What is mobileapplication security ?
Mobile application security is critical in protecting user data and maintaining trust.
Mobile application security refers to the measures and practices designed to protect mobile
applications from threats, vulnerabilities, and attacks.
This involves ensuring that the app, its data, and the user’s information remain secure throughout
the app's lifecycle.
With the increasing reliance on mobile apps for personal and business activities, ensuring mobile
application security is crucial for protecting user data, maintaining trust, and complying with regulations .
By implementing robust security practices, developers can reduce the risk of attacks and enhance the
overall security of mobile applications.
2.
Top Issues FacingMobile Devices
●
Physical Security
●
Secure Data Storage (on Disk)
●
Strong Authentication with Poor Keyboards
●
Multiple-User Support with Security
●
Safe Browsing Environment
●
Secure Operating Systems
●
Application Isolation
●
Information Disclosure
●
Virus, Worms, Trojans, Spyware, and Malware
●
Difficult Patching/Update Process
Physical Security
●
Loss ofinformation from lost or stolen devices
●
Unauthorized usage by borrower
●
Physical security has always meant little-to-no security
5.
Secure Data Storage(on Disk )
●
Sensitive information stored locally (password files, tokens, etc.) Prevent unauthorized
access while making it accessible to certain applications on an as needed basis .
6.
Strong Authentication withPoor Keywords
●
Even if a strong authentication method is used, poor keywords can still compromise security.
●
Issues with Poor Keywords
●
Weak Passwords: Common passwords (like "123456" ) are easy to guess.
●
Reused Passwords: Using the same password across multiple sites increases risk; if one site is
compromised, others are vulnerable.
●
Lack of Complexity: Passwords lacking numbers, symbols, or mixed cases can be easily cracked using
brute force methods.
7.
Multiple-User Support withSecurity
●
Unlike traditional client operating systems that support multiple users with different
operating environments, no such thing as logging into a mobile device as a separate
user.
●
No distinction between applications for business purpose vs. personal
●
Need unique security model by application to prevent data exposure
8.
Safe Browsing Environment
●
Lackof real estate makes phishing attempts easier
●
Inability to view the entire URL or the URL at all
●
Links are followed a lot more on mobile devices
9.
Secure Operating Systems
●
Securingan OS is no easy task but should still be undertaken by all mobile
vendors
●
Security often correlates to data loss but can also correlate to system
downtime and diminished user experience
10.
Application Isolation
●
Very commonto see various types of applications (corporate, gaming, social,
etc) on a mobile device .
●
Ability to isolate these applications and the data they require is critical
11.
Information Disclosure
Data storedon a device (desktop, laptop, server, mobile) is worth more than the device
itself, however, mobile device more likely to be lost or stolen
Types of Information Disclosure
1. Unintentional Disclosure
Accidental sharing of sensitive data through misconfigured systems, poor access controls, or human error
2. Intentional Disclosure
When information is deliberately shared, often for legitimate reasons, but can lead to security risks if not
handled properly.
3. Third-Party Exposure
Information can be leaked through third-party services or vendors, often due to inadequate security
measures on their part.
12.
Virus, Worms, Trojans,Spyware, and Malware
●
Mobile devices also face threat of viruses, worms, Trojans, spyware, and
malware
13.
Difficult Patching/Update Process
●
Thepatching and update process is critical for maintaining the security and
functionality of software systems, but it can often be challenging.
14.
Phishing
●
Users more proneto clicking links on mobile without safety concerns.
●
Phishing is a form of cyberattack that involves tricking individuals into revealing
sensitive information, such as usernames, passwords, credit card numbers, or
other personal data.
●
Types of Phishing
●
Email Phishing : The most common form, using email to lure victims.
●
SMS Phishing (Smishing) : Uses text messages to trick users into revealing personal
information.
●
Voice Phishing (Vishing) : Involves phone calls where attackers pose as legitimate
entities to extract sensitive data.
15.
Cross-Site Request Forgery(CSRF)
●
Big problem for mobile HTML sites that are vulnerable
●
Easy to get victims to click on links due to previously mentioned factors
●
Allows attacker to update a victim's information (address, email, password, etc)
on a vulnerable application.
16.
Location Privacy/Security
●
Most mobileusers have assumed their location privacy was lost as soon as
they started carrying a mobile device .
●
Users willingly give away their location-specific information through
applications like Google Latitude, Foursquare etc.
17.
Insecure Device Drivers
●
Mostapplications should not have system access to mobile device but
device drivers need such access