What is mobile application security ?
Mobile application security is critical in protecting user data and maintaining trust.
Mobile application security refers to the measures and practices designed to protect mobile
applications from threats, vulnerabilities, and attacks.
This involves ensuring that the app, its data, and the user’s information remain secure throughout
the app's lifecycle.
With the increasing reliance on mobile apps for personal and business activities, ensuring mobile
application security is crucial for protecting user data, maintaining trust, and complying with regulations .
By implementing robust security practices, developers can reduce the risk of attacks and enhance the
overall security of mobile applications.
Top Issues Facing Mobile Devices
●
Physical Security
●
Secure Data Storage (on Disk)
●
Strong Authentication with Poor Keyboards
●
Multiple-User Support with Security
●
Safe Browsing Environment
●
Secure Operating Systems
●
Application Isolation
●
Information Disclosure
●
Virus, Worms, Trojans, Spyware, and Malware
●
Difficult Patching/Update Process
Top Issues Facing Mobile Devices
●
Phishing
●
Cross-Site Request Forgery (CSRF)
●
Location Privacy/Security
●
Insecure Device Drivers
●
Connectivity Issues
Physical Security
●
Loss of information from lost or stolen devices
●
Unauthorized usage by borrower
●
Physical security has always meant little-to-no security
Secure Data Storage (on Disk )
●
Sensitive information stored locally (password files, tokens, etc.) Prevent unauthorized
access while making it accessible to certain applications on an as needed basis .
Strong Authentication with Poor Keywords
●
Even if a strong authentication method is used, poor keywords can still compromise security.
●
Issues with Poor Keywords
●
Weak Passwords: Common passwords (like "123456" ) are easy to guess.
●
Reused Passwords: Using the same password across multiple sites increases risk; if one site is
compromised, others are vulnerable.
●
Lack of Complexity: Passwords lacking numbers, symbols, or mixed cases can be easily cracked using
brute force methods.
Multiple-User Support with Security
●
Unlike traditional client operating systems that support multiple users with different
operating environments, no such thing as logging into a mobile device as a separate
user.
●
No distinction between applications for business purpose vs. personal
●
Need unique security model by application to prevent data exposure
Safe Browsing Environment
●
Lack of real estate makes phishing attempts easier
●
Inability to view the entire URL or the URL at all
●
Links are followed a lot more on mobile devices
Secure Operating Systems
●
Securing an OS is no easy task but should still be undertaken by all mobile
vendors
●
Security often correlates to data loss but can also correlate to system
downtime and diminished user experience
Application Isolation
●
Very common to see various types of applications (corporate, gaming, social,
etc) on a mobile device .
●
Ability to isolate these applications and the data they require is critical
Information Disclosure
Data stored on a device (desktop, laptop, server, mobile) is worth more than the device
itself, however, mobile device more likely to be lost or stolen
Types of Information Disclosure
1. Unintentional Disclosure
Accidental sharing of sensitive data through misconfigured systems, poor access controls, or human error
2. Intentional Disclosure
When information is deliberately shared, often for legitimate reasons, but can lead to security risks if not
handled properly.
3. Third-Party Exposure
Information can be leaked through third-party services or vendors, often due to inadequate security
measures on their part.
Virus, Worms, Trojans, Spyware, and Malware
●
Mobile devices also face threat of viruses, worms, Trojans, spyware, and
malware
Difficult Patching/Update Process
●
The patching and update process is critical for maintaining the security and
functionality of software systems, but it can often be challenging.
Phishing
●
Users more prone to clicking links on mobile without safety concerns.
●
Phishing is a form of cyberattack that involves tricking individuals into revealing
sensitive information, such as usernames, passwords, credit card numbers, or
other personal data.
●
Types of Phishing
●
Email Phishing : The most common form, using email to lure victims.
●
SMS Phishing (Smishing) : Uses text messages to trick users into revealing personal
information.
●
Voice Phishing (Vishing) : Involves phone calls where attackers pose as legitimate
entities to extract sensitive data.
Cross-Site Request Forgery (CSRF)
●
Big problem for mobile HTML sites that are vulnerable
●
Easy to get victims to click on links due to previously mentioned factors
●
Allows attacker to update a victim's information (address, email, password, etc)
on a vulnerable application.
Location Privacy/Security
●
Most mobile users have assumed their location privacy was lost as soon as
they started carrying a mobile device .
●
Users willingly give away their location-specific information through
applications like Google Latitude, Foursquare etc.
Insecure Device Drivers
●
Most applications should not have system access to mobile device but
device drivers need such access
Connectivity Issues:
●
Network reliability and speed can vary widely, affecting user experience,
especially in rural areas.
Mobile app Unit 1 best notes for students .ppt
Mobile app Unit 1 best notes for students .ppt
Mobile app Unit 1 best notes for students .ppt
Mobile app Unit 1 best notes for students .ppt
Mobile app Unit 1 best notes for students .ppt
Mobile app Unit 1 best notes for students .ppt
Mobile app Unit 1 best notes for students .ppt
Mobile app Unit 1 best notes for students .ppt
Mobile app Unit 1 best notes for students .ppt
Mobile app Unit 1 best notes for students .ppt

Mobile app Unit 1 best notes for students .ppt

  • 1.
    What is mobileapplication security ? Mobile application security is critical in protecting user data and maintaining trust. Mobile application security refers to the measures and practices designed to protect mobile applications from threats, vulnerabilities, and attacks. This involves ensuring that the app, its data, and the user’s information remain secure throughout the app's lifecycle. With the increasing reliance on mobile apps for personal and business activities, ensuring mobile application security is crucial for protecting user data, maintaining trust, and complying with regulations . By implementing robust security practices, developers can reduce the risk of attacks and enhance the overall security of mobile applications.
  • 2.
    Top Issues FacingMobile Devices ● Physical Security ● Secure Data Storage (on Disk) ● Strong Authentication with Poor Keyboards ● Multiple-User Support with Security ● Safe Browsing Environment ● Secure Operating Systems ● Application Isolation ● Information Disclosure ● Virus, Worms, Trojans, Spyware, and Malware ● Difficult Patching/Update Process
  • 3.
    Top Issues FacingMobile Devices ● Phishing ● Cross-Site Request Forgery (CSRF) ● Location Privacy/Security ● Insecure Device Drivers ● Connectivity Issues
  • 4.
    Physical Security ● Loss ofinformation from lost or stolen devices ● Unauthorized usage by borrower ● Physical security has always meant little-to-no security
  • 5.
    Secure Data Storage(on Disk ) ● Sensitive information stored locally (password files, tokens, etc.) Prevent unauthorized access while making it accessible to certain applications on an as needed basis .
  • 6.
    Strong Authentication withPoor Keywords ● Even if a strong authentication method is used, poor keywords can still compromise security. ● Issues with Poor Keywords ● Weak Passwords: Common passwords (like "123456" ) are easy to guess. ● Reused Passwords: Using the same password across multiple sites increases risk; if one site is compromised, others are vulnerable. ● Lack of Complexity: Passwords lacking numbers, symbols, or mixed cases can be easily cracked using brute force methods.
  • 7.
    Multiple-User Support withSecurity ● Unlike traditional client operating systems that support multiple users with different operating environments, no such thing as logging into a mobile device as a separate user. ● No distinction between applications for business purpose vs. personal ● Need unique security model by application to prevent data exposure
  • 8.
    Safe Browsing Environment ● Lackof real estate makes phishing attempts easier ● Inability to view the entire URL or the URL at all ● Links are followed a lot more on mobile devices
  • 9.
    Secure Operating Systems ● Securingan OS is no easy task but should still be undertaken by all mobile vendors ● Security often correlates to data loss but can also correlate to system downtime and diminished user experience
  • 10.
    Application Isolation ● Very commonto see various types of applications (corporate, gaming, social, etc) on a mobile device . ● Ability to isolate these applications and the data they require is critical
  • 11.
    Information Disclosure Data storedon a device (desktop, laptop, server, mobile) is worth more than the device itself, however, mobile device more likely to be lost or stolen Types of Information Disclosure 1. Unintentional Disclosure Accidental sharing of sensitive data through misconfigured systems, poor access controls, or human error 2. Intentional Disclosure When information is deliberately shared, often for legitimate reasons, but can lead to security risks if not handled properly. 3. Third-Party Exposure Information can be leaked through third-party services or vendors, often due to inadequate security measures on their part.
  • 12.
    Virus, Worms, Trojans,Spyware, and Malware ● Mobile devices also face threat of viruses, worms, Trojans, spyware, and malware
  • 13.
    Difficult Patching/Update Process ● Thepatching and update process is critical for maintaining the security and functionality of software systems, but it can often be challenging.
  • 14.
    Phishing ● Users more proneto clicking links on mobile without safety concerns. ● Phishing is a form of cyberattack that involves tricking individuals into revealing sensitive information, such as usernames, passwords, credit card numbers, or other personal data. ● Types of Phishing ● Email Phishing : The most common form, using email to lure victims. ● SMS Phishing (Smishing) : Uses text messages to trick users into revealing personal information. ● Voice Phishing (Vishing) : Involves phone calls where attackers pose as legitimate entities to extract sensitive data.
  • 15.
    Cross-Site Request Forgery(CSRF) ● Big problem for mobile HTML sites that are vulnerable ● Easy to get victims to click on links due to previously mentioned factors ● Allows attacker to update a victim's information (address, email, password, etc) on a vulnerable application.
  • 16.
    Location Privacy/Security ● Most mobileusers have assumed their location privacy was lost as soon as they started carrying a mobile device . ● Users willingly give away their location-specific information through applications like Google Latitude, Foursquare etc.
  • 17.
    Insecure Device Drivers ● Mostapplications should not have system access to mobile device but device drivers need such access
  • 18.
    Connectivity Issues: ● Network reliabilityand speed can vary widely, affecting user experience, especially in rural areas.