Rooting and OS Settings to Access Alternative Market
Increasingly, security professionals are discussing methods to protect against the ‘human element’.
Users are often, knowingly or unknowingly, active participants in compromising network security.
The “walled garden” design inherent in popular mobile devices limits the user experience to the
specific capabilities envisioned by the device manufacturers. While this experience is suitable for
many mobile device owners, others may become frustrated to
learn that they cannot remove factory-installed apps, download
all the apps they desire, or adjust certain device settings. Techsavvy
users overcome these limitations by “jailbreaking” or
“rooting” their devices—terms that refer to the process of
gaining device root access to remove security features built into
the operating system. These practices enable the installation of a modified OS; installation of noncertified
applications; tethering (sharing the device’s data connection with other devices); and full
device customization controls. However, these practices elevate risk as they allow apps to be
installed with root privileges. Essentially, devices that are rooted or jailbroken are stripped of