IT Hot Topics - Mobile Security Threats at Every Layer

367
-1

Published on

Published in: Technology
0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total Views
367
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
0
Comments
0
Likes
1
Embeds 0
No embeds

No notes for slide

IT Hot Topics - Mobile Security Threats at Every Layer

  1. 1. Risk - noun `riskThe possibility of loss or injury
  2. 2. • •• •• •• •• •• •• • • • • • • • •
  3. 3. • •• •• •• •• •• ••••••
  4. 4. •••••
  5. 5. ••••••
  6. 6. ••••••
  7. 7. ••••• •
  8. 8. ••••••
  9. 9. •••••
  10. 10. ••••••
  11. 11. •••••••
  12. 12. • ‣ ‣•
  13. 13. ••
  14. 14. ••
  15. 15. • • • • • •
  16. 16. ••••
  17. 17. Crowd Sourced Current Solutions Inadequate Internal Teams DevelopersDev Site A Dev Site B Security Consultants • Very expensive • In short supply iPhone • Time to results too long Dev Site C Apps Crowd Internal Sourcing Tools • Do not scale across sites Open 3rd Party • Very high noise ratio Source Open Software Software Vendors • Can not test 3rd party code Source SYMC MSFT • Separation of duties issue Outsourced Developers Offshore • Do not know how to write Oracle secure code Provider • Prioritize time-to-ship, functionality over security Processes • Difficult to implement Eastern China • Years to fine tune Europe India • Low adoption (< 1% of US Contractors companies CMMI Level 5 certified) Unknown Skills
  18. 18. •• ‣••
  19. 19. •••
  20. 20. Whitelisting• Conduct static analysis of candidate applications• Create a whitelist• Use an unbiased 3rd party• Enforcement via mobile policy

×