Skip to content
AOSP Insight
  • Home
  • Book
  • About Author
  • Contact me
  • Toggle website search
Menu Close
  • Home
  • Book
  • About Author
  • Contact me
  • Toggle website search

Author: Mohammad Hossein Heydarchi

This author has written 47 articles
  1. Home>
  2. Mohammad Hossein Heydarchi>
  3. Page 3
Read more about the article Regular Security Assessments

Regular Security Assessments

  • Post author:Mohammad Hossein Heydarchi
  • Post published:November 7, 2023
  • Post category:AOSP/Principles & Methodologies/Security & Privacy
  • Post comments:0 Comments

In today's interconnected world, where attackers use software program weaknesses to obtain unauthorized access, retrieve sensitive data, or disrupt services, secure coding techniques and regular security assessments are crucial. Programmers…

Continue ReadingRegular Security Assessments
Read more about the article Pros and Cons of Android Compose

Pros and Cons of Android Compose

  • Post author:Mohammad Hossein Heydarchi
  • Post published:October 16, 2023
  • Post category:AOSP/Framework/Jetpack
  • Post comments:0 Comments

Jetpack Compose has made a splash in the Android development scene with its fresh take on UI development. Its declarative style and rich feature set promise to trim down the…

Continue ReadingPros and Cons of Android Compose
Read more about the article Bridging the Gap: An Insight into Android Web Apps

Bridging the Gap: An Insight into Android Web Apps

  • Post author:Mohammad Hossein Heydarchi
  • Post published:October 10, 2023
  • Post category:AOSP/Security & Privacy
  • Post comments:0 Comments

Web App Structure Android Web Apps utilize a WebView component to display the content and are effectively web pages enclosed within an Android application. The key components are HTML, CSS,…

Continue ReadingBridging the Gap: An Insight into Android Web Apps
Read more about the article The imperative role of code review

The imperative role of code review

  • Post author:Mohammad Hossein Heydarchi
  • Post published:October 9, 2023
  • Post category:AOSP/Principles & Methodologies/Security & Privacy
  • Post comments:0 Comments

In order to ensure that the applications are developed and put into use in a way that prevents unauthorized access, data tampering, and theft, software developers utilize a set of…

Continue ReadingThe imperative role of code review
Read more about the article The Principle of Least Privilege

The Principle of Least Privilege

  • Post author:Mohammad Hossein Heydarchi
  • Post published:August 31, 2023
  • Post category:Principles & Methodologies
  • Post comments:0 Comments

Minimize Access to Maximize Security The Principle of Least Privilege (PoLP) is one of the fundamental concepts in cybersecurity. Simply put, the principle dictates that a user should be given…

Continue ReadingThe Principle of Least Privilege
Read more about the article The Zero Trust Principle: Trust No One, Verify Everything

The Zero Trust Principle: Trust No One, Verify Everything

  • Post author:Mohammad Hossein Heydarchi
  • Post published:August 30, 2023
  • Post category:Principles & Methodologies
  • Post comments:0 Comments

The Zero Trust principle is a transformative approach to network security that assumes no trust by default. This principle is built on the mantra of "trust no one, verify everything,"…

Continue ReadingThe Zero Trust Principle: Trust No One, Verify Everything
Read more about the article The Principle of Separation of Privilege

The Principle of Separation of Privilege

  • Post author:Mohammad Hossein Heydarchi
  • Post published:August 29, 2023
  • Post category:Principles & Methodologies
  • Post comments:0 Comments

Understanding Separation of Privilege The Separation of Privilege principle can be seen as an extension of the Principle of Least Privilege. While the Principle of Least Privilege ensures that users…

Continue ReadingThe Principle of Separation of Privilege
Read more about the article Defence in Depth

Defence in Depth

  • Post author:Mohammad Hossein Heydarchi
  • Post published:August 28, 2023
  • Post category:Principles & Methodologies
  • Post comments:0 Comments

Defence in Depth: Layered Protection for Robust Security The Defence in Depth (DiD) principle, also known as layered security, is a fundamental concept in cybersecurity. It refers to the strategy…

Continue ReadingDefence in Depth
  • Go to the previous page
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • Go to the next page

Categories


  • AOSP
  • Automotive
  • Battery
  • Build System
  • Core & System
  • Downloads
  • Framework
  • HAL Layer
  • Jetpack
  • Performance
  • Principles & Methodologies
  • Protocol
  • Security & Privacy
  • Software Design
  • Uncategorized

  • About Author
  • Privacy Policy
  • Contact me
  • Blog Home
  • Books
    • Secure Android Design and Development, 1st edition
    • Secure Android Development (Free edition)
  • AOSP
    • Battery
    • Build System
    • Core & System
    • Framework
    • HAL Layer
    • Performance
    • Security & Privacy
  • Automotive
  • Protocol
  • Downloads
Copyright - WordPress Theme by OceanWP