SlideShare une entreprise Scribd logo
1  sur  13
Télécharger pour lire hors ligne
MOBILE APPS AND
SECURITY ATTACKS
An Introduction
What is security?
• We have locks on our doors
• We have security personnel for our residential societies
• We have police for the city
• We have armed forces for our borders
What is security?
• What is precious to you?
• Know how someone can attack
• Think how you can protect
Mobile device is the biggest
threat vector
• Approximately, more than 3 billion iOS and Android mobile devices are now in market
• Mobiles have critical data:
• Personal
• Financial
• Social
• Corporate
• These devices offer minimum security (PIN, Pattern, Biometric)
Unfortunately, mobile users think that iOS and Android OS provide enough security.
Android Security
An Android’s
security is supported
by encryption,
signature, isolation,
and access control
security protection.
The Android app
signature system
ensures that the
app’s logic is not
tampered with, and
enforces a user to
recognize the
identity of the app’s
author.
Although Android
only installs and
runs a signed app, a
certificate is not
required by Google.
A hacker can create
and distribute
malicious app since
people will not be
able to track down
the source.
Attackers add Trojan
horses and malicious
code to an existing
legitimate app and
then re-sign the
updated version
with an anonymous
or fake certificate
and distribute it.
Possible
threats to
mobile
devices
• Hackers take advantage of vulnerability or flaw of user’s web
browser on mobile device in WiFi communication.
• Hackers send malicious code/data from malicious logic websites to
victim’s browser (after user browses the malicious page). The code
takes control and gets all sensitive data on the victim’s device.
Hackers use hyped content to attract, manipulate, or persuade people
into revealing confidential information through deception such as
phishing for information gathering, fraud, or access rights.
Social engineering
Network exploit
Virus hosted on a legitimate code, replicable spread
worms, Trojan horses with action in purpose
Email/SMS spam or denial of service
(A group of attacking devices send huge volume of
data to a target on the Internet to impact the
target’s services.)
Misuse of available resource and service
Malware
Possible
threats to
mobile
devices
Possible threats to mobile devices
Workplace data on a mobile device
may be uploaded to home PC while
synchronizing of entertainment
downloading or Enterprise/private
data loss due to stolen device
Enterprise/Private Data Loss
Intentionally modifying/corrupting device
data without the permission such as
device’s contact list
Data tampering
Popular Mobile Malware
• Spyware – steals user information with user’s consent somehow
• Trojan horse – steals confidential information such as credit card data
• Adware - displays unwanted pop-up ads with/without theft of sensitive data
a. Static analysis
Static analysis is a reverse engineering analysis approach to finding malicious characteristics code segments in an
app without execution. The analysis focus on these obvious security threats which have been reported before.
b. Dynamic analysis
Dynamic analysis will execute the suspicious mobile app in an isolated sandbox, such as a virtual machine or
emulator to monitor and inspect the app’s dynamic behavior.
c. App Permission analysis
Android security detects Android mobile app’s intentions through required permissions. The permissions required
should be clearly specified by app’s author, and should be justified based on the functionality provided by the app.
How we detect?
Use MDM tools to oversee
and control mobile devices
in secure operations
Store enterprise data
in sandbox
Encrypte enterprise data
on mobile devices
Keep apps current with
less vulnerabilities
and flaws
Routinely back up all apps
and upgrade OS
Authenticate and register all
mobile devices with Secure
Socket Layer (SSL) certificate
Adopt app blacklisting
within enterprise
Management on the lost
and stolen devices
Separate personal and
business accounts
Controls user access
Enterprise
Mobility
Bring Your Own Device (BYOD)
with Mobile Device
Management (MDM)
Do you design for security?
• Do you have clearly identified data in your app which is precious?
• Do you clearly anticipate the possible attacks that can steal data?
• How does your tech design enable protection of the data?
• How are you going to test the app for security?
Nagarro drives technology-led business breakthroughs for industry leaders and challengers. When our clients want to move
fast and make things, they turn to us. Some of our clients include Siemens, GE, Lufthansa, Viacom, Estēe Lauder, ASSA
ABLOY, Ericsson, DHL, Mitsubishi, BMW, the City of New York, T-Systems, SAP and Infor. Working with these clients, we
continually push the boundaries of what is possible to do through technology, and in what time frame.
Today, we are more than 5,000 experts across 20 countries. Together we form Nagarro, the global services division of
Munich-based Allgeier SE.
Sources
• https://www.macrumors.com/2017/05/17/2-billion-active-android-devices/
• https://www.utc.edu/faculty/li-yang/5.mobilethreatsattacks.pptx

Contenu connexe

Tendances

Information Security Principles - Access Control
Information Security  Principles -  Access ControlInformation Security  Principles -  Access Control
Information Security Principles - Access Control
idingolay
 

Tendances (20)

MOBILE PHONE SECURITY./ MOBILE SECURITY
MOBILE PHONE SECURITY./ MOBILE SECURITYMOBILE PHONE SECURITY./ MOBILE SECURITY
MOBILE PHONE SECURITY./ MOBILE SECURITY
 
Android ppt
Android pptAndroid ppt
Android ppt
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Network security
Network securityNetwork security
Network security
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Mobile Malware
Mobile MalwareMobile Malware
Mobile Malware
 
Latest Top 10 Types of Cyber Security Threats
Latest Top 10 Types of Cyber Security ThreatsLatest Top 10 Types of Cyber Security Threats
Latest Top 10 Types of Cyber Security Threats
 
Two factor authentication 2018
Two factor authentication 2018Two factor authentication 2018
Two factor authentication 2018
 
Information Security Principles - Access Control
Information Security  Principles -  Access ControlInformation Security  Principles -  Access Control
Information Security Principles - Access Control
 
Web Security Attacks
Web Security AttacksWeb Security Attacks
Web Security Attacks
 
Cyber Security A Challenges For Mankind
Cyber Security A Challenges For MankindCyber Security A Challenges For Mankind
Cyber Security A Challenges For Mankind
 
Cybersecurity
Cybersecurity Cybersecurity
Cybersecurity
 
Attack modeling vs threat modelling
Attack modeling vs threat modellingAttack modeling vs threat modelling
Attack modeling vs threat modelling
 
Mobile Security
Mobile SecurityMobile Security
Mobile Security
 
Cyber security training
Cyber security trainingCyber security training
Cyber security training
 
information security awareness course
information security awareness courseinformation security awareness course
information security awareness course
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security Awareness
 
Application Security | Application Security Tutorial | Cyber Security Certifi...
Application Security | Application Security Tutorial | Cyber Security Certifi...Application Security | Application Security Tutorial | Cyber Security Certifi...
Application Security | Application Security Tutorial | Cyber Security Certifi...
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
3 reasons your business can't ignore Two-Factor Authentication
3 reasons your business can't ignore Two-Factor Authentication3 reasons your business can't ignore Two-Factor Authentication
3 reasons your business can't ignore Two-Factor Authentication
 

Similaire à Mobile Apps and Security Attacks: An Introduction

Ms810 assignment viruses and malware affecting moblie devices
Ms810 assignment viruses and malware affecting moblie devicesMs810 assignment viruses and malware affecting moblie devices
Ms810 assignment viruses and malware affecting moblie devices
rebelreg
 
Article on Mobile Security
Article on Mobile SecurityArticle on Mobile Security
Article on Mobile Security
Tharaka Mahadewa
 
BETTER- Threat Whitepaper- PoS
BETTER- Threat Whitepaper- PoSBETTER- Threat Whitepaper- PoS
BETTER- Threat Whitepaper- PoS
Purna Bhat
 
Droidcon2013 security genes_trendmicro
Droidcon2013 security genes_trendmicroDroidcon2013 security genes_trendmicro
Droidcon2013 security genes_trendmicro
Droidcon Berlin
 

Similaire à Mobile Apps and Security Attacks: An Introduction (20)

Mobile App Security Best Practices Protecting User Data.pdf
Mobile App Security Best Practices Protecting User Data.pdfMobile App Security Best Practices Protecting User Data.pdf
Mobile App Security Best Practices Protecting User Data.pdf
 
Mobile Threat Management
Mobile Threat ManagementMobile Threat Management
Mobile Threat Management
 
Ms810 assignment viruses and malware affecting moblie devices
Ms810 assignment viruses and malware affecting moblie devicesMs810 assignment viruses and malware affecting moblie devices
Ms810 assignment viruses and malware affecting moblie devices
 
Ensuring Mobile Device Security
Ensuring Mobile Device SecurityEnsuring Mobile Device Security
Ensuring Mobile Device Security
 
Information security
Information securityInformation security
Information security
 
ISACA CACS 2012 - Mobile Device Security and Privacy
ISACA CACS 2012 - Mobile Device Security and PrivacyISACA CACS 2012 - Mobile Device Security and Privacy
ISACA CACS 2012 - Mobile Device Security and Privacy
 
Mobile phone as Trusted identity assistant
Mobile phone as Trusted identity assistantMobile phone as Trusted identity assistant
Mobile phone as Trusted identity assistant
 
Article on Mobile Security
Article on Mobile SecurityArticle on Mobile Security
Article on Mobile Security
 
Cn35499502
Cn35499502Cn35499502
Cn35499502
 
BETTER- Threat Whitepaper- PoS
BETTER- Threat Whitepaper- PoSBETTER- Threat Whitepaper- PoS
BETTER- Threat Whitepaper- PoS
 
Microsoft Enterprise Mobility and Security EMS
Microsoft Enterprise Mobility and Security EMSMicrosoft Enterprise Mobility and Security EMS
Microsoft Enterprise Mobility and Security EMS
 
Mobile security article
Mobile security articleMobile security article
Mobile security article
 
Report on Mobile security
Report  on Mobile securityReport  on Mobile security
Report on Mobile security
 
Anatomy of a cyber attack
Anatomy of a cyber attackAnatomy of a cyber attack
Anatomy of a cyber attack
 
OpenSouthCode '19 - Application Security Fundamentals [2019-May-25]
OpenSouthCode '19 - Application Security Fundamentals [2019-May-25]OpenSouthCode '19 - Application Security Fundamentals [2019-May-25]
OpenSouthCode '19 - Application Security Fundamentals [2019-May-25]
 
Evolutionand impactofhiddenmobilethreats wandera
Evolutionand impactofhiddenmobilethreats wanderaEvolutionand impactofhiddenmobilethreats wandera
Evolutionand impactofhiddenmobilethreats wandera
 
Droidcon2013 security genes_trendmicro
Droidcon2013 security genes_trendmicroDroidcon2013 security genes_trendmicro
Droidcon2013 security genes_trendmicro
 
Mobile security
Mobile securityMobile security
Mobile security
 
Challenges 14 security (1).pdf
Challenges 14  security (1).pdfChallenges 14  security (1).pdf
Challenges 14 security (1).pdf
 
Cyber Security in detail PPT BY HIMANXU.pptx
Cyber Security in detail PPT BY HIMANXU.pptxCyber Security in detail PPT BY HIMANXU.pptx
Cyber Security in detail PPT BY HIMANXU.pptx
 

Plus de Nagarro

Plus de Nagarro (20)

Testing the Migration of Monolithic Applications to Microservices on the Cloud
Testing the Migration of Monolithic Applications to Microservices on the CloudTesting the Migration of Monolithic Applications to Microservices on the Cloud
Testing the Migration of Monolithic Applications to Microservices on the Cloud
 
Intelligent automation beyond test execution
Intelligent automation beyond test executionIntelligent automation beyond test execution
Intelligent automation beyond test execution
 
Flutter: An open-source UI software development kit
Flutter: An open-source UI software development kitFlutter: An open-source UI software development kit
Flutter: An open-source UI software development kit
 
Remote Collaboration: Working Canvas
Remote Collaboration: Working Canvas Remote Collaboration: Working Canvas
Remote Collaboration: Working Canvas
 
Remote Collaboration: Working and Leading from Home
Remote Collaboration: Working and Leading from HomeRemote Collaboration: Working and Leading from Home
Remote Collaboration: Working and Leading from Home
 
Chatbot testing
Chatbot testing Chatbot testing
Chatbot testing
 
10 Gründe, warum Ihre Testautomatisierung zum Scheitern verurteilt ist
10 Gründe, warum Ihre Testautomatisierung zum Scheitern verurteilt ist 10 Gründe, warum Ihre Testautomatisierung zum Scheitern verurteilt ist
10 Gründe, warum Ihre Testautomatisierung zum Scheitern verurteilt ist
 
Integrating AI in software quality in absence of a well-defined requirements
Integrating AI in software quality in absence of a well-defined requirementsIntegrating AI in software quality in absence of a well-defined requirements
Integrating AI in software quality in absence of a well-defined requirements
 
Intelligent Digital Mesh Testing
Intelligent Digital Mesh TestingIntelligent Digital Mesh Testing
Intelligent Digital Mesh Testing
 
Software Quality without Testing
Software Quality without TestingSoftware Quality without Testing
Software Quality without Testing
 
Advanced Test Automation: Agile Model
Advanced Test Automation: Agile ModelAdvanced Test Automation: Agile Model
Advanced Test Automation: Agile Model
 
Testing @ digital speed
 Testing @ digital speed Testing @ digital speed
Testing @ digital speed
 
How to get started? Digital Transformation: A Down-to-Earth Approach
How to get started? Digital Transformation: A Down-to-Earth ApproachHow to get started? Digital Transformation: A Down-to-Earth Approach
How to get started? Digital Transformation: A Down-to-Earth Approach
 
Connecting the dots – Industrial IoT is more than just sensor deployment
Connecting the dots – Industrial IoT is more than just sensor deploymentConnecting the dots – Industrial IoT is more than just sensor deployment
Connecting the dots – Industrial IoT is more than just sensor deployment
 
A walk through the AI Use Cases in the Connected Enterprise
A walk through the AI Use Cases in the Connected EnterpriseA walk through the AI Use Cases in the Connected Enterprise
A walk through the AI Use Cases in the Connected Enterprise
 
Cloud-enabled analytics
Cloud-enabled analyticsCloud-enabled analytics
Cloud-enabled analytics
 
Why Cloud Computing is mandatory for Connected Enterprise
Why Cloud Computing is mandatory for Connected EnterpriseWhy Cloud Computing is mandatory for Connected Enterprise
Why Cloud Computing is mandatory for Connected Enterprise
 
Testing Microservices
Testing MicroservicesTesting Microservices
Testing Microservices
 
Are Your Mobile Apps Secure? (Part I)
Are Your Mobile Apps Secure? (Part I)Are Your Mobile Apps Secure? (Part I)
Are Your Mobile Apps Secure? (Part I)
 
Storytelling in Software Development
Storytelling in Software Development Storytelling in Software Development
Storytelling in Software Development
 

Dernier

Obat Penggugur Kandungan Di Apotik Kimia Farma (087776558899)
Obat Penggugur Kandungan Di Apotik Kimia Farma (087776558899)Obat Penggugur Kandungan Di Apotik Kimia Farma (087776558899)
Obat Penggugur Kandungan Di Apotik Kimia Farma (087776558899)
Cara Menggugurkan Kandungan 087776558899
 

Dernier (8)

Android Application Components with Implementation & Examples
Android Application Components with Implementation & ExamplesAndroid Application Components with Implementation & Examples
Android Application Components with Implementation & Examples
 
Mobile Application Development-Components and Layouts
Mobile Application Development-Components and LayoutsMobile Application Development-Components and Layouts
Mobile Application Development-Components and Layouts
 
9999266834 Call Girls In Noida Sector 52 (Delhi) Call Girl Service
9999266834 Call Girls In Noida Sector 52 (Delhi) Call Girl Service9999266834 Call Girls In Noida Sector 52 (Delhi) Call Girl Service
9999266834 Call Girls In Noida Sector 52 (Delhi) Call Girl Service
 
Obat Penggugur Kandungan Di Apotik Kimia Farma (087776558899)
Obat Penggugur Kandungan Di Apotik Kimia Farma (087776558899)Obat Penggugur Kandungan Di Apotik Kimia Farma (087776558899)
Obat Penggugur Kandungan Di Apotik Kimia Farma (087776558899)
 
Thane 💋 Call Girls 7738631006 💋 Call Girls in Thane Escort service book now. ...
Thane 💋 Call Girls 7738631006 💋 Call Girls in Thane Escort service book now. ...Thane 💋 Call Girls 7738631006 💋 Call Girls in Thane Escort service book now. ...
Thane 💋 Call Girls 7738631006 💋 Call Girls in Thane Escort service book now. ...
 
FULL ENJOY - 9999218229 Call Girls in {Mahipalpur}| Delhi NCR
FULL ENJOY - 9999218229 Call Girls in {Mahipalpur}| Delhi NCRFULL ENJOY - 9999218229 Call Girls in {Mahipalpur}| Delhi NCR
FULL ENJOY - 9999218229 Call Girls in {Mahipalpur}| Delhi NCR
 
Leading Mobile App Development Companies in India (2).pdf
Leading Mobile App Development Companies in India (2).pdfLeading Mobile App Development Companies in India (2).pdf
Leading Mobile App Development Companies in India (2).pdf
 
Mobile Application Development-Android and It’s Tools
Mobile Application Development-Android and It’s ToolsMobile Application Development-Android and It’s Tools
Mobile Application Development-Android and It’s Tools
 

Mobile Apps and Security Attacks: An Introduction

  • 1. MOBILE APPS AND SECURITY ATTACKS An Introduction
  • 2. What is security? • We have locks on our doors • We have security personnel for our residential societies • We have police for the city • We have armed forces for our borders
  • 3. What is security? • What is precious to you? • Know how someone can attack • Think how you can protect
  • 4. Mobile device is the biggest threat vector • Approximately, more than 3 billion iOS and Android mobile devices are now in market • Mobiles have critical data: • Personal • Financial • Social • Corporate • These devices offer minimum security (PIN, Pattern, Biometric) Unfortunately, mobile users think that iOS and Android OS provide enough security.
  • 5. Android Security An Android’s security is supported by encryption, signature, isolation, and access control security protection. The Android app signature system ensures that the app’s logic is not tampered with, and enforces a user to recognize the identity of the app’s author. Although Android only installs and runs a signed app, a certificate is not required by Google. A hacker can create and distribute malicious app since people will not be able to track down the source. Attackers add Trojan horses and malicious code to an existing legitimate app and then re-sign the updated version with an anonymous or fake certificate and distribute it.
  • 6. Possible threats to mobile devices • Hackers take advantage of vulnerability or flaw of user’s web browser on mobile device in WiFi communication. • Hackers send malicious code/data from malicious logic websites to victim’s browser (after user browses the malicious page). The code takes control and gets all sensitive data on the victim’s device. Hackers use hyped content to attract, manipulate, or persuade people into revealing confidential information through deception such as phishing for information gathering, fraud, or access rights. Social engineering Network exploit
  • 7. Virus hosted on a legitimate code, replicable spread worms, Trojan horses with action in purpose Email/SMS spam or denial of service (A group of attacking devices send huge volume of data to a target on the Internet to impact the target’s services.) Misuse of available resource and service Malware Possible threats to mobile devices
  • 8. Possible threats to mobile devices Workplace data on a mobile device may be uploaded to home PC while synchronizing of entertainment downloading or Enterprise/private data loss due to stolen device Enterprise/Private Data Loss Intentionally modifying/corrupting device data without the permission such as device’s contact list Data tampering
  • 9. Popular Mobile Malware • Spyware – steals user information with user’s consent somehow • Trojan horse – steals confidential information such as credit card data • Adware - displays unwanted pop-up ads with/without theft of sensitive data
  • 10. a. Static analysis Static analysis is a reverse engineering analysis approach to finding malicious characteristics code segments in an app without execution. The analysis focus on these obvious security threats which have been reported before. b. Dynamic analysis Dynamic analysis will execute the suspicious mobile app in an isolated sandbox, such as a virtual machine or emulator to monitor and inspect the app’s dynamic behavior. c. App Permission analysis Android security detects Android mobile app’s intentions through required permissions. The permissions required should be clearly specified by app’s author, and should be justified based on the functionality provided by the app. How we detect?
  • 11. Use MDM tools to oversee and control mobile devices in secure operations Store enterprise data in sandbox Encrypte enterprise data on mobile devices Keep apps current with less vulnerabilities and flaws Routinely back up all apps and upgrade OS Authenticate and register all mobile devices with Secure Socket Layer (SSL) certificate Adopt app blacklisting within enterprise Management on the lost and stolen devices Separate personal and business accounts Controls user access Enterprise Mobility Bring Your Own Device (BYOD) with Mobile Device Management (MDM)
  • 12. Do you design for security? • Do you have clearly identified data in your app which is precious? • Do you clearly anticipate the possible attacks that can steal data? • How does your tech design enable protection of the data? • How are you going to test the app for security?
  • 13. Nagarro drives technology-led business breakthroughs for industry leaders and challengers. When our clients want to move fast and make things, they turn to us. Some of our clients include Siemens, GE, Lufthansa, Viacom, Estēe Lauder, ASSA ABLOY, Ericsson, DHL, Mitsubishi, BMW, the City of New York, T-Systems, SAP and Infor. Working with these clients, we continually push the boundaries of what is possible to do through technology, and in what time frame. Today, we are more than 5,000 experts across 20 countries. Together we form Nagarro, the global services division of Munich-based Allgeier SE. Sources • https://www.macrumors.com/2017/05/17/2-billion-active-android-devices/ • https://www.utc.edu/faculty/li-yang/5.mobilethreatsattacks.pptx