![Page 1: Mobile Security with Intuitive Mobile Application Testing Practices](https://reader035.vdocuments.mx/reader035/viewer/2022081605/587b11c41a28abb15c8b67e7/html5/thumbnails/1.jpg)
MOBILE SECURITY WITH INTUITIVE MOBILE APPLICATION TESTING PRACTICES
![Page 2: Mobile Security with Intuitive Mobile Application Testing Practices](https://reader035.vdocuments.mx/reader035/viewer/2022081605/587b11c41a28abb15c8b67e7/html5/thumbnails/2.jpg)
TESTING OF MOBILE DEVICE AND APPS TO IMPROVISE SECURITY• Mobile Security – Protection Of
Smart Phones Tablets Laptops Wearables
![Page 3: Mobile Security with Intuitive Mobile Application Testing Practices](https://reader035.vdocuments.mx/reader035/viewer/2022081605/587b11c41a28abb15c8b67e7/html5/thumbnails/3.jpg)
THREATS
![Page 4: Mobile Security with Intuitive Mobile Application Testing Practices](https://reader035.vdocuments.mx/reader035/viewer/2022081605/587b11c41a28abb15c8b67e7/html5/thumbnails/4.jpg)
APPLICATION SECURITY
• Magnitude Of Apps Downloaded • Multiple Permissions Request • Misuse Of Data• Typically Confidential And Critical Data Shared
Contacts Location Details Calendar Details
• Virus Infected Apps
![Page 5: Mobile Security with Intuitive Mobile Application Testing Practices](https://reader035.vdocuments.mx/reader035/viewer/2022081605/587b11c41a28abb15c8b67e7/html5/thumbnails/5.jpg)
DEVICE DATA LEAKAGES & INSECURE DATA STORAGES
• Mobile Malware Used To Hack Confidential Data Sensitive Data
• Data Leaks While Syncing With Enterprise Cloud• App Designs Over Look
Account Details Credit Card Numbers
• Secure Storage Methods
![Page 6: Mobile Security with Intuitive Mobile Application Testing Practices](https://reader035.vdocuments.mx/reader035/viewer/2022081605/587b11c41a28abb15c8b67e7/html5/thumbnails/6.jpg)
LACK OF DATA ENCRYPTION & BROKEN CRYPTOGRAPHY
• Common Encryption Methods are Not Fool-proof• Proper Testing Methods Advised • Cryptographic Keys Included On The Device• Keys Management On Central Server
![Page 7: Mobile Security with Intuitive Mobile Application Testing Practices](https://reader035.vdocuments.mx/reader035/viewer/2022081605/587b11c41a28abb15c8b67e7/html5/thumbnails/7.jpg)
WEAK BACK-END SECURITY • Proper Security On Servers Accessed By Apps• Device Test Strategy Helps
![Page 8: Mobile Security with Intuitive Mobile Application Testing Practices](https://reader035.vdocuments.mx/reader035/viewer/2022081605/587b11c41a28abb15c8b67e7/html5/thumbnails/8.jpg)
UNENCRYPTED WIRELESS TRANSMISSIONS• Un – Encrypted Data Transfers Can Be Intercepted In
Emails App Data
![Page 9: Mobile Security with Intuitive Mobile Application Testing Practices](https://reader035.vdocuments.mx/reader035/viewer/2022081605/587b11c41a28abb15c8b67e7/html5/thumbnails/9.jpg)
POOR MDM POLICIES
• BYOD – Poses security threats• Less Rigorous MDM Practices
Leads To Unauthorized Data Access
• A Good MDM Appreciates Differences in
Devices Operating Systems Management Strategy
• Stolen Devices
![Page 10: Mobile Security with Intuitive Mobile Application Testing Practices](https://reader035.vdocuments.mx/reader035/viewer/2022081605/587b11c41a28abb15c8b67e7/html5/thumbnails/10.jpg)
MALWARE ATTACKS • Malware Attacks Are Not Treated Properly• SMS Routed Trojan Virus Attacks
![Page 11: Mobile Security with Intuitive Mobile Application Testing Practices](https://reader035.vdocuments.mx/reader035/viewer/2022081605/587b11c41a28abb15c8b67e7/html5/thumbnails/11.jpg)
VULNERABILITIESData Flow & Audit Trails
Data Storage EncryptionDatabases
CloudsData Leakage Points
User Authentication & Authorization
Points Of Entry Into The SystemBack End
Lost Device Management
![Page 12: Mobile Security with Intuitive Mobile Application Testing Practices](https://reader035.vdocuments.mx/reader035/viewer/2022081605/587b11c41a28abb15c8b67e7/html5/thumbnails/12.jpg)
SECURITY REQUIREMENTS
• Define Scope Under Usefulness Of The Mobile System
• Study The Scope • Gauge
• Security Requirements Probable Breaches Expected Attacks
• Determine The Testing Framework And Tools According To Requirements
![Page 13: Mobile Security with Intuitive Mobile Application Testing Practices](https://reader035.vdocuments.mx/reader035/viewer/2022081605/587b11c41a28abb15c8b67e7/html5/thumbnails/13.jpg)
TESTING RULES
• A Healthy Balance between Automated and Manual Testing Tools
• Human Intelligence Should Be Used • Use Multiple Mobile App Testing Tools • Versatile Team With Dynamic Testers
![Page 14: Mobile Security with Intuitive Mobile Application Testing Practices](https://reader035.vdocuments.mx/reader035/viewer/2022081605/587b11c41a28abb15c8b67e7/html5/thumbnails/14.jpg)
VISITW W W. S P E C - I N D I A . C O M
& R E Q U E S T A F R E E P O C
T O T E S T D R I V E O U R S E RV I C E S