SlideShare a Scribd company logo
1 of 5
Running head: SECURING NATIVE APPLICATIONS
SECURING NATIVE APPLICATIONS 6
Securing Native Applications
Name:
Course:
Institution:
Date:
Abstract
This paper aims at discovering the methods of securing
native mobile applications and the probable threats they can
experience in the advancing world of technology. Any kind of
software, ranging from desktop to mobile applications, is
believed to have defects that can lead to susceptibilities. These
weaknesses, when subjugated, may bring in threat to the
integrity, privacy, and accessibility of the software. However,
various security auditing strategies might aid to minimize at a
specific degree the level of confidence these risks have. With
the outburst of mobile applications for day to day activities
such as checking email, social networks, news, managing bank
accounts, ensuring a satisfactory level of application security
becomes essential for the usage and reliance of mobile services.
This research identifies the effective analysis factors that can
help the daily mobile application users to identify mobile risks
as well as a probable methodology to security audit mobile
software applications. The advancement in information
technology and applications has increased the access of
sensitive information such as International Mobile Equipment
Identity Number (IMEI) of device, credit and debit card
information, location information and login credentials thus the
need to secure vulnerable applications from authorized access.
Introduction
Mobile application expansion in various platforms is based
on functional and non-functional rations. Different types of
platforms exist to organize mobile applications with distinctive
private policies (Jing, Ahn, Zhao & Hu, 2014). This paper aims
at highlighting mobile application security for native apps such
as navigation programs and social media, for instance, Waze
and Twitter respectively, and the methodologies that help
reduce these security threats.
Analysis Blocks to Identify Mobile Risks
There are several risks identified by where frequent faults
are found and how they can be surfaced during an application
security auditing. These risks are associated with different
factors such as attack vectors, aggressive agents, weaknesses,
technical impact, and business impact. To demonstrate, weak
server-side controls regards the threats from a third-party
mechanism like extremity servers necessary for most mobile
applications (Jing, Ahn, Zhao & Hu, 2014). This threat includes
defenseless server arrangement, authentication errors, session
supervision flaw, and access control weaknesses. Further,
insecure data storage regards the possible risks created by
weaknesses on the data storage in the mobile device which can
lead to information leakage. Inadequate transport layer
protection recognizes assailability such as non-encrypted
transport layer communications, the application of susceptible
cryptographic algorithms and recognition of illegal credentials
(Zhang, Xu, Meng & Zheng, 2018). Unintentional data leakage
risk recognizes the unidentified probable vulnerabilities in the
data management by the operating system.
Poor authorization and verification identify risks linked
with undesirable authentication suppositions such as that only
authentic users can send requests to the system without extra
confirmation of the user or weak verification protocols. Broken
cryptography entails the inaccurate usage of the
encryption/decryption course or the use of susceptible
cryptographic algorithms while client-side injection collects the
threat of not authenticating user input credentials as well as
evading code injection (Zhang, Xu, Meng & Zheng, 2018).
Another block is security decisions through suspicious inputs
that carry together the threat linked with compliant of any form
of input source which usually happens in the case of Inter-
Process Communication (IPC) mechanisms (Jing, Ahn, Zhao &
Hu, 2014). Again, improper handling of the session may
accumulate the flaws that may lead to faults in handling user
sessions, whereas, absence of binary protection is recognized as
a threat using suspicious source sites to organize the mobile
application code.
Methods of securing mobile applications
Some of the ways through which users can ensure
their applications and sensitive data are secure are by using
strategies such as writing secure code. For instance, bugs and
faults in code are the first steps used by most attackers to break
into an application by reversing or engineering it (Zhang, Xu,
Meng & Zheng, 2018). Also, users need to design their code in
an easy way to update and patch as well as testing repeatedly
and fixing bugs when exposed. Data encryption is another way
mobile application user need to adapt to avoid access to
sensitive information such as emails (Skovoroda & Gamayunov,
2015). The use of authorized APIs can also reduce risks
associated with mobile applications. For instance, APIs that are
not endorsed and freely coded can involuntarily give hackers
rights that can be distorted seriously. Again, the use of high-
level authentication can reduce access to sensitive data and
cases of security breaches (Zhang, Xu, Meng & Zheng, 2018).
For instance, setting applications to only accept strong
alphanumeric passwords is essential and this needs to be
reviewed periodically after 3-6 months. A common instance is
the use of multi-factor verification which entails a combination
of static passwords and the use of changing OTP. The use of
temper-detection technologies will alert the user when the code
is tampered with while deploying proper session handling by the
use of tokens rather than device identifiers to recognize sessions
(Zhang, Xu, Meng & Zheng, 2018). Also, the use of effective
cryptography techniques and tools for the management of
mobile applications is essential in securing native apps.
Conclusion
Overall, mobile applications are facing risks that may be
identified and avoided only if users opt to adopt effective ways
of dealing with the faults. Proper handling sessions, the use of
best cryptography methods, high-level verification, and the use
of authorized APIs may help secure those apps effectively.
Thus, users need to take precautions before installing, using or
accessing servers using their mobile phones and developers
need to ensure these apps cannot be compromised once sold in
the future.
References
Jing, Y., Ahn, G. J., Zhao, Z., & Hu, H. (2014). Towards
automated risk assessment and mitigation of mobile
applications. IEEE Transactions on Dependable and Secure
Computing, 12(5), 571-584.
Skovoroda, A., & Gamayunov, D. (2015). Securing mobile
devices: malware mitigation methods. JoWUA, 6(2), 78-97.
Zhang, N., Xu, G., Meng, G., & Zheng, X. (2018, November).
So, Protector: Securing Native C/C++ Libraries for Mobile
Applications. In International Conference on Algorithms and
Architectures for Parallel Processing (pp. 417-431).
Springer, Cham.

More Related Content

Similar to Running head SECURING NATIVE APPLICATIONSSECURING NATIVE APPLIC.docx

An enhanced approach for securing mobile agents from
An enhanced approach for securing mobile agents fromAn enhanced approach for securing mobile agents from
An enhanced approach for securing mobile agents fromeSAT Publishing House
 
ENHANCING MOBILE LEARNING SECURITY
ENHANCING MOBILE LEARNING SECURITYENHANCING MOBILE LEARNING SECURITY
ENHANCING MOBILE LEARNING SECURITYIJITE
 
ENHANCING MOBILE LEARNING SECURITY
ENHANCING MOBILE LEARNING SECURITY ENHANCING MOBILE LEARNING SECURITY
ENHANCING MOBILE LEARNING SECURITY IJITE
 
Enhancing Mobile Learning Security
Enhancing Mobile Learning SecurityEnhancing Mobile Learning Security
Enhancing Mobile Learning SecurityIJITE
 
Mobile User Authentication Based On User Behavioral Pattern (MOUBE)
Mobile User Authentication Based On User Behavioral Pattern (MOUBE)Mobile User Authentication Based On User Behavioral Pattern (MOUBE)
Mobile User Authentication Based On User Behavioral Pattern (MOUBE)CSCJournals
 
Research Article On Web Application Security
Research Article On Web Application SecurityResearch Article On Web Application Security
Research Article On Web Application SecuritySaadSaif6
 
Adaptive Mobile Malware Detection Model Based on CBR
Adaptive Mobile Malware Detection Model Based on CBRAdaptive Mobile Malware Detection Model Based on CBR
Adaptive Mobile Malware Detection Model Based on CBRijtsrd
 
F-LOCKER: An Android Face Recognition Applocker Using Local Binary Pattern Hi...
F-LOCKER: An Android Face Recognition Applocker Using Local Binary Pattern Hi...F-LOCKER: An Android Face Recognition Applocker Using Local Binary Pattern Hi...
F-LOCKER: An Android Face Recognition Applocker Using Local Binary Pattern Hi...IJCSIS Research Publications
 
ANDROID & FIREBASE BASED ANTI THEFT MOBILE APPLICATION
ANDROID & FIREBASE BASED ANTI THEFT MOBILE APPLICATIONANDROID & FIREBASE BASED ANTI THEFT MOBILE APPLICATION
ANDROID & FIREBASE BASED ANTI THEFT MOBILE APPLICATIONIRJET Journal
 
Mobile SecurityKalyan BereKodapeComputer Security .docx
Mobile SecurityKalyan BereKodapeComputer Security .docxMobile SecurityKalyan BereKodapeComputer Security .docx
Mobile SecurityKalyan BereKodapeComputer Security .docxroushhsiu
 
Invesitigation of Malware and Forensic Tools on Internet
Invesitigation of Malware and Forensic Tools on Internet Invesitigation of Malware and Forensic Tools on Internet
Invesitigation of Malware and Forensic Tools on Internet IJECEIAES
 
Cloud Service Security using Two-factor or Multi factor Authentication
Cloud Service Security using Two-factor or Multi factor AuthenticationCloud Service Security using Two-factor or Multi factor Authentication
Cloud Service Security using Two-factor or Multi factor AuthenticationIRJET Journal
 
Mobile App Security How Bahrain Development Companies Ensure Protection.edite...
Mobile App Security How Bahrain Development Companies Ensure Protection.edite...Mobile App Security How Bahrain Development Companies Ensure Protection.edite...
Mobile App Security How Bahrain Development Companies Ensure Protection.edite...madhuri871014
 
Ea3212451252
Ea3212451252Ea3212451252
Ea3212451252IJMER
 
MOBILE DEVICES: THE CASE FOR CYBER SECURITY HARDENED SYSTEMS AND METHODS TO ...
MOBILE DEVICES: THE CASE FOR CYBER SECURITY HARDENED SYSTEMS AND METHODS TO ...MOBILE DEVICES: THE CASE FOR CYBER SECURITY HARDENED SYSTEMS AND METHODS TO ...
MOBILE DEVICES: THE CASE FOR CYBER SECURITY HARDENED SYSTEMS AND METHODS TO ...Maurice Dawson
 
Review on mobile threats and detection techniques
Review on mobile threats and detection techniquesReview on mobile threats and detection techniques
Review on mobile threats and detection techniquesijdpsjournal
 
PhD Thesis Writing Assistance - Manuscript
PhD Thesis Writing Assistance - ManuscriptPhD Thesis Writing Assistance - Manuscript
PhD Thesis Writing Assistance - Manuscriptkarishmakittu
 

Similar to Running head SECURING NATIVE APPLICATIONSSECURING NATIVE APPLIC.docx (20)

An enhanced approach for securing mobile agents from
An enhanced approach for securing mobile agents fromAn enhanced approach for securing mobile agents from
An enhanced approach for securing mobile agents from
 
ENHANCING MOBILE LEARNING SECURITY
ENHANCING MOBILE LEARNING SECURITYENHANCING MOBILE LEARNING SECURITY
ENHANCING MOBILE LEARNING SECURITY
 
ENHANCING MOBILE LEARNING SECURITY
ENHANCING MOBILE LEARNING SECURITY ENHANCING MOBILE LEARNING SECURITY
ENHANCING MOBILE LEARNING SECURITY
 
Enhancing Mobile Learning Security
Enhancing Mobile Learning SecurityEnhancing Mobile Learning Security
Enhancing Mobile Learning Security
 
Mobile Apps Security Testing -1
Mobile Apps Security Testing -1Mobile Apps Security Testing -1
Mobile Apps Security Testing -1
 
Mobile User Authentication Based On User Behavioral Pattern (MOUBE)
Mobile User Authentication Based On User Behavioral Pattern (MOUBE)Mobile User Authentication Based On User Behavioral Pattern (MOUBE)
Mobile User Authentication Based On User Behavioral Pattern (MOUBE)
 
Research Article On Web Application Security
Research Article On Web Application SecurityResearch Article On Web Application Security
Research Article On Web Application Security
 
Mobile Application Penetration Testing Senselearner .pdf
Mobile Application Penetration Testing Senselearner .pdfMobile Application Penetration Testing Senselearner .pdf
Mobile Application Penetration Testing Senselearner .pdf
 
Mobile Application Security
Mobile Application Security Mobile Application Security
Mobile Application Security
 
Adaptive Mobile Malware Detection Model Based on CBR
Adaptive Mobile Malware Detection Model Based on CBRAdaptive Mobile Malware Detection Model Based on CBR
Adaptive Mobile Malware Detection Model Based on CBR
 
F-LOCKER: An Android Face Recognition Applocker Using Local Binary Pattern Hi...
F-LOCKER: An Android Face Recognition Applocker Using Local Binary Pattern Hi...F-LOCKER: An Android Face Recognition Applocker Using Local Binary Pattern Hi...
F-LOCKER: An Android Face Recognition Applocker Using Local Binary Pattern Hi...
 
ANDROID & FIREBASE BASED ANTI THEFT MOBILE APPLICATION
ANDROID & FIREBASE BASED ANTI THEFT MOBILE APPLICATIONANDROID & FIREBASE BASED ANTI THEFT MOBILE APPLICATION
ANDROID & FIREBASE BASED ANTI THEFT MOBILE APPLICATION
 
Mobile SecurityKalyan BereKodapeComputer Security .docx
Mobile SecurityKalyan BereKodapeComputer Security .docxMobile SecurityKalyan BereKodapeComputer Security .docx
Mobile SecurityKalyan BereKodapeComputer Security .docx
 
Invesitigation of Malware and Forensic Tools on Internet
Invesitigation of Malware and Forensic Tools on Internet Invesitigation of Malware and Forensic Tools on Internet
Invesitigation of Malware and Forensic Tools on Internet
 
Cloud Service Security using Two-factor or Multi factor Authentication
Cloud Service Security using Two-factor or Multi factor AuthenticationCloud Service Security using Two-factor or Multi factor Authentication
Cloud Service Security using Two-factor or Multi factor Authentication
 
Mobile App Security How Bahrain Development Companies Ensure Protection.edite...
Mobile App Security How Bahrain Development Companies Ensure Protection.edite...Mobile App Security How Bahrain Development Companies Ensure Protection.edite...
Mobile App Security How Bahrain Development Companies Ensure Protection.edite...
 
Ea3212451252
Ea3212451252Ea3212451252
Ea3212451252
 
MOBILE DEVICES: THE CASE FOR CYBER SECURITY HARDENED SYSTEMS AND METHODS TO ...
MOBILE DEVICES: THE CASE FOR CYBER SECURITY HARDENED SYSTEMS AND METHODS TO ...MOBILE DEVICES: THE CASE FOR CYBER SECURITY HARDENED SYSTEMS AND METHODS TO ...
MOBILE DEVICES: THE CASE FOR CYBER SECURITY HARDENED SYSTEMS AND METHODS TO ...
 
Review on mobile threats and detection techniques
Review on mobile threats and detection techniquesReview on mobile threats and detection techniques
Review on mobile threats and detection techniques
 
PhD Thesis Writing Assistance - Manuscript
PhD Thesis Writing Assistance - ManuscriptPhD Thesis Writing Assistance - Manuscript
PhD Thesis Writing Assistance - Manuscript
 

More from jeanettehully

250-500  words APA format cite references  Check this scenario out.docx
250-500  words APA format cite references  Check this scenario out.docx250-500  words APA format cite references  Check this scenario out.docx
250-500  words APA format cite references  Check this scenario out.docxjeanettehully
 
2 DQ’s need to be answers with Zero plagiarism and 250 word count fo.docx
2 DQ’s need to be answers with Zero plagiarism and 250 word count fo.docx2 DQ’s need to be answers with Zero plagiarism and 250 word count fo.docx
2 DQ’s need to be answers with Zero plagiarism and 250 word count fo.docxjeanettehully
 
270w3Respond to the followingStress can be the root cause of ps.docx
270w3Respond to the followingStress can be the root cause of ps.docx270w3Respond to the followingStress can be the root cause of ps.docx
270w3Respond to the followingStress can be the root cause of ps.docxjeanettehully
 
250 word response. Chicago Style citingAccording to Kluver, what.docx
250 word response. Chicago Style citingAccording to Kluver, what.docx250 word response. Chicago Style citingAccording to Kluver, what.docx
250 word response. Chicago Style citingAccording to Kluver, what.docxjeanettehully
 
250+ Words – Strategic Intelligence CollectionChoose one of th.docx
250+ Words – Strategic Intelligence CollectionChoose one of th.docx250+ Words – Strategic Intelligence CollectionChoose one of th.docx
250+ Words – Strategic Intelligence CollectionChoose one of th.docxjeanettehully
 
2–3 pages; APA formatDetailsThere are several steps to take w.docx
2–3 pages; APA formatDetailsThere are several steps to take w.docx2–3 pages; APA formatDetailsThere are several steps to take w.docx
2–3 pages; APA formatDetailsThere are several steps to take w.docxjeanettehully
 
2LeadershipEighth Edition3To Madison.docx
2LeadershipEighth Edition3To Madison.docx2LeadershipEighth Edition3To Madison.docx
2LeadershipEighth Edition3To Madison.docxjeanettehully
 
250 Word Resoponse. Chicago Style Citing.According to Kluver, .docx
250 Word Resoponse. Chicago Style Citing.According to Kluver, .docx250 Word Resoponse. Chicago Style Citing.According to Kluver, .docx
250 Word Resoponse. Chicago Style Citing.According to Kluver, .docxjeanettehully
 
250 word mini essay question.Textbook is Getlein, Mark. Living wi.docx
250 word mini essay question.Textbook is Getlein, Mark. Living wi.docx250 word mini essay question.Textbook is Getlein, Mark. Living wi.docx
250 word mini essay question.Textbook is Getlein, Mark. Living wi.docxjeanettehully
 
250 word discussion post--today please. Make sure you put in the dq .docx
250 word discussion post--today please. Make sure you put in the dq .docx250 word discussion post--today please. Make sure you put in the dq .docx
250 word discussion post--today please. Make sure you put in the dq .docxjeanettehully
 
2By 2015, projections indicate that the largest category of househ.docx
2By 2015, projections indicate that the largest category of househ.docx2By 2015, projections indicate that the largest category of househ.docx
2By 2015, projections indicate that the largest category of househ.docxjeanettehully
 
29Answer[removed] That is the house whe.docx
29Answer[removed]                    That is the house whe.docx29Answer[removed]                    That is the house whe.docx
29Answer[removed] That is the house whe.docxjeanettehully
 
250 words discussion not an assignementThe purpose of this discuss.docx
250 words discussion not an assignementThe purpose of this discuss.docx250 words discussion not an assignementThe purpose of this discuss.docx
250 words discussion not an assignementThe purpose of this discuss.docxjeanettehully
 
25. For each of the transactions listed below, indicate whether it.docx
25.   For each of the transactions listed below, indicate whether it.docx25.   For each of the transactions listed below, indicate whether it.docx
25. For each of the transactions listed below, indicate whether it.docxjeanettehully
 
250-word minimum. Must use textbook Jandt, Fred E. (editor) Intercu.docx
250-word minimum. Must use textbook Jandt, Fred E. (editor) Intercu.docx250-word minimum. Must use textbook Jandt, Fred E. (editor) Intercu.docx
250-word minimum. Must use textbook Jandt, Fred E. (editor) Intercu.docxjeanettehully
 
250-500  words APA format cite references  Check this scenario o.docx
250-500  words APA format cite references  Check this scenario o.docx250-500  words APA format cite references  Check this scenario o.docx
250-500  words APA format cite references  Check this scenario o.docxjeanettehully
 
250+ Words – Insider Threat Analysis Penetration AnalysisCho.docx
250+ Words – Insider Threat Analysis  Penetration AnalysisCho.docx250+ Words – Insider Threat Analysis  Penetration AnalysisCho.docx
250+ Words – Insider Threat Analysis Penetration AnalysisCho.docxjeanettehully
 
250 wordsUsing the same company (Bank of America) that you have .docx
250 wordsUsing the same company (Bank of America) that you have .docx250 wordsUsing the same company (Bank of America) that you have .docx
250 wordsUsing the same company (Bank of America) that you have .docxjeanettehully
 
250 mini essay questiontextbook Getlein, Mark. Living with Art, 9.docx
250 mini essay questiontextbook Getlein, Mark. Living with Art, 9.docx250 mini essay questiontextbook Getlein, Mark. Living with Art, 9.docx
250 mini essay questiontextbook Getlein, Mark. Living with Art, 9.docxjeanettehully
 
22.¿Saber o conocer…   With a partner, tell what thes.docx
22.¿Saber o conocer…   With a partner, tell what thes.docx22.¿Saber o conocer…   With a partner, tell what thes.docx
22.¿Saber o conocer…   With a partner, tell what thes.docxjeanettehully
 

More from jeanettehully (20)

250-500  words APA format cite references  Check this scenario out.docx
250-500  words APA format cite references  Check this scenario out.docx250-500  words APA format cite references  Check this scenario out.docx
250-500  words APA format cite references  Check this scenario out.docx
 
2 DQ’s need to be answers with Zero plagiarism and 250 word count fo.docx
2 DQ’s need to be answers with Zero plagiarism and 250 word count fo.docx2 DQ’s need to be answers with Zero plagiarism and 250 word count fo.docx
2 DQ’s need to be answers with Zero plagiarism and 250 word count fo.docx
 
270w3Respond to the followingStress can be the root cause of ps.docx
270w3Respond to the followingStress can be the root cause of ps.docx270w3Respond to the followingStress can be the root cause of ps.docx
270w3Respond to the followingStress can be the root cause of ps.docx
 
250 word response. Chicago Style citingAccording to Kluver, what.docx
250 word response. Chicago Style citingAccording to Kluver, what.docx250 word response. Chicago Style citingAccording to Kluver, what.docx
250 word response. Chicago Style citingAccording to Kluver, what.docx
 
250+ Words – Strategic Intelligence CollectionChoose one of th.docx
250+ Words – Strategic Intelligence CollectionChoose one of th.docx250+ Words – Strategic Intelligence CollectionChoose one of th.docx
250+ Words – Strategic Intelligence CollectionChoose one of th.docx
 
2–3 pages; APA formatDetailsThere are several steps to take w.docx
2–3 pages; APA formatDetailsThere are several steps to take w.docx2–3 pages; APA formatDetailsThere are several steps to take w.docx
2–3 pages; APA formatDetailsThere are several steps to take w.docx
 
2LeadershipEighth Edition3To Madison.docx
2LeadershipEighth Edition3To Madison.docx2LeadershipEighth Edition3To Madison.docx
2LeadershipEighth Edition3To Madison.docx
 
250 Word Resoponse. Chicago Style Citing.According to Kluver, .docx
250 Word Resoponse. Chicago Style Citing.According to Kluver, .docx250 Word Resoponse. Chicago Style Citing.According to Kluver, .docx
250 Word Resoponse. Chicago Style Citing.According to Kluver, .docx
 
250 word mini essay question.Textbook is Getlein, Mark. Living wi.docx
250 word mini essay question.Textbook is Getlein, Mark. Living wi.docx250 word mini essay question.Textbook is Getlein, Mark. Living wi.docx
250 word mini essay question.Textbook is Getlein, Mark. Living wi.docx
 
250 word discussion post--today please. Make sure you put in the dq .docx
250 word discussion post--today please. Make sure you put in the dq .docx250 word discussion post--today please. Make sure you put in the dq .docx
250 word discussion post--today please. Make sure you put in the dq .docx
 
2By 2015, projections indicate that the largest category of househ.docx
2By 2015, projections indicate that the largest category of househ.docx2By 2015, projections indicate that the largest category of househ.docx
2By 2015, projections indicate that the largest category of househ.docx
 
29Answer[removed] That is the house whe.docx
29Answer[removed]                    That is the house whe.docx29Answer[removed]                    That is the house whe.docx
29Answer[removed] That is the house whe.docx
 
250 words discussion not an assignementThe purpose of this discuss.docx
250 words discussion not an assignementThe purpose of this discuss.docx250 words discussion not an assignementThe purpose of this discuss.docx
250 words discussion not an assignementThe purpose of this discuss.docx
 
25. For each of the transactions listed below, indicate whether it.docx
25.   For each of the transactions listed below, indicate whether it.docx25.   For each of the transactions listed below, indicate whether it.docx
25. For each of the transactions listed below, indicate whether it.docx
 
250-word minimum. Must use textbook Jandt, Fred E. (editor) Intercu.docx
250-word minimum. Must use textbook Jandt, Fred E. (editor) Intercu.docx250-word minimum. Must use textbook Jandt, Fred E. (editor) Intercu.docx
250-word minimum. Must use textbook Jandt, Fred E. (editor) Intercu.docx
 
250-500  words APA format cite references  Check this scenario o.docx
250-500  words APA format cite references  Check this scenario o.docx250-500  words APA format cite references  Check this scenario o.docx
250-500  words APA format cite references  Check this scenario o.docx
 
250+ Words – Insider Threat Analysis Penetration AnalysisCho.docx
250+ Words – Insider Threat Analysis  Penetration AnalysisCho.docx250+ Words – Insider Threat Analysis  Penetration AnalysisCho.docx
250+ Words – Insider Threat Analysis Penetration AnalysisCho.docx
 
250 wordsUsing the same company (Bank of America) that you have .docx
250 wordsUsing the same company (Bank of America) that you have .docx250 wordsUsing the same company (Bank of America) that you have .docx
250 wordsUsing the same company (Bank of America) that you have .docx
 
250 mini essay questiontextbook Getlein, Mark. Living with Art, 9.docx
250 mini essay questiontextbook Getlein, Mark. Living with Art, 9.docx250 mini essay questiontextbook Getlein, Mark. Living with Art, 9.docx
250 mini essay questiontextbook Getlein, Mark. Living with Art, 9.docx
 
22.¿Saber o conocer…   With a partner, tell what thes.docx
22.¿Saber o conocer…   With a partner, tell what thes.docx22.¿Saber o conocer…   With a partner, tell what thes.docx
22.¿Saber o conocer…   With a partner, tell what thes.docx
 

Recently uploaded

Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...RKavithamani
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 

Recently uploaded (20)

Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 

Running head SECURING NATIVE APPLICATIONSSECURING NATIVE APPLIC.docx

  • 1. Running head: SECURING NATIVE APPLICATIONS SECURING NATIVE APPLICATIONS 6 Securing Native Applications Name: Course: Institution: Date: Abstract This paper aims at discovering the methods of securing native mobile applications and the probable threats they can experience in the advancing world of technology. Any kind of software, ranging from desktop to mobile applications, is believed to have defects that can lead to susceptibilities. These weaknesses, when subjugated, may bring in threat to the integrity, privacy, and accessibility of the software. However, various security auditing strategies might aid to minimize at a
  • 2. specific degree the level of confidence these risks have. With the outburst of mobile applications for day to day activities such as checking email, social networks, news, managing bank accounts, ensuring a satisfactory level of application security becomes essential for the usage and reliance of mobile services. This research identifies the effective analysis factors that can help the daily mobile application users to identify mobile risks as well as a probable methodology to security audit mobile software applications. The advancement in information technology and applications has increased the access of sensitive information such as International Mobile Equipment Identity Number (IMEI) of device, credit and debit card information, location information and login credentials thus the need to secure vulnerable applications from authorized access. Introduction Mobile application expansion in various platforms is based on functional and non-functional rations. Different types of platforms exist to organize mobile applications with distinctive private policies (Jing, Ahn, Zhao & Hu, 2014). This paper aims at highlighting mobile application security for native apps such as navigation programs and social media, for instance, Waze and Twitter respectively, and the methodologies that help reduce these security threats. Analysis Blocks to Identify Mobile Risks There are several risks identified by where frequent faults are found and how they can be surfaced during an application security auditing. These risks are associated with different factors such as attack vectors, aggressive agents, weaknesses, technical impact, and business impact. To demonstrate, weak
  • 3. server-side controls regards the threats from a third-party mechanism like extremity servers necessary for most mobile applications (Jing, Ahn, Zhao & Hu, 2014). This threat includes defenseless server arrangement, authentication errors, session supervision flaw, and access control weaknesses. Further, insecure data storage regards the possible risks created by weaknesses on the data storage in the mobile device which can lead to information leakage. Inadequate transport layer protection recognizes assailability such as non-encrypted transport layer communications, the application of susceptible cryptographic algorithms and recognition of illegal credentials (Zhang, Xu, Meng & Zheng, 2018). Unintentional data leakage risk recognizes the unidentified probable vulnerabilities in the data management by the operating system. Poor authorization and verification identify risks linked with undesirable authentication suppositions such as that only authentic users can send requests to the system without extra confirmation of the user or weak verification protocols. Broken cryptography entails the inaccurate usage of the encryption/decryption course or the use of susceptible cryptographic algorithms while client-side injection collects the threat of not authenticating user input credentials as well as evading code injection (Zhang, Xu, Meng & Zheng, 2018). Another block is security decisions through suspicious inputs that carry together the threat linked with compliant of any form of input source which usually happens in the case of Inter- Process Communication (IPC) mechanisms (Jing, Ahn, Zhao & Hu, 2014). Again, improper handling of the session may accumulate the flaws that may lead to faults in handling user sessions, whereas, absence of binary protection is recognized as a threat using suspicious source sites to organize the mobile application code. Methods of securing mobile applications Some of the ways through which users can ensure their applications and sensitive data are secure are by using strategies such as writing secure code. For instance, bugs and
  • 4. faults in code are the first steps used by most attackers to break into an application by reversing or engineering it (Zhang, Xu, Meng & Zheng, 2018). Also, users need to design their code in an easy way to update and patch as well as testing repeatedly and fixing bugs when exposed. Data encryption is another way mobile application user need to adapt to avoid access to sensitive information such as emails (Skovoroda & Gamayunov, 2015). The use of authorized APIs can also reduce risks associated with mobile applications. For instance, APIs that are not endorsed and freely coded can involuntarily give hackers rights that can be distorted seriously. Again, the use of high- level authentication can reduce access to sensitive data and cases of security breaches (Zhang, Xu, Meng & Zheng, 2018). For instance, setting applications to only accept strong alphanumeric passwords is essential and this needs to be reviewed periodically after 3-6 months. A common instance is the use of multi-factor verification which entails a combination of static passwords and the use of changing OTP. The use of temper-detection technologies will alert the user when the code is tampered with while deploying proper session handling by the use of tokens rather than device identifiers to recognize sessions (Zhang, Xu, Meng & Zheng, 2018). Also, the use of effective cryptography techniques and tools for the management of mobile applications is essential in securing native apps. Conclusion Overall, mobile applications are facing risks that may be identified and avoided only if users opt to adopt effective ways of dealing with the faults. Proper handling sessions, the use of best cryptography methods, high-level verification, and the use of authorized APIs may help secure those apps effectively. Thus, users need to take precautions before installing, using or accessing servers using their mobile phones and developers need to ensure these apps cannot be compromised once sold in the future.
  • 5. References Jing, Y., Ahn, G. J., Zhao, Z., & Hu, H. (2014). Towards automated risk assessment and mitigation of mobile applications. IEEE Transactions on Dependable and Secure Computing, 12(5), 571-584. Skovoroda, A., & Gamayunov, D. (2015). Securing mobile devices: malware mitigation methods. JoWUA, 6(2), 78-97. Zhang, N., Xu, G., Meng, G., & Zheng, X. (2018, November). So, Protector: Securing Native C/C++ Libraries for Mobile Applications. In International Conference on Algorithms and Architectures for Parallel Processing (pp. 417-431). Springer, Cham.