence of information and communication technologies in all sectors of the economy, cybersecurity must also evolve as new scenarios and threats arise. Threats and technologies have the potential to evolve much faster than the regulatory process, thus the government , universities and industry should work together to develop appropriate infrastructure solutions that enable cyber security accompanying the dynamic environment of threats and also allow innovation . Universities therefore have an obligation to act as catalysts of knowledge in the area, and thereby contribute effectively to cyber security through the creation and production of innovative, efficient and reliable solutions.