Question

In: Computer Science

Outline the major security issues related to mobile application technologies and Develop a policy and procedure...

Outline the major security issues related to mobile application technologies and Develop a policy and procedure for one of the major security issues you outlined

Solutions

Expert Solution

The following are the major security issues to the mobile application.

1. Weak control from server side:

The communication or exchange of information is happening between the smartphone and the user externally through severs. So, it becomes a primary target which gets exploited by hackers.

Precautions: make sure to have efficient server side security that can be achieved by hiring a specialist of security expert or by using the simple testing tool and also by taking some general precautions. This issues arrises when the developers do not give importance to traditional server side security while development.

Some of the usual reasons are:

* Low security budgets

*No or few security knowledge in a new language

* More dependancy on the mobile OS for updates on security .

* Cross- platform development vulnerabilities and complications

The most efficient and easiest step to secure your mobile apps from server side vulnerabilities is by scanning. You need to scan the apps through automated scanner. So which brings out the issues which can be solved with little effort. It is most vital because the hackers uses the same to exploit they can easily used to hack your application. For advanced security you need to hire cyber security experts who will guide you through the procedure.

2. Absence of Binary protections.

Due to the unavailability of binary protection, a hacker can perfom re-engineering the code of the application to inject malware or redistributed the pirated application with a threat. It can result in theft of confidential data, brand and trust damage, revenue losses, frauds and many more.

To avoid these problems a binary hardening methods to be used. The protection against the common exploits can be made by analysing and modifying the binary files using binary hardening methods. In addition to that it allows in resolving vulnerabilities in the legacy code instead of the need of source code. The apps must follow secure coding techniques for jailbreak detection controls, checksum error control, certificate pinning controls and debugger detection controls.

3. Data storage insecurity.

4.lack of sufficient protection to transport layer

5.unintended data leakages

6. Poor authentication and authorisation

7. Broken of Cryptography

8.injection on client side

9.untrusted inputs breaches secuity decisions.

10. Poor management of Session handling


Related Solutions

You want to create your own mobile security policy. Provide an outline and, for each item...
You want to create your own mobile security policy. Provide an outline and, for each item in your outline, explain what you would write about in two to three sentences. The outline needs to include at least four topics to be covered in your mobile security policy.
Mobile Application Security What is the basic purpose of this technology? In what types of mobile...
Mobile Application Security What is the basic purpose of this technology? In what types of mobile applications can this technology be effectively used and why? What are the pros and cons of this technology? Are there any other important aspects of this technology that should be provided?
University wants to develop a Mobile Application for the University’s website along with all the features...
University wants to develop a Mobile Application for the University’s website along with all the features for e-learning in its innovative First Year Model. This will allow students to access their e-mails, lecture notes, in/after-class activities and many other features. The university wants to launch this App in January 2019. You have just completed your Bachelor’s studies and got an opportunity to prove yourself competent to work for the University’s Project Management Office along with three other new-comers. As a...
Develop a summary which outline and explains all the rules and guidelines associated with the procedure...
Develop a summary which outline and explains all the rules and guidelines associated with the procedure surgical device Pacemaker-Leadless and Pocket less System
find articles that deal with application or mobile device security and those types of attacks. You...
find articles that deal with application or mobile device security and those types of attacks. You should have a large depository of these kinds of articles, especially in the mobile device security arena. Where are the biggest issues?
what are the major issues of monetary policy in Ghana
what are the major issues of monetary policy in Ghana
Discuss an example of a mobile device or social or health-related application you use in everyday...
Discuss an example of a mobile device or social or health-related application you use in everyday life that stores personal health data and could potentially benefit your health. How could the technology or application be improved and utilized in the health care setting to provide a more detailed or holistic picture of a person's health status to providers?
Explain in summary; a. Knowledge Application and related research issues b. Knowledge Transfer and related research...
Explain in summary; a. Knowledge Application and related research issues b. Knowledge Transfer and related research issues c. Knowledge Storage and Retrieval and related research issues
Define, discuss and develop information security policy with all its elements.
Define, discuss and develop information security policy with all its elements.
(A) Narrate the Composition, Functions, Powers and procedure of Security and Exchange policy Board. (B) What...
(A) Narrate the Composition, Functions, Powers and procedure of Security and Exchange policy Board. (B) What are the Powers and Functions of Commission under Securities and Exchange Commission of Pakistan Act, 1997?
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT