- Mobile Application Penetration Testing
- Vijay Kumar Velu
- 416字
- 2021-07-16 12:46:38
Chapter 1. The Mobile Application Security Landscape
Life is now in the palm of your hands. Risk is real, threats are growing!
With more than 1 billion users worldwide and 2.5 million applications (and still counting) available across Google and Apple digital marketplaces, smartphones have become commonplace. The difference they make to our lives is stark and simple, and is impacting our day to day life in multiple ways—in particular, the way we interact, work, and socialize. The increase in demand from consumer market and processing power and the capabilities of smartphones, such as storage, GPS, camera, displays, and so on, have changed the paradigm of the development of mobile applications. The ability to do online banking, trading, e-mails, airport check-ins, and much more is just a tap away.
Mobile application development is the hottest type of software development right now. New surface area equals dangerous surface area, which means that the uppermost layer of smartphones is mobile apps, which are the potential targets of adversaries.
This chapter will cover the current state of mobile application security. We will discuss some of the public vulnerabilities that are disclosed in various mobile applications in order to provide a context and reasons why security needs to be at the forefront of every mobile application developer's mind. We will also cover the following topics:
- Android and iOS vulnerabilities
- Key challenges in mobile application security
- The impact of mobile application security
- The need for mobile application penetration testing
- The mobile application penetration testing methodology
- The OWASP (short for Open Web Application Security Project) mobile top 10 risks
There is no doubt that mobile applications have emerged as one of the most significant innovations of all time. Statista (for more information, visit http://www.statista.com/), a statistical portal company, reports that there are around 1.6 million applications in Google Play Store, 1.5 million applications in the Apple app store, 400,000 applications in the Amazon app store, 340,000 applications in Windows Phone Store, and 130,000 applications in Blackberry World. These statistics alone reflect the exponential growth in mobile applications over the years.
Numerous applications are introduced in stores every single week. At the same time, thousands of cyber criminals, also known as hackers, keep a tab on these applications by constantly looking for new applications that are published to the stores and try to compromise the user information or embed any malicious programs by various techniques. None of the development frameworks currently used are proven as immune to security issues.
- Python數(shù)據(jù)分析入門:從數(shù)據(jù)獲取到可視化
- 企業(yè)大數(shù)據(jù)系統(tǒng)構(gòu)建實戰(zhàn):技術(shù)、架構(gòu)、實施與應(yīng)用
- 深度剖析Hadoop HDFS
- 網(wǎng)站數(shù)據(jù)庫技術(shù)
- 大數(shù)據(jù)精準(zhǔn)挖掘
- Oracle RAC日記
- 淘寶、天貓電商數(shù)據(jù)分析與挖掘?qū)崙?zhàn)(第2版)
- 貫通SQL Server 2008數(shù)據(jù)庫系統(tǒng)開發(fā)
- 區(qū)域云計算和大數(shù)據(jù)產(chǎn)業(yè)發(fā)展:浙江樣板
- SQL Server 2012實施與管理實戰(zhàn)指南
- 數(shù)據(jù)庫與數(shù)據(jù)處理:Access 2010實現(xiàn)
- 中文版Access 2007實例與操作
- 企業(yè)主數(shù)據(jù)管理實務(wù)
- 智慧城市中的大數(shù)據(jù)分析技術(shù)
- 大數(shù)據(jù)與機(jī)器學(xué)習(xí):實踐方法與行業(yè)案例