SlideShare una empresa de Scribd logo
1 de 5
Descargar para leer sin conexión
by
James Fox
fox_james@bah.com
Shahzad Zafar
zafar_shahzad@bah.com
Helping Organizations Develop a Secure and Effective Mobile Application
Security Program
Mobile Application Security
Mobile applications are software applications
designed to run primarily on smartphones, tablets,
and pocket PCs. They are distributed by application
market places and are specific to the Operating
System (OS) of the mobile devices. The four most
popular mobile application distribution market
places are (1) Apple App Store, (2) Google Play,
(3) BlackBerry App World, and (4) Windows Phone
Store. The Apple App Store provides applications
for Apple’s IOS-based iPhones and iPads, the
Google Play for Android-based OS mobile devices,
the BlackBerry App World for the Research In Motion’s BlackBerry mobile devices and Windows Phone
store for Microsoft’s Mobile Phones, tablets, and pocket PCs. Since 2009, thousands of applications that
can be installed and used on mobile devices have flooded these application market places. These mobile
applications have evolved from their initial use as productivity, entertainment, and utility applications.
Now users, customers, and employees are conducting their day-to-day business transactions on mobile
devices. Businesses need to develop and provide mobile applications to their employees and customers
to keep pace with the changing business and consumer landscape. However, these mobile applications
have also introduced major security concerns for businesses and enterprises as hackers and bad actors
can exploit them to steal and harm customers and businesses.
Mobile application security protects an organization from potential threats, leveraging the customer-facing
mobile applications an organization develops as attack vectors. Mobile application security covers mobile
applications, communication between mobile applications and backend infrastructure, backend infrastructure,
and the associated activities, processes, and work streams used to design, test, develop, deploy, operate,
and maintain these technologies.
Understanding the Evolving Threat Landscape of Mobile Security Worldwide
In the Middle East and North Africa (MENA) region and around the world, an increasing number of businesses,
consumers, and employees are using mobile applications to conduct daily business transactions using mobile
devices due to availability, ease, and accessibility of mobile ecosystems. A recent survey conducted by Booz
Allen Hamilton of consumers in the Kingdom of Saudi Arabia indicates that 83 percent of the population
uses smartphones to conduct business or enterprise transactions. In addition, 64 percent of those surveyed
use mobile devices to conduct banking. However, the survey also revealed that one in three people have
experienced cybercrime in the past 12 months and close to 50 percent of the people surveyed lack a basic
understanding of mobile security and proper cyber hygiene. This survey data indicates that the stakes are
high when it comes to mobile security and risk levels are only going to elevate as more and more businesses
enable mobile application-based transactions to attract a new generation of consumers.
While consumer confidence and awareness is a key driver for addressing mobile security, the stakes are even
higher for businesses and enterprises. They are the ultimate victims of cybercrime that could occur from
breach in mobile application security. This threat is especially high for financial institutions. Regulators and
banks are starting to address this quickly evolving threat landscape facing mobile applications.
The Open Web Application Security Project (OWASP) is an organization that has focused on improving the security
of software in general and recently emphasizing mobile application security. As illustrated in Exhibit 1, OWASP
has released the top 10 mobile application vulnerabilities that organizations must address when it comes to
providing security for mobile applications. Any one of these vulnerabilities can cause serious damage to a financial
institution via loss of data, reputation, and consumer confidence—all of which lead directly and indirectly to
financial losses.
Mobile Applications Market Places
Apple App StoreSM
Google Play™
BlackBerry App World™
Microsoft® Windows® Phone Store
Identifying Vulnerabilities and Malicious Mobile Exploits
Booz Allen Hamilton, a leading strategy and technology consulting firm, focuses on defining the vulnerabilities
further and identifying the potential mobile security exploits that could harm or damage a business. Several
potential exploits are illustrated in Exhibit 2. Our mobile security experts understand the implications these
exploits can have on business and consumer confidence and how organizations can best protect themselves
against them.
Any one of these exploits can lead to loss of private data; loss of usernames, passwords, and personal
identification numbers (PIN); unauthorized access to private, business, and financial data; and theft and fraud.
For example, a stolen device that may have unencrypted data stored on the device could easily give a bad
actor access to a person’s private data. A malware on a mobile device could easily forward username and
passwords of a banking mobile application to hackers that could result in loss of financial data. Man-in-the-
middle attacks were a major threat to web-based and online transactions, but now, they are increasingly more
common on mobile devices. Controls such as two factor authentication across same communication channels
are helpless against a stolen device or a device with malicious malware. These sophisticated attacks to
mobile applications are well orchestrated and must be defended against through a pragmatic and holistic
approach to mobile application security.
Insecure Data
Storage
M1
Weak Server
Side Controls
M2
Insufficient
Transport
Layer
Protection
M3
Client Side
Injection
M4
Poor
Authorization &
Authentication
M5
Improper
Session
Handling
M6
Security
Decisions Via
Untrusted
Inputs
M7
Side Channel
Data Leakage
M8
Broken
Cryptography
M9
Sensitive
Information
Disclosure
M10
Exhibit 1 | Top 10 Mobile Application Vulnerabilities
Exhibit 2 | Successful Exploits
Source: OWASP.org
Source: Booz Allen Hamilton
Successful
Exploits
Borrowed or
Stolen Device
E1
Abuse of a
Device Feature
E5
Malicious
Application Functions
(Back Doors)
E2
Decompiling an
Application and
Changing It
E4
Attacks on the
Mobile Web
Service or APIs
E3
Applying a Pragmatic and Holistic Approach to Mobile Security
No single product, process, policy, or quick fix exists that organizations can buy or develop to address mobile
application security. Booz Allen Hamilton utilizes a holistic risk-based approach that identifies the risks,
threats, and vulnerabilities and their impact on the business. Once initial risk identification is conducted,
organizations can then start to address the problem in a pragmatic fashion and focus the efforts and budget
on the most important assets based on risk and impact profile.
Booz Allen Hamilton’s approach to an effective mobile
application security program starts with addressing
three primary pillars of mobile application security:
(1) secure mobile applications, (2) secure mobile
data transmission, and (3) secure mobile backend
infrastructure (see Exhibit 3). All three must be assessed
and addressed across all aspects of people, processes,
and technology dimensions. Our mobile application
security professionals help organizations—
•	 Develop an understanding of holistic solution and
approaches to providing mobile application security
•	 Utilize the same basic principles that apply to web
and online security to mobile application security
Our approach to assess and develop solutions for
organizations across mobile applications, mobile
data transmission, and mobile backend infrastructure
addresses the following categories across People
Process and Technology (PP&T) dimensions:
•	 Vulnerabilities. Identify vulnerabilities based on risk profiles across PP&T
•	 Relevant Security Controls. Identify and implement security controls across PP&T
•	 Best Security Practices. Identify relevant security best practices and institutionalize them
•	 Useful Frameworks and Standards. Identify and adapt where relevant the various articles, tools, frameworks,
and international standards across PP&T
When addressing mobile application security, organizations should take into account the following key points:
Secure M
obileDataTransmission
SecureMobileAp
plications
Secu
re Mobile Backend Infrastructure
Secure Mobile
Applications
Exhibit 3 | Secure Mobile Applications
Source: Booz Allen Hamilton
1
2
4
3
5
There is no one quick and simple solution to mobile application security; address it in a
pragmatic and holistic fashion
Use defense in depth with information security controls for each component
Follow a stringent systems development life cycle (SDLC) focused on developing secure
applications and continually review new development environments (integrated development
environment [IDE] and software development kit [SDK]) for easier security
Do not directly integrate mobile applications into the enterprise
Always conduct third-party code reviews and penetration testing and conduct annual third-party
assessments
www.boozallen.com/international ©2013 Booz Allen Hamilton Inc.
To learn more about the firm and to download digital versions of this article and other Booz Allen Hamilton
publications, visit www.boozallen.com.
For more information contact
About Booz Allen Hamilton
Headquarters
Principal Offices
Operating Offices
Principal Office
Operating Office
Global Headquarters
International Office Locations
Booz Allen Hamilton has been at the forefront of strategy and technology consulting for nearly a century. Today,
the firm provides services primarily to US and international governments in defense, security, and civil markets,
and to major corporations, institutions, and not-for-profit organizations. Booz Allen Hamilton offers clients deep
functional knowledge spanning consulting, mission operations, technology, and engineering —which it combines
with specialized expertise in clients’ mission and domain areas to help solve their toughest problems.
Booz Allen Hamilton is headquartered in McLean, Virginia, employs more than 23,000 people, and had revenue of
$5.76 billion for the 12 months ended March 31, 2013. To learn more, visit www.boozallen.com. (NYSE: BAH)
James Fox
Senior Associate
fox_james@bah.com
+971-56-688-6043
Shahzad Zafar
Senior Associate
zafar_shahzad@bah.com
+971-56-688-3014

Más contenido relacionado

La actualidad más candente

Toward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network AutomationToward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network AutomationE.S.G. JR. Consulting, Inc.
 
IBM MobileFrist Protect - Guerir la Mobilephobie des RSSI
IBM MobileFrist Protect - Guerir la Mobilephobie des RSSIIBM MobileFrist Protect - Guerir la Mobilephobie des RSSI
IBM MobileFrist Protect - Guerir la Mobilephobie des RSSIAGILLY
 
Darktrace_WhitePaper_EnterpriseImmuneSystem
Darktrace_WhitePaper_EnterpriseImmuneSystemDarktrace_WhitePaper_EnterpriseImmuneSystem
Darktrace_WhitePaper_EnterpriseImmuneSystemAustin Eppstein
 
Dell Technologies Cyber Security playbook
Dell Technologies Cyber Security playbookDell Technologies Cyber Security playbook
Dell Technologies Cyber Security playbookMargarete McGrath
 
SYSTEM END-USER ACTIONS AS A THREAT TO INFORMATION SYSTEM SECURITY
SYSTEM END-USER ACTIONS AS A THREAT TO INFORMATION SYSTEM SECURITYSYSTEM END-USER ACTIONS AS A THREAT TO INFORMATION SYSTEM SECURITY
SYSTEM END-USER ACTIONS AS A THREAT TO INFORMATION SYSTEM SECURITYIJNSA Journal
 
Darktrace_WhitePaper_Needle_final
Darktrace_WhitePaper_Needle_finalDarktrace_WhitePaper_Needle_final
Darktrace_WhitePaper_Needle_finalJerome Chapolard
 
Carbon Black: 32 Security Experts on Changing Endpoint Security
Carbon Black: 32 Security Experts on Changing Endpoint SecurityCarbon Black: 32 Security Experts on Changing Endpoint Security
Carbon Black: 32 Security Experts on Changing Endpoint SecurityMighty Guides, Inc.
 
TrendLabs 2012 Annual Security Roundup: Evolved Threats in a “Post-PC” World
TrendLabs 2012 Annual Security Roundup: Evolved Threats in a “Post-PC” WorldTrendLabs 2012 Annual Security Roundup: Evolved Threats in a “Post-PC” World
TrendLabs 2012 Annual Security Roundup: Evolved Threats in a “Post-PC” WorldInfinigate Group
 
Darktrace white paper_ics_final
Darktrace white paper_ics_finalDarktrace white paper_ics_final
Darktrace white paper_ics_finalCMR WORLD TECH
 
F5 Hero Asset - Inside the head of a Hacker Final
F5 Hero Asset - Inside the head of a Hacker FinalF5 Hero Asset - Inside the head of a Hacker Final
F5 Hero Asset - Inside the head of a Hacker FinalShallu Behar-Sheehan FCIM
 
Trend Micro - Targeted attacks: Have you found yours?
Trend Micro - Targeted attacks: Have you found yours?Trend Micro - Targeted attacks: Have you found yours?
Trend Micro - Targeted attacks: Have you found yours?Global Business Events
 
Cyber Resilience white paper 20160401_sd
Cyber Resilience white paper 20160401_sdCyber Resilience white paper 20160401_sd
Cyber Resilience white paper 20160401_sdSusan Darby
 
Countering the Advanced Persistent Threat Challenge with Deep Discovery
Countering the Advanced Persistent Threat Challenge with Deep DiscoveryCountering the Advanced Persistent Threat Challenge with Deep Discovery
Countering the Advanced Persistent Threat Challenge with Deep DiscoveryTrend Micro
 
OverseeCyberSecurityAsHackersSeekToInfiltrate
OverseeCyberSecurityAsHackersSeekToInfiltrateOverseeCyberSecurityAsHackersSeekToInfiltrate
OverseeCyberSecurityAsHackersSeekToInfiltrateKashif Ali
 
Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...
Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...
Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...Minh Le
 
Security annual report_mid2010
Security annual report_mid2010Security annual report_mid2010
Security annual report_mid2010thaiantivirus
 
Addressing Big Data Security Challenges: The Right Tools for Smart Protection...
Addressing Big Data Security Challenges: The Right Tools for Smart Protection...Addressing Big Data Security Challenges: The Right Tools for Smart Protection...
Addressing Big Data Security Challenges: The Right Tools for Smart Protection...Information Security Awareness Group
 
edgescan vulnerability stats report (2019)
edgescan vulnerability stats report (2019) edgescan vulnerability stats report (2019)
edgescan vulnerability stats report (2019) Eoin Keary
 

La actualidad más candente (19)

Toward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network AutomationToward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network Automation
 
IBM MobileFrist Protect - Guerir la Mobilephobie des RSSI
IBM MobileFrist Protect - Guerir la Mobilephobie des RSSIIBM MobileFrist Protect - Guerir la Mobilephobie des RSSI
IBM MobileFrist Protect - Guerir la Mobilephobie des RSSI
 
Darktrace_WhitePaper_EnterpriseImmuneSystem
Darktrace_WhitePaper_EnterpriseImmuneSystemDarktrace_WhitePaper_EnterpriseImmuneSystem
Darktrace_WhitePaper_EnterpriseImmuneSystem
 
idg_secops-solutions
idg_secops-solutionsidg_secops-solutions
idg_secops-solutions
 
Dell Technologies Cyber Security playbook
Dell Technologies Cyber Security playbookDell Technologies Cyber Security playbook
Dell Technologies Cyber Security playbook
 
SYSTEM END-USER ACTIONS AS A THREAT TO INFORMATION SYSTEM SECURITY
SYSTEM END-USER ACTIONS AS A THREAT TO INFORMATION SYSTEM SECURITYSYSTEM END-USER ACTIONS AS A THREAT TO INFORMATION SYSTEM SECURITY
SYSTEM END-USER ACTIONS AS A THREAT TO INFORMATION SYSTEM SECURITY
 
Darktrace_WhitePaper_Needle_final
Darktrace_WhitePaper_Needle_finalDarktrace_WhitePaper_Needle_final
Darktrace_WhitePaper_Needle_final
 
Carbon Black: 32 Security Experts on Changing Endpoint Security
Carbon Black: 32 Security Experts on Changing Endpoint SecurityCarbon Black: 32 Security Experts on Changing Endpoint Security
Carbon Black: 32 Security Experts on Changing Endpoint Security
 
TrendLabs 2012 Annual Security Roundup: Evolved Threats in a “Post-PC” World
TrendLabs 2012 Annual Security Roundup: Evolved Threats in a “Post-PC” WorldTrendLabs 2012 Annual Security Roundup: Evolved Threats in a “Post-PC” World
TrendLabs 2012 Annual Security Roundup: Evolved Threats in a “Post-PC” World
 
Darktrace white paper_ics_final
Darktrace white paper_ics_finalDarktrace white paper_ics_final
Darktrace white paper_ics_final
 
F5 Hero Asset - Inside the head of a Hacker Final
F5 Hero Asset - Inside the head of a Hacker FinalF5 Hero Asset - Inside the head of a Hacker Final
F5 Hero Asset - Inside the head of a Hacker Final
 
Trend Micro - Targeted attacks: Have you found yours?
Trend Micro - Targeted attacks: Have you found yours?Trend Micro - Targeted attacks: Have you found yours?
Trend Micro - Targeted attacks: Have you found yours?
 
Cyber Resilience white paper 20160401_sd
Cyber Resilience white paper 20160401_sdCyber Resilience white paper 20160401_sd
Cyber Resilience white paper 20160401_sd
 
Countering the Advanced Persistent Threat Challenge with Deep Discovery
Countering the Advanced Persistent Threat Challenge with Deep DiscoveryCountering the Advanced Persistent Threat Challenge with Deep Discovery
Countering the Advanced Persistent Threat Challenge with Deep Discovery
 
OverseeCyberSecurityAsHackersSeekToInfiltrate
OverseeCyberSecurityAsHackersSeekToInfiltrateOverseeCyberSecurityAsHackersSeekToInfiltrate
OverseeCyberSecurityAsHackersSeekToInfiltrate
 
Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...
Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...
Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...
 
Security annual report_mid2010
Security annual report_mid2010Security annual report_mid2010
Security annual report_mid2010
 
Addressing Big Data Security Challenges: The Right Tools for Smart Protection...
Addressing Big Data Security Challenges: The Right Tools for Smart Protection...Addressing Big Data Security Challenges: The Right Tools for Smart Protection...
Addressing Big Data Security Challenges: The Right Tools for Smart Protection...
 
edgescan vulnerability stats report (2019)
edgescan vulnerability stats report (2019) edgescan vulnerability stats report (2019)
edgescan vulnerability stats report (2019)
 

Destacado

Developing a Business Case for Cloud
Developing a Business Case for CloudDeveloping a Business Case for Cloud
Developing a Business Case for CloudBooz Allen Hamilton
 
Mitigating Our Nation’s Risks – Calling Upon the Whole Community
Mitigating Our Nation’s Risks – Calling Upon the Whole CommunityMitigating Our Nation’s Risks – Calling Upon the Whole Community
Mitigating Our Nation’s Risks – Calling Upon the Whole CommunityBooz Allen Hamilton
 
Government 2.0: Cutting-Edge Solutions For Communication, Collaboration, Serv...
Government 2.0: Cutting-Edge Solutions For Communication, Collaboration, Serv...Government 2.0: Cutting-Edge Solutions For Communication, Collaboration, Serv...
Government 2.0: Cutting-Edge Solutions For Communication, Collaboration, Serv...Booz Allen Hamilton
 

Destacado (8)

Protecting Mobile
Protecting MobileProtecting Mobile
Protecting Mobile
 
Developing a Business Case for Cloud
Developing a Business Case for CloudDeveloping a Business Case for Cloud
Developing a Business Case for Cloud
 
The Digital Enterprise
The Digital EnterpriseThe Digital Enterprise
The Digital Enterprise
 
When Disaster Strikes
When Disaster StrikesWhen Disaster Strikes
When Disaster Strikes
 
Mitigating Our Nation’s Risks – Calling Upon the Whole Community
Mitigating Our Nation’s Risks – Calling Upon the Whole CommunityMitigating Our Nation’s Risks – Calling Upon the Whole Community
Mitigating Our Nation’s Risks – Calling Upon the Whole Community
 
Government 2.0: Cutting-Edge Solutions For Communication, Collaboration, Serv...
Government 2.0: Cutting-Edge Solutions For Communication, Collaboration, Serv...Government 2.0: Cutting-Edge Solutions For Communication, Collaboration, Serv...
Government 2.0: Cutting-Edge Solutions For Communication, Collaboration, Serv...
 
Polaris Product Fact Sheet
Polaris Product Fact SheetPolaris Product Fact Sheet
Polaris Product Fact Sheet
 
Digital Reform Survey
Digital Reform SurveyDigital Reform Survey
Digital Reform Survey
 

Similar a Mobile Application Security

Mobile Application Security Testing, Testing for Mobility App | www.idexcel.com
Mobile Application Security Testing, Testing for Mobility App | www.idexcel.comMobile Application Security Testing, Testing for Mobility App | www.idexcel.com
Mobile Application Security Testing, Testing for Mobility App | www.idexcel.comIdexcel Technologies
 
Unicom Conference - Mobile Application Security
Unicom Conference - Mobile Application SecurityUnicom Conference - Mobile Application Security
Unicom Conference - Mobile Application SecuritySubho Halder
 
Challenges in Testing Mobile App Security
Challenges in Testing Mobile App SecurityChallenges in Testing Mobile App Security
Challenges in Testing Mobile App SecurityCygnet Infotech
 
Evolutionand impactofhiddenmobilethreats wandera
Evolutionand impactofhiddenmobilethreats wanderaEvolutionand impactofhiddenmobilethreats wandera
Evolutionand impactofhiddenmobilethreats wanderaAnjoum .
 
Article on Mobile Security
Article on Mobile SecurityArticle on Mobile Security
Article on Mobile SecurityTharaka Mahadewa
 
Report on Mobile security
Report  on Mobile securityReport  on Mobile security
Report on Mobile securityKavita Rastogi
 
Unified application security analyser
Unified application security analyserUnified application security analyser
Unified application security analyserTim Youm
 
Adaptive Mobile Malware Detection Model Based on CBR
Adaptive Mobile Malware Detection Model Based on CBRAdaptive Mobile Malware Detection Model Based on CBR
Adaptive Mobile Malware Detection Model Based on CBRijtsrd
 
State ofmobilesecurity
State ofmobilesecurityState ofmobilesecurity
State ofmobilesecurityGary Sandoval
 
WEBINAR - August 9, 2016: New Legal Requirements for Mobile Security
WEBINAR - August 9, 2016: New Legal Requirements for Mobile SecurityWEBINAR - August 9, 2016: New Legal Requirements for Mobile Security
WEBINAR - August 9, 2016: New Legal Requirements for Mobile SecurityMobileIron
 
How to reduce security risks to ensure user confidence in m-payments
How to reduce security risks to ensure user confidence in m-paymentsHow to reduce security risks to ensure user confidence in m-payments
How to reduce security risks to ensure user confidence in m-paymentsBMI Healthcare
 
Securing Mobile Apps - Appfest Version
Securing Mobile Apps - Appfest VersionSecuring Mobile Apps - Appfest Version
Securing Mobile Apps - Appfest VersionSubho Halder
 
Third Annual Mobile Threats Report
Third Annual Mobile Threats ReportThird Annual Mobile Threats Report
Third Annual Mobile Threats ReportJuniper Networks
 
Blue Coat 2013 Systems Mobile Malware Report
Blue Coat 2013 Systems Mobile Malware ReportBlue Coat 2013 Systems Mobile Malware Report
Blue Coat 2013 Systems Mobile Malware ReportContent Rules, Inc.
 
Running head mobile application security1mobile application se.docx
Running head mobile application security1mobile application se.docxRunning head mobile application security1mobile application se.docx
Running head mobile application security1mobile application se.docxtodd581
 
Running head mobile application security1mobile application se.docx
Running head mobile application security1mobile application se.docxRunning head mobile application security1mobile application se.docx
Running head mobile application security1mobile application se.docxglendar3
 
Whitepaper - CISO Guide_6pp
Whitepaper - CISO Guide_6ppWhitepaper - CISO Guide_6pp
Whitepaper - CISO Guide_6ppEric Zhuo
 
Mobile Threat Management
Mobile Threat ManagementMobile Threat Management
Mobile Threat ManagementKillian Delaney
 
4514ijmnct01
4514ijmnct014514ijmnct01
4514ijmnct01ijmnct
 

Similar a Mobile Application Security (20)

Mobile Application Security Testing, Testing for Mobility App | www.idexcel.com
Mobile Application Security Testing, Testing for Mobility App | www.idexcel.comMobile Application Security Testing, Testing for Mobility App | www.idexcel.com
Mobile Application Security Testing, Testing for Mobility App | www.idexcel.com
 
Unicom Conference - Mobile Application Security
Unicom Conference - Mobile Application SecurityUnicom Conference - Mobile Application Security
Unicom Conference - Mobile Application Security
 
Challenges in Testing Mobile App Security
Challenges in Testing Mobile App SecurityChallenges in Testing Mobile App Security
Challenges in Testing Mobile App Security
 
Evolutionand impactofhiddenmobilethreats wandera
Evolutionand impactofhiddenmobilethreats wanderaEvolutionand impactofhiddenmobilethreats wandera
Evolutionand impactofhiddenmobilethreats wandera
 
Article on Mobile Security
Article on Mobile SecurityArticle on Mobile Security
Article on Mobile Security
 
Report on Mobile security
Report  on Mobile securityReport  on Mobile security
Report on Mobile security
 
Unified application security analyser
Unified application security analyserUnified application security analyser
Unified application security analyser
 
Adaptive Mobile Malware Detection Model Based on CBR
Adaptive Mobile Malware Detection Model Based on CBRAdaptive Mobile Malware Detection Model Based on CBR
Adaptive Mobile Malware Detection Model Based on CBR
 
Mobile security article
Mobile security articleMobile security article
Mobile security article
 
State ofmobilesecurity
State ofmobilesecurityState ofmobilesecurity
State ofmobilesecurity
 
WEBINAR - August 9, 2016: New Legal Requirements for Mobile Security
WEBINAR - August 9, 2016: New Legal Requirements for Mobile SecurityWEBINAR - August 9, 2016: New Legal Requirements for Mobile Security
WEBINAR - August 9, 2016: New Legal Requirements for Mobile Security
 
How to reduce security risks to ensure user confidence in m-payments
How to reduce security risks to ensure user confidence in m-paymentsHow to reduce security risks to ensure user confidence in m-payments
How to reduce security risks to ensure user confidence in m-payments
 
Securing Mobile Apps - Appfest Version
Securing Mobile Apps - Appfest VersionSecuring Mobile Apps - Appfest Version
Securing Mobile Apps - Appfest Version
 
Third Annual Mobile Threats Report
Third Annual Mobile Threats ReportThird Annual Mobile Threats Report
Third Annual Mobile Threats Report
 
Blue Coat 2013 Systems Mobile Malware Report
Blue Coat 2013 Systems Mobile Malware ReportBlue Coat 2013 Systems Mobile Malware Report
Blue Coat 2013 Systems Mobile Malware Report
 
Running head mobile application security1mobile application se.docx
Running head mobile application security1mobile application se.docxRunning head mobile application security1mobile application se.docx
Running head mobile application security1mobile application se.docx
 
Running head mobile application security1mobile application se.docx
Running head mobile application security1mobile application se.docxRunning head mobile application security1mobile application se.docx
Running head mobile application security1mobile application se.docx
 
Whitepaper - CISO Guide_6pp
Whitepaper - CISO Guide_6ppWhitepaper - CISO Guide_6pp
Whitepaper - CISO Guide_6pp
 
Mobile Threat Management
Mobile Threat ManagementMobile Threat Management
Mobile Threat Management
 
4514ijmnct01
4514ijmnct014514ijmnct01
4514ijmnct01
 

Más de Booz Allen Hamilton

You Can Hack That: How to Use Hackathons to Solve Your Toughest Challenges
You Can Hack That: How to Use Hackathons to Solve Your Toughest ChallengesYou Can Hack That: How to Use Hackathons to Solve Your Toughest Challenges
You Can Hack That: How to Use Hackathons to Solve Your Toughest ChallengesBooz Allen Hamilton
 
Examining Flexibility in the Workplace for Working Moms
Examining Flexibility in the Workplace for Working MomsExamining Flexibility in the Workplace for Working Moms
Examining Flexibility in the Workplace for Working MomsBooz Allen Hamilton
 
Booz Allen's 10 Cyber Priorities for Boards of Directors
Booz Allen's 10 Cyber Priorities for Boards of DirectorsBooz Allen's 10 Cyber Priorities for Boards of Directors
Booz Allen's 10 Cyber Priorities for Boards of DirectorsBooz Allen Hamilton
 
Homeland Threats: Today and Tomorrow
Homeland Threats: Today and TomorrowHomeland Threats: Today and Tomorrow
Homeland Threats: Today and TomorrowBooz Allen Hamilton
 
Preparing for New Healthcare Payment Models
Preparing for New Healthcare Payment ModelsPreparing for New Healthcare Payment Models
Preparing for New Healthcare Payment ModelsBooz Allen Hamilton
 
The Product Owner’s Universe: Agile Coaching
The Product Owner’s Universe: Agile CoachingThe Product Owner’s Universe: Agile Coaching
The Product Owner’s Universe: Agile CoachingBooz Allen Hamilton
 
Immersive Learning: The Future of Training is Here
Immersive Learning: The Future of Training is HereImmersive Learning: The Future of Training is Here
Immersive Learning: The Future of Training is HereBooz Allen Hamilton
 
Nuclear Promise: Reducing Cost While Improving Performance
Nuclear Promise: Reducing Cost While Improving PerformanceNuclear Promise: Reducing Cost While Improving Performance
Nuclear Promise: Reducing Cost While Improving PerformanceBooz Allen Hamilton
 
Frenemies – When Unlikely Partners Join Forces
Frenemies – When Unlikely Partners Join ForcesFrenemies – When Unlikely Partners Join Forces
Frenemies – When Unlikely Partners Join ForcesBooz Allen Hamilton
 
Booz Allen Secure Agile Development
Booz Allen Secure Agile DevelopmentBooz Allen Secure Agile Development
Booz Allen Secure Agile DevelopmentBooz Allen Hamilton
 
Booz Allen Industrial Cybersecurity Threat Briefing
Booz Allen Industrial Cybersecurity Threat BriefingBooz Allen Industrial Cybersecurity Threat Briefing
Booz Allen Industrial Cybersecurity Threat BriefingBooz Allen Hamilton
 
Booz Allen Hamilton and Market Connections: C4ISR Survey Report
Booz Allen Hamilton and Market Connections: C4ISR Survey ReportBooz Allen Hamilton and Market Connections: C4ISR Survey Report
Booz Allen Hamilton and Market Connections: C4ISR Survey ReportBooz Allen Hamilton
 
Modern C4ISR Integrates, Innovates and Secures Military Networks
Modern C4ISR Integrates, Innovates and Secures Military NetworksModern C4ISR Integrates, Innovates and Secures Military Networks
Modern C4ISR Integrates, Innovates and Secures Military NetworksBooz Allen Hamilton
 
Agile and Open C4ISR Systems - Helping the Military Integrate, Innovate and S...
Agile and Open C4ISR Systems - Helping the Military Integrate, Innovate and S...Agile and Open C4ISR Systems - Helping the Military Integrate, Innovate and S...
Agile and Open C4ISR Systems - Helping the Military Integrate, Innovate and S...Booz Allen Hamilton
 
Booz Allen Field Guide to Data Science
Booz Allen Field Guide to Data Science Booz Allen Field Guide to Data Science
Booz Allen Field Guide to Data Science Booz Allen Hamilton
 

Más de Booz Allen Hamilton (20)

You Can Hack That: How to Use Hackathons to Solve Your Toughest Challenges
You Can Hack That: How to Use Hackathons to Solve Your Toughest ChallengesYou Can Hack That: How to Use Hackathons to Solve Your Toughest Challenges
You Can Hack That: How to Use Hackathons to Solve Your Toughest Challenges
 
Examining Flexibility in the Workplace for Working Moms
Examining Flexibility in the Workplace for Working MomsExamining Flexibility in the Workplace for Working Moms
Examining Flexibility in the Workplace for Working Moms
 
The True Cost of Childcare
The True Cost of ChildcareThe True Cost of Childcare
The True Cost of Childcare
 
Booz Allen's 10 Cyber Priorities for Boards of Directors
Booz Allen's 10 Cyber Priorities for Boards of DirectorsBooz Allen's 10 Cyber Priorities for Boards of Directors
Booz Allen's 10 Cyber Priorities for Boards of Directors
 
Inaugural Addresses
Inaugural AddressesInaugural Addresses
Inaugural Addresses
 
Military Spouse Career Roadmap
Military Spouse Career Roadmap Military Spouse Career Roadmap
Military Spouse Career Roadmap
 
Homeland Threats: Today and Tomorrow
Homeland Threats: Today and TomorrowHomeland Threats: Today and Tomorrow
Homeland Threats: Today and Tomorrow
 
Preparing for New Healthcare Payment Models
Preparing for New Healthcare Payment ModelsPreparing for New Healthcare Payment Models
Preparing for New Healthcare Payment Models
 
The Product Owner’s Universe: Agile Coaching
The Product Owner’s Universe: Agile CoachingThe Product Owner’s Universe: Agile Coaching
The Product Owner’s Universe: Agile Coaching
 
Immersive Learning: The Future of Training is Here
Immersive Learning: The Future of Training is HereImmersive Learning: The Future of Training is Here
Immersive Learning: The Future of Training is Here
 
Nuclear Promise: Reducing Cost While Improving Performance
Nuclear Promise: Reducing Cost While Improving PerformanceNuclear Promise: Reducing Cost While Improving Performance
Nuclear Promise: Reducing Cost While Improving Performance
 
Frenemies – When Unlikely Partners Join Forces
Frenemies – When Unlikely Partners Join ForcesFrenemies – When Unlikely Partners Join Forces
Frenemies – When Unlikely Partners Join Forces
 
Booz Allen Secure Agile Development
Booz Allen Secure Agile DevelopmentBooz Allen Secure Agile Development
Booz Allen Secure Agile Development
 
Booz Allen Industrial Cybersecurity Threat Briefing
Booz Allen Industrial Cybersecurity Threat BriefingBooz Allen Industrial Cybersecurity Threat Briefing
Booz Allen Industrial Cybersecurity Threat Briefing
 
Booz Allen Hamilton and Market Connections: C4ISR Survey Report
Booz Allen Hamilton and Market Connections: C4ISR Survey ReportBooz Allen Hamilton and Market Connections: C4ISR Survey Report
Booz Allen Hamilton and Market Connections: C4ISR Survey Report
 
CITRIX IN AMAZON WEB SERVICES
CITRIX IN AMAZON WEB SERVICESCITRIX IN AMAZON WEB SERVICES
CITRIX IN AMAZON WEB SERVICES
 
Modern C4ISR Integrates, Innovates and Secures Military Networks
Modern C4ISR Integrates, Innovates and Secures Military NetworksModern C4ISR Integrates, Innovates and Secures Military Networks
Modern C4ISR Integrates, Innovates and Secures Military Networks
 
Agile and Open C4ISR Systems - Helping the Military Integrate, Innovate and S...
Agile and Open C4ISR Systems - Helping the Military Integrate, Innovate and S...Agile and Open C4ISR Systems - Helping the Military Integrate, Innovate and S...
Agile and Open C4ISR Systems - Helping the Military Integrate, Innovate and S...
 
Women On The Leading Edge
Women On The Leading Edge Women On The Leading Edge
Women On The Leading Edge
 
Booz Allen Field Guide to Data Science
Booz Allen Field Guide to Data Science Booz Allen Field Guide to Data Science
Booz Allen Field Guide to Data Science
 

Último

Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 

Último (20)

Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 

Mobile Application Security

  • 1. by James Fox fox_james@bah.com Shahzad Zafar zafar_shahzad@bah.com Helping Organizations Develop a Secure and Effective Mobile Application Security Program Mobile Application Security
  • 2. Mobile applications are software applications designed to run primarily on smartphones, tablets, and pocket PCs. They are distributed by application market places and are specific to the Operating System (OS) of the mobile devices. The four most popular mobile application distribution market places are (1) Apple App Store, (2) Google Play, (3) BlackBerry App World, and (4) Windows Phone Store. The Apple App Store provides applications for Apple’s IOS-based iPhones and iPads, the Google Play for Android-based OS mobile devices, the BlackBerry App World for the Research In Motion’s BlackBerry mobile devices and Windows Phone store for Microsoft’s Mobile Phones, tablets, and pocket PCs. Since 2009, thousands of applications that can be installed and used on mobile devices have flooded these application market places. These mobile applications have evolved from their initial use as productivity, entertainment, and utility applications. Now users, customers, and employees are conducting their day-to-day business transactions on mobile devices. Businesses need to develop and provide mobile applications to their employees and customers to keep pace with the changing business and consumer landscape. However, these mobile applications have also introduced major security concerns for businesses and enterprises as hackers and bad actors can exploit them to steal and harm customers and businesses. Mobile application security protects an organization from potential threats, leveraging the customer-facing mobile applications an organization develops as attack vectors. Mobile application security covers mobile applications, communication between mobile applications and backend infrastructure, backend infrastructure, and the associated activities, processes, and work streams used to design, test, develop, deploy, operate, and maintain these technologies. Understanding the Evolving Threat Landscape of Mobile Security Worldwide In the Middle East and North Africa (MENA) region and around the world, an increasing number of businesses, consumers, and employees are using mobile applications to conduct daily business transactions using mobile devices due to availability, ease, and accessibility of mobile ecosystems. A recent survey conducted by Booz Allen Hamilton of consumers in the Kingdom of Saudi Arabia indicates that 83 percent of the population uses smartphones to conduct business or enterprise transactions. In addition, 64 percent of those surveyed use mobile devices to conduct banking. However, the survey also revealed that one in three people have experienced cybercrime in the past 12 months and close to 50 percent of the people surveyed lack a basic understanding of mobile security and proper cyber hygiene. This survey data indicates that the stakes are high when it comes to mobile security and risk levels are only going to elevate as more and more businesses enable mobile application-based transactions to attract a new generation of consumers. While consumer confidence and awareness is a key driver for addressing mobile security, the stakes are even higher for businesses and enterprises. They are the ultimate victims of cybercrime that could occur from breach in mobile application security. This threat is especially high for financial institutions. Regulators and banks are starting to address this quickly evolving threat landscape facing mobile applications. The Open Web Application Security Project (OWASP) is an organization that has focused on improving the security of software in general and recently emphasizing mobile application security. As illustrated in Exhibit 1, OWASP has released the top 10 mobile application vulnerabilities that organizations must address when it comes to providing security for mobile applications. Any one of these vulnerabilities can cause serious damage to a financial institution via loss of data, reputation, and consumer confidence—all of which lead directly and indirectly to financial losses. Mobile Applications Market Places Apple App StoreSM Google Play™ BlackBerry App World™ Microsoft® Windows® Phone Store
  • 3. Identifying Vulnerabilities and Malicious Mobile Exploits Booz Allen Hamilton, a leading strategy and technology consulting firm, focuses on defining the vulnerabilities further and identifying the potential mobile security exploits that could harm or damage a business. Several potential exploits are illustrated in Exhibit 2. Our mobile security experts understand the implications these exploits can have on business and consumer confidence and how organizations can best protect themselves against them. Any one of these exploits can lead to loss of private data; loss of usernames, passwords, and personal identification numbers (PIN); unauthorized access to private, business, and financial data; and theft and fraud. For example, a stolen device that may have unencrypted data stored on the device could easily give a bad actor access to a person’s private data. A malware on a mobile device could easily forward username and passwords of a banking mobile application to hackers that could result in loss of financial data. Man-in-the- middle attacks were a major threat to web-based and online transactions, but now, they are increasingly more common on mobile devices. Controls such as two factor authentication across same communication channels are helpless against a stolen device or a device with malicious malware. These sophisticated attacks to mobile applications are well orchestrated and must be defended against through a pragmatic and holistic approach to mobile application security. Insecure Data Storage M1 Weak Server Side Controls M2 Insufficient Transport Layer Protection M3 Client Side Injection M4 Poor Authorization & Authentication M5 Improper Session Handling M6 Security Decisions Via Untrusted Inputs M7 Side Channel Data Leakage M8 Broken Cryptography M9 Sensitive Information Disclosure M10 Exhibit 1 | Top 10 Mobile Application Vulnerabilities Exhibit 2 | Successful Exploits Source: OWASP.org Source: Booz Allen Hamilton Successful Exploits Borrowed or Stolen Device E1 Abuse of a Device Feature E5 Malicious Application Functions (Back Doors) E2 Decompiling an Application and Changing It E4 Attacks on the Mobile Web Service or APIs E3
  • 4. Applying a Pragmatic and Holistic Approach to Mobile Security No single product, process, policy, or quick fix exists that organizations can buy or develop to address mobile application security. Booz Allen Hamilton utilizes a holistic risk-based approach that identifies the risks, threats, and vulnerabilities and their impact on the business. Once initial risk identification is conducted, organizations can then start to address the problem in a pragmatic fashion and focus the efforts and budget on the most important assets based on risk and impact profile. Booz Allen Hamilton’s approach to an effective mobile application security program starts with addressing three primary pillars of mobile application security: (1) secure mobile applications, (2) secure mobile data transmission, and (3) secure mobile backend infrastructure (see Exhibit 3). All three must be assessed and addressed across all aspects of people, processes, and technology dimensions. Our mobile application security professionals help organizations— • Develop an understanding of holistic solution and approaches to providing mobile application security • Utilize the same basic principles that apply to web and online security to mobile application security Our approach to assess and develop solutions for organizations across mobile applications, mobile data transmission, and mobile backend infrastructure addresses the following categories across People Process and Technology (PP&T) dimensions: • Vulnerabilities. Identify vulnerabilities based on risk profiles across PP&T • Relevant Security Controls. Identify and implement security controls across PP&T • Best Security Practices. Identify relevant security best practices and institutionalize them • Useful Frameworks and Standards. Identify and adapt where relevant the various articles, tools, frameworks, and international standards across PP&T When addressing mobile application security, organizations should take into account the following key points: Secure M obileDataTransmission SecureMobileAp plications Secu re Mobile Backend Infrastructure Secure Mobile Applications Exhibit 3 | Secure Mobile Applications Source: Booz Allen Hamilton 1 2 4 3 5 There is no one quick and simple solution to mobile application security; address it in a pragmatic and holistic fashion Use defense in depth with information security controls for each component Follow a stringent systems development life cycle (SDLC) focused on developing secure applications and continually review new development environments (integrated development environment [IDE] and software development kit [SDK]) for easier security Do not directly integrate mobile applications into the enterprise Always conduct third-party code reviews and penetration testing and conduct annual third-party assessments
  • 5. www.boozallen.com/international ©2013 Booz Allen Hamilton Inc. To learn more about the firm and to download digital versions of this article and other Booz Allen Hamilton publications, visit www.boozallen.com. For more information contact About Booz Allen Hamilton Headquarters Principal Offices Operating Offices Principal Office Operating Office Global Headquarters International Office Locations Booz Allen Hamilton has been at the forefront of strategy and technology consulting for nearly a century. Today, the firm provides services primarily to US and international governments in defense, security, and civil markets, and to major corporations, institutions, and not-for-profit organizations. Booz Allen Hamilton offers clients deep functional knowledge spanning consulting, mission operations, technology, and engineering —which it combines with specialized expertise in clients’ mission and domain areas to help solve their toughest problems. Booz Allen Hamilton is headquartered in McLean, Virginia, employs more than 23,000 people, and had revenue of $5.76 billion for the 12 months ended March 31, 2013. To learn more, visit www.boozallen.com. (NYSE: BAH) James Fox Senior Associate fox_james@bah.com +971-56-688-6043 Shahzad Zafar Senior Associate zafar_shahzad@bah.com +971-56-688-3014