14
MOBILE SECURITY WITH INTUITIVE MOBILE APPLICATION TESTING PRACTICES

Mobile Security with Intuitive Mobile Application Testing Practices

Embed Size (px)

Citation preview

Page 1: Mobile Security with Intuitive Mobile Application Testing Practices

MOBILE SECURITY WITH INTUITIVE MOBILE APPLICATION TESTING PRACTICES

 

Page 2: Mobile Security with Intuitive Mobile Application Testing Practices

TESTING OF MOBILE DEVICE AND APPS TO IMPROVISE SECURITY• Mobile Security – Protection Of

Smart Phones Tablets Laptops Wearables

Page 3: Mobile Security with Intuitive Mobile Application Testing Practices

THREATS

Page 4: Mobile Security with Intuitive Mobile Application Testing Practices

APPLICATION SECURITY

• Magnitude Of Apps Downloaded • Multiple Permissions Request • Misuse Of Data• Typically Confidential And Critical Data Shared

Contacts Location Details Calendar Details

• Virus Infected Apps

Page 5: Mobile Security with Intuitive Mobile Application Testing Practices

DEVICE DATA LEAKAGES & INSECURE DATA STORAGES

• Mobile Malware Used To Hack Confidential Data Sensitive Data

• Data Leaks While Syncing With Enterprise Cloud• App Designs Over Look

Account Details Credit Card Numbers

• Secure Storage Methods

Page 6: Mobile Security with Intuitive Mobile Application Testing Practices

LACK OF DATA ENCRYPTION & BROKEN CRYPTOGRAPHY

• Common Encryption Methods are Not Fool-proof• Proper Testing Methods Advised • Cryptographic Keys Included On The Device• Keys Management On Central Server

Page 7: Mobile Security with Intuitive Mobile Application Testing Practices

WEAK BACK-END SECURITY • Proper Security On Servers Accessed By Apps• Device Test Strategy Helps

Page 8: Mobile Security with Intuitive Mobile Application Testing Practices

UNENCRYPTED WIRELESS TRANSMISSIONS• Un – Encrypted Data Transfers Can Be Intercepted In

Emails App Data

Page 9: Mobile Security with Intuitive Mobile Application Testing Practices

POOR MDM POLICIES

• BYOD – Poses security threats• Less Rigorous MDM Practices

Leads To Unauthorized Data Access

• A Good MDM Appreciates Differences in

Devices Operating Systems Management Strategy

• Stolen Devices

Page 10: Mobile Security with Intuitive Mobile Application Testing Practices

MALWARE ATTACKS • Malware Attacks Are Not Treated Properly• SMS Routed Trojan Virus Attacks

Page 11: Mobile Security with Intuitive Mobile Application Testing Practices

VULNERABILITIESData Flow & Audit Trails

Data Storage EncryptionDatabases

CloudsData Leakage Points

User Authentication & Authorization

Points Of Entry Into The SystemBack End

Lost Device Management

Page 12: Mobile Security with Intuitive Mobile Application Testing Practices

SECURITY REQUIREMENTS

• Define Scope Under Usefulness Of The Mobile System

• Study The Scope • Gauge

• Security Requirements Probable Breaches Expected Attacks

• Determine The Testing Framework And Tools According To Requirements

Page 13: Mobile Security with Intuitive Mobile Application Testing Practices

TESTING RULES

• A Healthy Balance between Automated and Manual Testing Tools

• Human Intelligence Should Be Used • Use Multiple Mobile App Testing Tools • Versatile Team With Dynamic Testers

Page 14: Mobile Security with Intuitive Mobile Application Testing Practices

VISITW W W. S P E C - I N D I A . C O M

& R E Q U E S T A F R E E P O C

T O T E S T D R I V E O U R S E RV I C E S