Mobile Application Security Essay

4041 words - 17 pages

SECURING A MOBILE WORLD

Introduction
Today’s smartphones and tablets are more than communication devices. They are hip-mounted personal computers, with more memory and processing power than your laptop of just a few years ago. They are an integrated part of our lives… personal and professional. The information they provide is so vital that the Army is piloting their use as standard field issue to every soldier, complete with combat-focused applications [1]. However, smartphones and tablets raise new security issues. They are more likely to be lost or stolen, exposing sensitive data. Malware risks are increased because they connect to the Internet directly rather than from behind ...view middle of the document...

Examples include apps that gather personal information, track location, and charge accounts by sending text messages to premium-rate numbers. Using a mobile device to access corporate email or other resources extends the threat to the organization, including the theft of sensitive data [2]. With the acknowledged role of mobile devices and social networks in the revolutions in Egypt, Libya, and Syria, malware and viruses targeted at intelligence gathering and device-usage denial will increase significantly in the future [3]. While viruses and malware targeting mobile devices would share many of the same goals as on the PC, the enhanced capabilities of these devices present expanded attack surfaces through sensors such as GPS, accelerometer, camera, microphone, and gyroscope. Recently, Kaspersky Lab discovered a new threat involving the photo-scanning of Quick Response (QR) codes [4]. QR codes are 2-D matrix barcodes increasingly used in advertising and merchandising to direct mobile-phone users to a website for further information on the tagged item. In this case, users downloaded what they thought was a legitimate app, but instead was malware that sent Simple Message System

Safeguarding Data in a Mobile Device World
Sean C. Mitchem, Southwest Research Institute Sandra G. Dykes, Ph.D., Southwest Research Institute Stephen W. Cook, Southwest Research Institute John G. Whipple, Southwest Research Institute
Abstract. With the proliferation of mobile devices in today’s information-rich environment, the security of data at rest on the device and in transit will determine the ultimate usability of mobile devices in the defense environment. Relying on the security models provided by the major OS providers such as Apple’s iOS or Google’s Android is not enough to meet the information protection needs of the defense environment. Researchers at Southwest Research Institute® (SwRI®) are investigating the security models available for application development on the iOS and Android platforms, the threats involved, methodologies for application-level data protection, the intersection between data security and user experience, and best practices for ensuring data security within mobile applications.

12

CrossTalk—March/April 2012

SECURING A MOBILE WORLD

(SMS) messages to a premium-rate number that charged for each message [5]. This app could have easily been reconfigured to send covert copies of emails and text messages to an intelligence gatherer instead. In another example, using the unique capabilities of a mobile device, Georgia Tech researchers were able to use the phone’s accelerometer to detect PC keyboard vibrations and decipher complete sentences with up to 80% accuracy. This was done by placing the phone within three inches of the keyboard of a PC, allowing the researchers to pick up the keyboard vibrations and decipher words of up to three to four characters fairly accurately. The key to understanding the threat vectors of mobile...

Other Papers Like Mobile Application Security

Bank of America Case Essay

1302 words - 6 pages complexity to the current application Advantages: * No extra costs on building a new application * Customers that don´t like technology or doubt about security issues won't be affected. Disadvantages: * Other banks offer better mobile apps and this will increase their competitive advantage. * Customer satisfaction will suffer if the app is not updated and does not fulfill their needs. * Transactions will still be done through ATMs, Call centers

Mobile Cloud Computing Essay

5666 words - 23 pages interface. Wireless communication channel has different radio access technologies such as GPRS, 3G, WLAN and WiMax with variable network conditions in terms of limited and unstable bandwidth. Cloud Computing is facing various security and privacy challenges. Security and privacy issues in mobile cloud computing are inherited from cloud computing and mobile computing. Because of resource constraints, heavy security algorithm can’t be run on mobile device

Informtion Systems

1742 words - 7 pages base everything for a younger crowd. Now say the majority of your customer base is actually older, you still are going to want to put things into play to attract the younger crowd as well. Any data that can be collected from your customers is huge because it is very useful when “tailoring” communications and offers to them, and a mobile application does this easily and efficiently. Data/Security Because mobile apps often rely on having consumer

Bank of America

1600 words - 7 pages by providing more functionality in its mobile application and promoting its unique features. Moreover the cost of development of the application is very expensive. Second, it should classify its market segments based on Exhibit 3b (Global Consumer and Small Business Banking, Global Corporate and Investment Banking, Global Wealth and Investment Management) then designs a specialized application based on the needs of the target market. The

Payroll System

331 words - 2 pages will be an aid to trap and determine the intruder. Remarkable contribution will be the owner/user can detect to what certain area the intruder enter and what access code it uses. 5. How do you plan to accomplish the system? The proposed system will used the Rapid Application Development and Object-Oriented Analysis and Design. Using Free Open Source System software, integrating to complete the study. ----------------------- LOCKED CODE Scan Code Alarm Report to the Owner Mobile-Based Prototype Security System Input Process Output

Analysis of Software Engineering Issues for Mobile Application Development

830 words - 4 pages applications, sensor handling, mobile web applications, families of hardware and software platforms, security, user interface, complexity of testing and power consumption. Each of these issues is addressed separately and also includes a short comparison to its native counterpart; I’m just going to review four of the eight. Sensor handling is one aspect that I’ve found to be troublesome, especially when designing an application for an

Cis 500 Mobile Computing & Social Networks

2391 words - 10 pages leveraging built-in hardware and features on a mobile phone.  (Cartman/Ting, 2009). The applications should be as simple as possible with discreet tasks. There are several issues to consider when choosing a platform for mobile application development. Before you can decide which platform to support, i.e., iPhone, iPad, Windows Phone, or Android, you must first consider your target audience. If you are looking at the non-business market and are

Age of the Mobile Wallet

1317 words - 6 pages taken over society is the use of Mobile Wallets. This technology allows you to pay for a product or service, using an application from your mobile phone at a Near Field Communication (NFC) reader. When the phone is held to the NFC, it will vibrate or beep to confirm payment. Customers have no need to carry cash, checks, or credit cards when there are apps such as Apple Pay that link directly to your bank account. Sounds easy enough, right? Many

Ecommerce

1811 words - 8 pages prediction for 2013 would be 21.6 billion times. In the Taiwanese market 40% of users spend 10-30 minutes on Apps a day, whereas over 70% use it every day. The application market participants are separated in two different sections like the operating systems and the mobile phone producers. The operating system is the software which on the mobile phones. The main developers are Google Android, Symbian OS, Blackberry RIM, Palm webOS and Windows

Mobile Devices

3090 words - 13 pages volume. (MacMillan, 2010) Mobile devices face several challenges to their continued growth. They need to address these concerns to maintain their current growth estimates. These challenges include bandwidth limitations, security concerns, battery life, service outages, rising costs, and legal concerns. Mobile devices are typically slower than PCs because their mobile nature doesn’t allow them to use a direct connection to access the internet

True Mobile TV -- Next Generation Product

2456 words - 10 pages 1.Executive SummaryIn January, 2006, XVD's competitor On2 Technologies announced their partnership with XM to provide XM Satellite Video service by using its True Motion VP7 video compression technology. Similarly, XM's rival Sirius is also planning to roll out its in-car video service in 2008. As Mobile TV is increasingly considered the new killer application in the mobile telecom world, it has offered new opportunities to device-makers

Related Essays

A Hierarchical Frameworkmodel Of Mobile Security

3701 words - 15 pages research layout, since, based on the common security theory Application Layer Wireless/Mobile Wired/Fixed QoS; Distributed MM Transport Layer Network Layer Data Link Layer Physical Layer Communication Entity Databases Computing Modes Programming Languages Operating Systems Terminals & Devices Computer Networks Human Interfaces Media Computing Media Communications Recognition Enhancement Compression Digitizing Hyper-M Video Audio

Jsb Market Research Middle East Mobile Voice And Mobile Operators Market

5363 words - 22 pages implemented, multi-SIM ownership was further exacerbated by the lack of MNP. Both operators have deployed sophisticated HSPA+ and LTE networks. Yemen’s mobile networks were shut down a number of times due to war or security problems until being reconnected in early 1998. The market is served by three GSM and one CDMA operator. Current penetration levels indicate there is much room for growth, with prepaid services accounting for the

Global Mobile Payment Market Analysis, Applications, Trends, Opportunities, Growth And Forecast, 2014 2020

574 words - 3 pages . The report has extensive geographical and regulation coverage of several emerging and developed markets in depth. It also does a company analysis of 14 key mobile payment companies Application analysis of Mobile Payment Market: • Prepaid Mobile Wallet • Close loop payments • Person to Person (P2P) • Carrier Billing • Mobile Commerce (POS) Regulatory implication in markets Developing markets 1. India 2. China 3. Vietnam 4

Obstacles To Implementation Of Mobile Payment

1212 words - 5 pages -expensive-ever [ 7 ]. ‘Provisioning’ covers the process of preparing and loading an application on a user’s phone with personalized account data. It also includes the deployment of unique personalization keys to protect the loading of information to the device and the transactions made by the payment application. [ 8 ]. http://www.paymentssecurity.com/2011/05/security-challenges-in-the-age-of-mobile-payments.html by Steve Brunswick