Mobile Security Case Study

Improved Essays
Security risks involved in building a mobile application
The mobile devices are able to handle all the tasks that were accessed by the personal computers, from texting, calling, video conferencing, browsing too many other activities. The increase in the number of mobile users has forced the companies and the business to make their mobile presence in the industry.
Apart from the business details and information, the information about the customer or the partner is also shared in the app, so it is very important to safeguard and protect their personal information. According to the developers the top most priority is the security offered by the app to its users.
The security has also become the most significant quality of the mobile apps after
…show more content…
Mobile app interacts with the internal server
The mobile application is connected to the internal server. Generally, the users focus on the mobile security that takes care of the mobile device, but the actual risk is at the place where the phone meets the external servers, and the testing and modeling of the security by the company must focus on this reality to actually protect the device and target server. Because if the attacker is able to hack the device, it is easy for them to find out the internal server that responds to the inbound request for the phone.
Data encryption and HTTPS encryption
The in-built security apps are reliable only on the devices where the pass code is set, but it is not a trusted source. The application developers must use encrypted library files like the javax.crypto and other common crypto files that includes passwords, log files, personally identified information, tokens, cookies, protected health information and others. However, this is not applicable to the data written to the file
…show more content…
The mobile apps are used by the organizations to align with the evolving technology and to improve the productivity of the employees, but when it comes to the security of the apps- there are still questions on how far they are protected and secured from the cyber hackers.
A survey report released the information about the free mobile apps and the top paid apps- the report released the number of applications that have been hacked by the hackers. About 53% of the free apps on the iOs had been hacked and 56% of the hundred paid apps also have been hacked and 73% of the apps from the Google Android platform and one hundred percent of the hundred paid apps were also hacked by the malicious hackers.
There are few essential ways in which the mobile applications can be secured and decrease the business exposure associated with the mobile platform.
Secure App

Related Documents

  • Improved Essays

    Also, the correct internet browsing security configuration setting should be implemented on the end users laptop to allow first party cookies, and blocking the third party cookies from other websites to protect from tracking and advertisements. By hardening it means that “Protection is provided in various layers and is often referred to as defense in depth. Protecting in layers means to protect at the host level, the application level, the operating system level, the user level, the physical level and all the sublevels in between” [1]. The best practices recommends that the antivirus program should be scheduled periodically to monitor any…

    • 730 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Throughout the insightful article, The Criminal Indictment That Could Finally Hit Spyware Makers Hard, written by Kim Zetter refers to incidents and consequences of on-line threats. This article displays the legal case against Hammad Akbar, CEO of the firm InvoCode designed StealthGenie, a spy app for Android phones, iPhones and Blackberry devices (Zetter 1). Within the beginning portion of the article, Zetter explains how the cellular device app had the capability to “secretly record phone calls and siphoned text messages and other data from a target’s phone, all of which customers of the software could view online” (Zetter 1). Not only did the threat of having phone calls and text message privacy invaded, the threat of the app also “allowed…

    • 442 Words
    • 2 Pages
    Improved Essays
  • Superior Essays

    ABC Company's Workgroup to Domain Transition James M. Ghastin ISSC340 Local Area Network Technologies American Military University Abstract The ABC company has been doing extremely well in the app development market. Consumers are downloading the most recent game developed for Android phones at an extremely fast pace. With the success of both this year's game and last year's game, ABC company has had to hire new employees and expand.…

    • 1339 Words
    • 6 Pages
    Superior Essays
  • Superior Essays

    People high self-esteem Dreams of unification have been sadly lost to a cell phones because depression has taken a toll on userspeople, in fact the tedious device worsens their characterheart ache. The myth of mobile devices enforce the sense of security is a false accusation because the truth is cell phones spark insecurity that creates…

    • 1226 Words
    • 5 Pages
    Superior Essays
  • Superior Essays

    Until my most recent smartphone, I have taken the time to research and undergo the process of unlocking my device. When I first began to take part in this culture, I wanted to understand for myself what features I was missing out on. I soon realized that there were numerous advantages to unlocking my Android phone that I never would have had the opportunity to experience if I had conformed to the standard Android expected of me. As the years have passed, I have associated the act of unlocking my phone as a right rather than a risk that Android allows me to take. Wu’s article notes that there are risks to tampering with a smartphone’s software, but taking on those risks should be a personal choice and not something a phone manufacturer can force upon a customer.…

    • 714 Words
    • 3 Pages
    Superior Essays
  • Improved Essays

    Discover our solutions that will allow you to enable display security for your device as much as is possible, whether it is an iPhone, an Android, a tablet or a laptop, and to act efficiently in the event of a problem. However, you have a lot of display security solutions, besides starting with at least an unlock code, which will discourage the majority of attempts to intrude into the system. Device systems are usually designed so that developers build their apps with the default system and file permissions and thus avoid potential security concerns. When using a professional device, beware of downloaded applications. To enable display security for your device in "Android Device Manager," enable or disable "Locate this device remotely" and "Allow remote locking and…

    • 551 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Distracted driving, whether it be texting, talking on the phone, or something as absurd as reading the newspaper creates many problems on the road. Salvucci and Taatgen (2011) of The Oxford University Press bring up an interesting observation of how most people readily agree that when drivers stop looking at the road, their performance severely suffers. This statement, without distinction of any specific activity that the driver might be participating in, makes for a relatively true observation – but when the activity is clarified to be texting while driving, the tone might change. When someone steps into the driver’s seat of a car, they take on the responsibility of driving with care and safety, because it’s not just their lives that are thrust…

    • 1949 Words
    • 8 Pages
    Improved Essays
  • Great Essays

    (Jayakumar, Tahora, 2016) In Apple attitude, the protection and privacy of Apple’s customers and partners estimated at least 1 billion devices (Statt, 2016) dictate their refusal based on the amount of the good for the largest amount of people. Similarly, rights of the users to choose privacy and the integrity of Apple to provide secure and encrypted products to its customers. Moreover, Apple competitive advantages, costs, and level of effort to build a backdoor to the iPhone could have future negative consequences on consumers’ expectations, sentiments, and trust. (Jayakumar, Tahora,…

    • 1298 Words
    • 6 Pages
    Great Essays
  • Improved Essays

    Executive summary With the change in economic environment, technology is also changing. In the recent few years, the number of smart phone users has increased rapidly. The Smartphone has created a different image in the minds of people and became a part of their life. The Smartphone is not only the mode of communication, but also best medium of entertainment. Its different qualities and features have made it popular worldwide.…

    • 3878 Words
    • 16 Pages
    Improved Essays
  • Great Essays

    Question 1: Assess the attractiveness of the Telecommunication Industry in 1998? (50%) According to Michael E. Porter’s five forces of analysis we can obtain the opportunities, threats and profitability in Telecommunication Industry. o THREAT OF NEW MARKET ENTRANT. •…

    • 1986 Words
    • 8 Pages
    Great Essays
  • Improved Essays

    Provide suggestions or recommendations to disadvantage as discussed earlier. Every different company have their own different ways to running their business. Their ways may be similar with the other company but Apple Inc. always operating their company with their own unique method. It helps their company seem different compare with the other company in smartphone and technology area, and the greatest harvest is they had successfully winning the interest of the customers. These special methods bring all kinds of benefits, but at the same time, they also bring many disadvantages to…

    • 1080 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Cell Phone Safety

    • 1387 Words
    • 6 Pages

    The mobile phone is great technology and is a must-have for life in the 21st century. Today smart phones are a part of everyday life. Millions of people wouldn’t leave their homes without it. Communication and mobility are two very important things in today’s society. The Smartphone enables both.…

    • 1387 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    There are multiple ways to communicate with a smart phone. Society can communicate through call, text, video, and apps. A bonus is people can take their smart phone anywhere with them. In fact, people operate their smart phones for business, family, friends, personal, maybe even business meetings and who knows what else. There are innumerable ways to operate it for communication, I can’t name them…

    • 775 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Everybody tends to have a cellphone nowadays. In the communications generation it is really important to be connected with people around. Thereby we need to own a cellphone, specifically smartphones, to join in the social networks. Choosing a smartphone is not an easy decision. Generally there are two big options when it comes to smartphones, Android phones and iPhones.…

    • 825 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Nowadays, technology develops better and better. Some people can 't even live without a mobile device for a day. Right now, people all use their phone to make the social communication, they use the phone to make a call, to text, to go to Facebook, Instagram and all the social media apps. Mobile phone become a part of peopl 's basic life. But if we don 't find a right way to use the phone, it will bring negative effect to our daily life.…

    • 774 Words
    • 4 Pages
    Improved Essays