SlideShare une entreprise Scribd logo
1  sur  1
Télécharger pour lire hors ligne
THE MOBILE
ATTACK SURFACE
Copyright © 2017 Accenture
All rights reserved.
Accenture, its logo, and
High Performance Delivered are
trademarks of Accenture. 172091
SECURITY
CHALLENGES
FOR BANKS
According to analysis and estimates by NowSecure, Inc. (NowSecure):1
The proliferation of mobile devices,
applications (apps) and operating systems
continues to drive innovation and expand the
mobile ecosystem. However, this continued
expansion may also create unique security
risks around the storage and transmission of
sensitive information via mobile devices.
ATTACK SURFACE: THE DEVICE ATTACK SURFACE: THE NETWORK
ATTACK SURFACE: THE DATA CENTER
• Wi-Fi (No Encryption/Weak Encryption)
• Rogue Access Point
• Packet Sniffing
• Man-in-the-Middle (MITM)
• Session Hacking
• DNS (Domain Name System) Poisoning
• SSL (Secure Sockets Layer) Strip
• Fake SSL Certificate
WEB SERVER
• Platform Vulnerabilities
• Server Misconfiguration
• Cross-Site Scripting (XSS)
• Cross-Site Request Forgery (XSRF)
• Weak Input Validation
• Brute Force Attacks
DATABASE
• SQL Injection
• Privilege Escalation
• Data Dumping
• OS Command Execution
BROWSER
• Phishing
• Framing
• Clickjacking
• Man-in-the-Middle
• Buffer Overflow
• Data Caching
PHONE/SMS
• Baseband Attacks
• SMishing
MALWARE
SYSTEM
• No Passcode/
Weak Passcode
• iOS® Jailbreak
• Android™ Rooting
• OS Data Caching
• Passwords and
Data Accessible
• Carrier-Loaded
Software
• No Encryption/
Weak Encryption
• User-Initiated Code
APPS
• Sensitive Data
Storage
• No Encryption/
Weak Encryption
• Improper SSL
Validation
• Config Manipulation
• Dynamic Runtime
Injection
• Unintented
Permissions
• Escalated Privileges
There are three areas in the mobile technology chain where
parties may exploit vulnerabilities to launch malicious attacks;
the device, the network and the data center.2
FOR MORE INFORMATION, VISIT:
Accenture Finance and Risk:
www.accenture.com/financeandrisk
Accenture Security:
www.accenture.com/us-en/security-index
REFERENCES
1. Secure Mobile Development Best Practices,” NowSecure. Access at:
https://www.nowsecure.com/ebooks/secure-mobile-development-be
st-practices/.
2. Ibid
3. Mobile Banking Applications: Security Challenges for Banks,
Accenture and NowSecure, April 2017.
Copyright © NowSecure, Inc. All rights reserved.
The NowSecure name and logo are trademarks of
NowSecure, Inc. and are used with permission.
Rights to trademarks referenced herein, other than
Accenture trademarks, belong to their respective
owners. We disclaim proprietary interest in the
marks and names of others.
35 PERCENT
of communications sent
by mobile devices are
unencrypted and the average
device connects to over
160 unique IP addresses daily.
As mobile devices continue to
replace legacy hardware across
organizations and industries, it
is critical that security remains
top-of-mind and is embedded
within the app development
lifecycle. With this in mind,
Accenture and NowSecure
collaborated to analyze the
mobile threat landscape,
specifically for customer-facing
mobile banking apps.
ONE IN FOUR
mobile apps include at least
one high-risk security flaw.
43 PERCENT
of mobile device users do
not use a passcode, PIN or
pattern lock on their devices.
TOP SECURITY
RISKS FOR MOBILE
BANKING APPS
To assess the security of mobile banking apps against fraud and
penetration attempts, static and dynamic analysis was performed
using the NowSecure Lab Automated tool. The vulnerability
assessment included customer-facing mobile banking apps from
15 unique North American financial institutions on both iOS® and
Android™ operating systems (30 total apps).
All apps included in scope were publicly available and downloaded directly from
the respective online app stores. A total of 780 tests were performed across the
apps in scope. Overall, every app tested had at least one security issue.3
The top
risks identified appear below.
Applications running on
Android™ Operating System
Applications running on
iOS® Operating System
WORLD-WRITABLE FILES
CVSS 7.7 – 33%
WRITABLE EXECUTABLES
CVSS 7.7 – 7%
BROKEN SSL (SECURE SOCKETS
LAYER) & SENSITIVE DATA IN
TRANSIT (WITH ENCRYPTION)
CVSS 7.4 – 13%
OBFUSCATION
CVSS N/A – 60%
SECURERANDOM
CVSS 5.5 – 73%
COOKIE “HTTPONLY” TAG
CVSS 5.3 – 40%
TLS (TRANSPORT LAYER
SECURITY) TRAFFIC WITH
SENSITIVE DATA
CVSS 1.6 – 80%
APP TRANSPORT SECURITY
CVSS N/A – 60%
DYNAMIC CODE LOADING
CVSS 4.3 – 33%
IMPACT VULNERABILITY SCALE:
Low
Medium
High
BANKING
MOBILE
APPLICATIONS
EMBEDDING
SECURITY IN MOBILE
DEVELOPMENT
LIFECYCLE
The mobile development field is a complex environment that is
constantly evolving, which creates a hyper-dynamic environment
for developers. These complexities often increase the attack surface,
with mobile devices constantly challenging the boundaries of an
organization’s security perimeter. Mobile apps should, at a minimum, be
developed with the same security standards as any other software asset.
Accenture has identified key principles to help organizations develop a comprehensive
program for embedding security throughout the enterprise’s mobile lifecycle.
Developing a strategy, grounded by six (6) key principles, allows banks to proactively
address security vulnerabilities throughout the mobile development lifecycle and
promote informed decisions around security risks.
Leading organizations recognize the expansion of mobile technologies within their
enterprise and proactively seek ways to securely integrate them to further enable
their workforce and achieve business goals by:
4. Understanding the impact
across the organization
and the processes needed
to support it.
2. Identifying the resources
and systems that are affected
by the introduction of mobile
technologies.
3. Selecting the technologies
and implementing controls to
meet requirements defined
by business needs as well as
compliance requirements.
1. Developing a mobile
security strategy to properly
integrate with the overall
security and business strategy.
1. DEVICE 2. NETWORK
3. DATA 4. APPLICATION
5. USER ACCESS 6. GOVERNANCE & COMPLIANCE
TOP RISKS IDENTIFIED AND CVSS
COOKIE “SECURE” TAG
CVSS 5.3 – 54%
CVSS: Common Vulnerability Scoring System

Contenu connexe

Plus de accenture

The Industrialist: Trends & Innovations - June 2023
The Industrialist: Trends & Innovations - June 2023The Industrialist: Trends & Innovations - June 2023
The Industrialist: Trends & Innovations - June 2023accenture
 
Reinventing Enterprise Operations
Reinventing Enterprise OperationsReinventing Enterprise Operations
Reinventing Enterprise Operationsaccenture
 
Semiconductor Gender Parity Study
Semiconductor Gender Parity StudySemiconductor Gender Parity Study
Semiconductor Gender Parity Studyaccenture
 
The Industrialist: Trends & Innovations - March 2023
The Industrialist: Trends & Innovations - March 2023The Industrialist: Trends & Innovations - March 2023
The Industrialist: Trends & Innovations - March 2023accenture
 
Nonprofit reinvention in a time of unprecedented change
 Nonprofit reinvention in a time of unprecedented change Nonprofit reinvention in a time of unprecedented change
Nonprofit reinvention in a time of unprecedented changeaccenture
 
Free to be 100% me
Free to be 100% meFree to be 100% me
Free to be 100% meaccenture
 
The Industrialist: Trends & Innovations - February 2023
The Industrialist: Trends & Innovations - February 2023The Industrialist: Trends & Innovations - February 2023
The Industrialist: Trends & Innovations - February 2023accenture
 
Mundo gamer e a oportunidade de entrada pela abordagem do movimento
Mundo gamer e a oportunidade de entrada pela abordagem do movimentoMundo gamer e a oportunidade de entrada pela abordagem do movimento
Mundo gamer e a oportunidade de entrada pela abordagem do movimentoaccenture
 
Pathways to Profitability for the Communications Industry
Pathways to Profitability for the Communications IndustryPathways to Profitability for the Communications Industry
Pathways to Profitability for the Communications Industryaccenture
 
The Industrialist: Trends & Innovations - January 2023
The Industrialist: Trends & Innovations - January 2023The Industrialist: Trends & Innovations - January 2023
The Industrialist: Trends & Innovations - January 2023accenture
 
Reimagining the Agenda | Accenture
Reimagining the Agenda | AccentureReimagining the Agenda | Accenture
Reimagining the Agenda | Accentureaccenture
 
Climate Leadership Eleventh Hour | Accenture
Climate Leadership Eleventh Hour | AccentureClimate Leadership Eleventh Hour | Accenture
Climate Leadership Eleventh Hour | Accentureaccenture
 
Sustainable Value Chain
Sustainable Value ChainSustainable Value Chain
Sustainable Value Chainaccenture
 
Chemical Companies in the Metaverse
Chemical Companies in the MetaverseChemical Companies in the Metaverse
Chemical Companies in the Metaverseaccenture
 
Sustainable Value Chain
Sustainable Value ChainSustainable Value Chain
Sustainable Value Chainaccenture
 
Value Untangled Slideshare
Value Untangled SlideshareValue Untangled Slideshare
Value Untangled Slideshareaccenture
 
The Industrialist: Trends & Innovations - November 2022
The Industrialist: Trends & Innovations - November 2022The Industrialist: Trends & Innovations - November 2022
The Industrialist: Trends & Innovations - November 2022accenture
 
Health Experience: The difference between loyalty & leaving
Health Experience: The difference between loyalty & leavingHealth Experience: The difference between loyalty & leaving
Health Experience: The difference between loyalty & leavingaccenture
 
The Reinvention Reset | Accenture
The Reinvention Reset | AccentureThe Reinvention Reset | Accenture
The Reinvention Reset | Accentureaccenture
 
Metaverse opportunities for the communications industry
 Metaverse opportunities for the communications industry Metaverse opportunities for the communications industry
Metaverse opportunities for the communications industryaccenture
 

Plus de accenture (20)

The Industrialist: Trends & Innovations - June 2023
The Industrialist: Trends & Innovations - June 2023The Industrialist: Trends & Innovations - June 2023
The Industrialist: Trends & Innovations - June 2023
 
Reinventing Enterprise Operations
Reinventing Enterprise OperationsReinventing Enterprise Operations
Reinventing Enterprise Operations
 
Semiconductor Gender Parity Study
Semiconductor Gender Parity StudySemiconductor Gender Parity Study
Semiconductor Gender Parity Study
 
The Industrialist: Trends & Innovations - March 2023
The Industrialist: Trends & Innovations - March 2023The Industrialist: Trends & Innovations - March 2023
The Industrialist: Trends & Innovations - March 2023
 
Nonprofit reinvention in a time of unprecedented change
 Nonprofit reinvention in a time of unprecedented change Nonprofit reinvention in a time of unprecedented change
Nonprofit reinvention in a time of unprecedented change
 
Free to be 100% me
Free to be 100% meFree to be 100% me
Free to be 100% me
 
The Industrialist: Trends & Innovations - February 2023
The Industrialist: Trends & Innovations - February 2023The Industrialist: Trends & Innovations - February 2023
The Industrialist: Trends & Innovations - February 2023
 
Mundo gamer e a oportunidade de entrada pela abordagem do movimento
Mundo gamer e a oportunidade de entrada pela abordagem do movimentoMundo gamer e a oportunidade de entrada pela abordagem do movimento
Mundo gamer e a oportunidade de entrada pela abordagem do movimento
 
Pathways to Profitability for the Communications Industry
Pathways to Profitability for the Communications IndustryPathways to Profitability for the Communications Industry
Pathways to Profitability for the Communications Industry
 
The Industrialist: Trends & Innovations - January 2023
The Industrialist: Trends & Innovations - January 2023The Industrialist: Trends & Innovations - January 2023
The Industrialist: Trends & Innovations - January 2023
 
Reimagining the Agenda | Accenture
Reimagining the Agenda | AccentureReimagining the Agenda | Accenture
Reimagining the Agenda | Accenture
 
Climate Leadership Eleventh Hour | Accenture
Climate Leadership Eleventh Hour | AccentureClimate Leadership Eleventh Hour | Accenture
Climate Leadership Eleventh Hour | Accenture
 
Sustainable Value Chain
Sustainable Value ChainSustainable Value Chain
Sustainable Value Chain
 
Chemical Companies in the Metaverse
Chemical Companies in the MetaverseChemical Companies in the Metaverse
Chemical Companies in the Metaverse
 
Sustainable Value Chain
Sustainable Value ChainSustainable Value Chain
Sustainable Value Chain
 
Value Untangled Slideshare
Value Untangled SlideshareValue Untangled Slideshare
Value Untangled Slideshare
 
The Industrialist: Trends & Innovations - November 2022
The Industrialist: Trends & Innovations - November 2022The Industrialist: Trends & Innovations - November 2022
The Industrialist: Trends & Innovations - November 2022
 
Health Experience: The difference between loyalty & leaving
Health Experience: The difference between loyalty & leavingHealth Experience: The difference between loyalty & leaving
Health Experience: The difference between loyalty & leaving
 
The Reinvention Reset | Accenture
The Reinvention Reset | AccentureThe Reinvention Reset | Accenture
The Reinvention Reset | Accenture
 
Metaverse opportunities for the communications industry
 Metaverse opportunities for the communications industry Metaverse opportunities for the communications industry
Metaverse opportunities for the communications industry
 

Dernier

20240429 Calibre April 2024 Investor Presentation.pdf
20240429 Calibre April 2024 Investor Presentation.pdf20240429 Calibre April 2024 Investor Presentation.pdf
20240429 Calibre April 2024 Investor Presentation.pdfAdnet Communications
 
TEST BANK For Corporate Finance, 13th Edition By Stephen Ross, Randolph Weste...
TEST BANK For Corporate Finance, 13th Edition By Stephen Ross, Randolph Weste...TEST BANK For Corporate Finance, 13th Edition By Stephen Ross, Randolph Weste...
TEST BANK For Corporate Finance, 13th Edition By Stephen Ross, Randolph Weste...ssifa0344
 
The Economic History of the U.S. Lecture 17.pdf
The Economic History of the U.S. Lecture 17.pdfThe Economic History of the U.S. Lecture 17.pdf
The Economic History of the U.S. Lecture 17.pdfGale Pooley
 
The Economic History of the U.S. Lecture 30.pdf
The Economic History of the U.S. Lecture 30.pdfThe Economic History of the U.S. Lecture 30.pdf
The Economic History of the U.S. Lecture 30.pdfGale Pooley
 
Call US 📞 9892124323 ✅ Kurla Call Girls In Kurla ( Mumbai ) secure service
Call US 📞 9892124323 ✅ Kurla Call Girls In Kurla ( Mumbai ) secure serviceCall US 📞 9892124323 ✅ Kurla Call Girls In Kurla ( Mumbai ) secure service
Call US 📞 9892124323 ✅ Kurla Call Girls In Kurla ( Mumbai ) secure servicePooja Nehwal
 
Dharavi Russian callg Girls, { 09892124323 } || Call Girl In Mumbai ...
Dharavi Russian callg Girls, { 09892124323 } || Call Girl In Mumbai ...Dharavi Russian callg Girls, { 09892124323 } || Call Girl In Mumbai ...
Dharavi Russian callg Girls, { 09892124323 } || Call Girl In Mumbai ...Pooja Nehwal
 
Log your LOA pain with Pension Lab's brilliant campaign
Log your LOA pain with Pension Lab's brilliant campaignLog your LOA pain with Pension Lab's brilliant campaign
Log your LOA pain with Pension Lab's brilliant campaignHenry Tapper
 
The Economic History of the U.S. Lecture 21.pdf
The Economic History of the U.S. Lecture 21.pdfThe Economic History of the U.S. Lecture 21.pdf
The Economic History of the U.S. Lecture 21.pdfGale Pooley
 
Interimreport1 January–31 March2024 Elo Mutual Pension Insurance Company
Interimreport1 January–31 March2024 Elo Mutual Pension Insurance CompanyInterimreport1 January–31 March2024 Elo Mutual Pension Insurance Company
Interimreport1 January–31 March2024 Elo Mutual Pension Insurance CompanyTyöeläkeyhtiö Elo
 
VVIP Pune Call Girls Katraj (7001035870) Pune Escorts Nearby with Complete Sa...
VVIP Pune Call Girls Katraj (7001035870) Pune Escorts Nearby with Complete Sa...VVIP Pune Call Girls Katraj (7001035870) Pune Escorts Nearby with Complete Sa...
VVIP Pune Call Girls Katraj (7001035870) Pune Escorts Nearby with Complete Sa...Call Girls in Nagpur High Profile
 
Independent Lucknow Call Girls 8923113531WhatsApp Lucknow Call Girls make you...
Independent Lucknow Call Girls 8923113531WhatsApp Lucknow Call Girls make you...Independent Lucknow Call Girls 8923113531WhatsApp Lucknow Call Girls make you...
Independent Lucknow Call Girls 8923113531WhatsApp Lucknow Call Girls make you...makika9823
 
Quarter 4- Module 3 Principles of Marketing
Quarter 4- Module 3 Principles of MarketingQuarter 4- Module 3 Principles of Marketing
Quarter 4- Module 3 Principles of MarketingMaristelaRamos12
 
06_Joeri Van Speybroek_Dell_MeetupDora&Cybersecurity.pdf
06_Joeri Van Speybroek_Dell_MeetupDora&Cybersecurity.pdf06_Joeri Van Speybroek_Dell_MeetupDora&Cybersecurity.pdf
06_Joeri Van Speybroek_Dell_MeetupDora&Cybersecurity.pdfFinTech Belgium
 
Best VIP Call Girls Noida Sector 18 Call Me: 8448380779
Best VIP Call Girls Noida Sector 18 Call Me: 8448380779Best VIP Call Girls Noida Sector 18 Call Me: 8448380779
Best VIP Call Girls Noida Sector 18 Call Me: 8448380779Delhi Call girls
 
Vip B Aizawl Call Girls #9907093804 Contact Number Escorts Service Aizawl
Vip B Aizawl Call Girls #9907093804 Contact Number Escorts Service AizawlVip B Aizawl Call Girls #9907093804 Contact Number Escorts Service Aizawl
Vip B Aizawl Call Girls #9907093804 Contact Number Escorts Service Aizawlmakika9823
 
Dividend Policy and Dividend Decision Theories.pptx
Dividend Policy and Dividend Decision Theories.pptxDividend Policy and Dividend Decision Theories.pptx
Dividend Policy and Dividend Decision Theories.pptxanshikagoel52
 
Russian Call Girls In Gtb Nagar (Delhi) 9711199012 💋✔💕😘 Naughty Call Girls Se...
Russian Call Girls In Gtb Nagar (Delhi) 9711199012 💋✔💕😘 Naughty Call Girls Se...Russian Call Girls In Gtb Nagar (Delhi) 9711199012 💋✔💕😘 Naughty Call Girls Se...
Russian Call Girls In Gtb Nagar (Delhi) 9711199012 💋✔💕😘 Naughty Call Girls Se...shivangimorya083
 
Monthly Market Risk Update: April 2024 [SlideShare]
Monthly Market Risk Update: April 2024 [SlideShare]Monthly Market Risk Update: April 2024 [SlideShare]
Monthly Market Risk Update: April 2024 [SlideShare]Commonwealth
 
The Economic History of the U.S. Lecture 22.pdf
The Economic History of the U.S. Lecture 22.pdfThe Economic History of the U.S. Lecture 22.pdf
The Economic History of the U.S. Lecture 22.pdfGale Pooley
 

Dernier (20)

20240429 Calibre April 2024 Investor Presentation.pdf
20240429 Calibre April 2024 Investor Presentation.pdf20240429 Calibre April 2024 Investor Presentation.pdf
20240429 Calibre April 2024 Investor Presentation.pdf
 
TEST BANK For Corporate Finance, 13th Edition By Stephen Ross, Randolph Weste...
TEST BANK For Corporate Finance, 13th Edition By Stephen Ross, Randolph Weste...TEST BANK For Corporate Finance, 13th Edition By Stephen Ross, Randolph Weste...
TEST BANK For Corporate Finance, 13th Edition By Stephen Ross, Randolph Weste...
 
The Economic History of the U.S. Lecture 17.pdf
The Economic History of the U.S. Lecture 17.pdfThe Economic History of the U.S. Lecture 17.pdf
The Economic History of the U.S. Lecture 17.pdf
 
The Economic History of the U.S. Lecture 30.pdf
The Economic History of the U.S. Lecture 30.pdfThe Economic History of the U.S. Lecture 30.pdf
The Economic History of the U.S. Lecture 30.pdf
 
Call US 📞 9892124323 ✅ Kurla Call Girls In Kurla ( Mumbai ) secure service
Call US 📞 9892124323 ✅ Kurla Call Girls In Kurla ( Mumbai ) secure serviceCall US 📞 9892124323 ✅ Kurla Call Girls In Kurla ( Mumbai ) secure service
Call US 📞 9892124323 ✅ Kurla Call Girls In Kurla ( Mumbai ) secure service
 
Dharavi Russian callg Girls, { 09892124323 } || Call Girl In Mumbai ...
Dharavi Russian callg Girls, { 09892124323 } || Call Girl In Mumbai ...Dharavi Russian callg Girls, { 09892124323 } || Call Girl In Mumbai ...
Dharavi Russian callg Girls, { 09892124323 } || Call Girl In Mumbai ...
 
Log your LOA pain with Pension Lab's brilliant campaign
Log your LOA pain with Pension Lab's brilliant campaignLog your LOA pain with Pension Lab's brilliant campaign
Log your LOA pain with Pension Lab's brilliant campaign
 
The Economic History of the U.S. Lecture 21.pdf
The Economic History of the U.S. Lecture 21.pdfThe Economic History of the U.S. Lecture 21.pdf
The Economic History of the U.S. Lecture 21.pdf
 
Interimreport1 January–31 March2024 Elo Mutual Pension Insurance Company
Interimreport1 January–31 March2024 Elo Mutual Pension Insurance CompanyInterimreport1 January–31 March2024 Elo Mutual Pension Insurance Company
Interimreport1 January–31 March2024 Elo Mutual Pension Insurance Company
 
VVIP Pune Call Girls Katraj (7001035870) Pune Escorts Nearby with Complete Sa...
VVIP Pune Call Girls Katraj (7001035870) Pune Escorts Nearby with Complete Sa...VVIP Pune Call Girls Katraj (7001035870) Pune Escorts Nearby with Complete Sa...
VVIP Pune Call Girls Katraj (7001035870) Pune Escorts Nearby with Complete Sa...
 
Independent Lucknow Call Girls 8923113531WhatsApp Lucknow Call Girls make you...
Independent Lucknow Call Girls 8923113531WhatsApp Lucknow Call Girls make you...Independent Lucknow Call Girls 8923113531WhatsApp Lucknow Call Girls make you...
Independent Lucknow Call Girls 8923113531WhatsApp Lucknow Call Girls make you...
 
Quarter 4- Module 3 Principles of Marketing
Quarter 4- Module 3 Principles of MarketingQuarter 4- Module 3 Principles of Marketing
Quarter 4- Module 3 Principles of Marketing
 
06_Joeri Van Speybroek_Dell_MeetupDora&Cybersecurity.pdf
06_Joeri Van Speybroek_Dell_MeetupDora&Cybersecurity.pdf06_Joeri Van Speybroek_Dell_MeetupDora&Cybersecurity.pdf
06_Joeri Van Speybroek_Dell_MeetupDora&Cybersecurity.pdf
 
Best VIP Call Girls Noida Sector 18 Call Me: 8448380779
Best VIP Call Girls Noida Sector 18 Call Me: 8448380779Best VIP Call Girls Noida Sector 18 Call Me: 8448380779
Best VIP Call Girls Noida Sector 18 Call Me: 8448380779
 
Commercial Bank Economic Capsule - April 2024
Commercial Bank Economic Capsule - April 2024Commercial Bank Economic Capsule - April 2024
Commercial Bank Economic Capsule - April 2024
 
Vip B Aizawl Call Girls #9907093804 Contact Number Escorts Service Aizawl
Vip B Aizawl Call Girls #9907093804 Contact Number Escorts Service AizawlVip B Aizawl Call Girls #9907093804 Contact Number Escorts Service Aizawl
Vip B Aizawl Call Girls #9907093804 Contact Number Escorts Service Aizawl
 
Dividend Policy and Dividend Decision Theories.pptx
Dividend Policy and Dividend Decision Theories.pptxDividend Policy and Dividend Decision Theories.pptx
Dividend Policy and Dividend Decision Theories.pptx
 
Russian Call Girls In Gtb Nagar (Delhi) 9711199012 💋✔💕😘 Naughty Call Girls Se...
Russian Call Girls In Gtb Nagar (Delhi) 9711199012 💋✔💕😘 Naughty Call Girls Se...Russian Call Girls In Gtb Nagar (Delhi) 9711199012 💋✔💕😘 Naughty Call Girls Se...
Russian Call Girls In Gtb Nagar (Delhi) 9711199012 💋✔💕😘 Naughty Call Girls Se...
 
Monthly Market Risk Update: April 2024 [SlideShare]
Monthly Market Risk Update: April 2024 [SlideShare]Monthly Market Risk Update: April 2024 [SlideShare]
Monthly Market Risk Update: April 2024 [SlideShare]
 
The Economic History of the U.S. Lecture 22.pdf
The Economic History of the U.S. Lecture 22.pdfThe Economic History of the U.S. Lecture 22.pdf
The Economic History of the U.S. Lecture 22.pdf
 

Mobile Banking Applications: Security Challenges Infographic

  • 1. THE MOBILE ATTACK SURFACE Copyright © 2017 Accenture All rights reserved. Accenture, its logo, and High Performance Delivered are trademarks of Accenture. 172091 SECURITY CHALLENGES FOR BANKS According to analysis and estimates by NowSecure, Inc. (NowSecure):1 The proliferation of mobile devices, applications (apps) and operating systems continues to drive innovation and expand the mobile ecosystem. However, this continued expansion may also create unique security risks around the storage and transmission of sensitive information via mobile devices. ATTACK SURFACE: THE DEVICE ATTACK SURFACE: THE NETWORK ATTACK SURFACE: THE DATA CENTER • Wi-Fi (No Encryption/Weak Encryption) • Rogue Access Point • Packet Sniffing • Man-in-the-Middle (MITM) • Session Hacking • DNS (Domain Name System) Poisoning • SSL (Secure Sockets Layer) Strip • Fake SSL Certificate WEB SERVER • Platform Vulnerabilities • Server Misconfiguration • Cross-Site Scripting (XSS) • Cross-Site Request Forgery (XSRF) • Weak Input Validation • Brute Force Attacks DATABASE • SQL Injection • Privilege Escalation • Data Dumping • OS Command Execution BROWSER • Phishing • Framing • Clickjacking • Man-in-the-Middle • Buffer Overflow • Data Caching PHONE/SMS • Baseband Attacks • SMishing MALWARE SYSTEM • No Passcode/ Weak Passcode • iOS® Jailbreak • Android™ Rooting • OS Data Caching • Passwords and Data Accessible • Carrier-Loaded Software • No Encryption/ Weak Encryption • User-Initiated Code APPS • Sensitive Data Storage • No Encryption/ Weak Encryption • Improper SSL Validation • Config Manipulation • Dynamic Runtime Injection • Unintented Permissions • Escalated Privileges There are three areas in the mobile technology chain where parties may exploit vulnerabilities to launch malicious attacks; the device, the network and the data center.2 FOR MORE INFORMATION, VISIT: Accenture Finance and Risk: www.accenture.com/financeandrisk Accenture Security: www.accenture.com/us-en/security-index REFERENCES 1. Secure Mobile Development Best Practices,” NowSecure. Access at: https://www.nowsecure.com/ebooks/secure-mobile-development-be st-practices/. 2. Ibid 3. Mobile Banking Applications: Security Challenges for Banks, Accenture and NowSecure, April 2017. Copyright © NowSecure, Inc. All rights reserved. The NowSecure name and logo are trademarks of NowSecure, Inc. and are used with permission. Rights to trademarks referenced herein, other than Accenture trademarks, belong to their respective owners. We disclaim proprietary interest in the marks and names of others. 35 PERCENT of communications sent by mobile devices are unencrypted and the average device connects to over 160 unique IP addresses daily. As mobile devices continue to replace legacy hardware across organizations and industries, it is critical that security remains top-of-mind and is embedded within the app development lifecycle. With this in mind, Accenture and NowSecure collaborated to analyze the mobile threat landscape, specifically for customer-facing mobile banking apps. ONE IN FOUR mobile apps include at least one high-risk security flaw. 43 PERCENT of mobile device users do not use a passcode, PIN or pattern lock on their devices. TOP SECURITY RISKS FOR MOBILE BANKING APPS To assess the security of mobile banking apps against fraud and penetration attempts, static and dynamic analysis was performed using the NowSecure Lab Automated tool. The vulnerability assessment included customer-facing mobile banking apps from 15 unique North American financial institutions on both iOS® and Android™ operating systems (30 total apps). All apps included in scope were publicly available and downloaded directly from the respective online app stores. A total of 780 tests were performed across the apps in scope. Overall, every app tested had at least one security issue.3 The top risks identified appear below. Applications running on Android™ Operating System Applications running on iOS® Operating System WORLD-WRITABLE FILES CVSS 7.7 – 33% WRITABLE EXECUTABLES CVSS 7.7 – 7% BROKEN SSL (SECURE SOCKETS LAYER) & SENSITIVE DATA IN TRANSIT (WITH ENCRYPTION) CVSS 7.4 – 13% OBFUSCATION CVSS N/A – 60% SECURERANDOM CVSS 5.5 – 73% COOKIE “HTTPONLY” TAG CVSS 5.3 – 40% TLS (TRANSPORT LAYER SECURITY) TRAFFIC WITH SENSITIVE DATA CVSS 1.6 – 80% APP TRANSPORT SECURITY CVSS N/A – 60% DYNAMIC CODE LOADING CVSS 4.3 – 33% IMPACT VULNERABILITY SCALE: Low Medium High BANKING MOBILE APPLICATIONS EMBEDDING SECURITY IN MOBILE DEVELOPMENT LIFECYCLE The mobile development field is a complex environment that is constantly evolving, which creates a hyper-dynamic environment for developers. These complexities often increase the attack surface, with mobile devices constantly challenging the boundaries of an organization’s security perimeter. Mobile apps should, at a minimum, be developed with the same security standards as any other software asset. Accenture has identified key principles to help organizations develop a comprehensive program for embedding security throughout the enterprise’s mobile lifecycle. Developing a strategy, grounded by six (6) key principles, allows banks to proactively address security vulnerabilities throughout the mobile development lifecycle and promote informed decisions around security risks. Leading organizations recognize the expansion of mobile technologies within their enterprise and proactively seek ways to securely integrate them to further enable their workforce and achieve business goals by: 4. Understanding the impact across the organization and the processes needed to support it. 2. Identifying the resources and systems that are affected by the introduction of mobile technologies. 3. Selecting the technologies and implementing controls to meet requirements defined by business needs as well as compliance requirements. 1. Developing a mobile security strategy to properly integrate with the overall security and business strategy. 1. DEVICE 2. NETWORK 3. DATA 4. APPLICATION 5. USER ACCESS 6. GOVERNANCE & COMPLIANCE TOP RISKS IDENTIFIED AND CVSS COOKIE “SECURE” TAG CVSS 5.3 – 54% CVSS: Common Vulnerability Scoring System