SlideShare a Scribd company logo
1 of 11
Download to read offline
MOBILE
APPLICATION
SECURITY
BY DESIGN
WHY SHOULD SECURITY MATTER?
Mobile security breaches have affected more than two-thirds
(68 percent) of global organizations in the last 12 months, according
to a study from BT. This is something that can cause both
reputational and economic harm for you as a business. So does this
mean we all need to get ourselves a Blackphone? We don’t think so.
In this presentation we provide you with a comprehensive break
down of the different security threats that are out there, help you
assess where you stand, and explain why you should consider
using Security by Design for all your mobile applications.
SECURITY AGAINST WHAT?
Unauthorized access to corporate or personal data
Unauthorized use of user’s privacy protected data and information
(e.g. location)
Theft of funds, banking credentials, or credit card numbers
Stealing of user corporate or personal credentials
Hacker compromising end user’s devices as conduit to corporate
network
Hacker accessing mobile device features and other applications
Loss of productivity (e.g. when environment is not stable or
employees battery is drained out)
Regulatory violations
WHAT KIND OF THREATS ARE OUT THERE? (WEB VS. NATIVE)
There are different types of risk level linked to different platforms.
For example: Computers have viruses and malware that come
from malicious code spawned from opening a document, running
a script on a web site, or launching an executable. Mobile devices
don’t yet have this risk; their primary risk are the applications being
executables themselves, trying to access data on the phone, or
in the case of Android, embedding itself deep into the operation
system in something called a rootkit.
WHAT KIND OF THREATS ARE OUT THERE? (EXT. VS. INT.)
External threats Hackers, organized crime, corporate espionage:
these people are looking at stealing money from financial
transactions, intellectual property, credentials or personal profiles
they can sell, or getting a foothold into a corporate network to be
able to better access one of the above assets of value.
Internal threats Users who are authorized to use systems and
access data with applications. However, they can intentionally or
unintentionally amplify their privilege, or perform functions that
they should not be authorized to do. This would allow them to view,
delete, or steal data they shouldn’t have access to.
HOW TO ASSESS WHERE YOU STAND? (PART 1 OF 2)
Understand your current plans and also future plans for security in:
Infrastructures This may include the overall network infrastructure,
internet points of presence, mobile gateways, and business
continuity contingencies. Implement encryption and other secure
mechanisms in place for both the transport and storage of data.
Security policies These policies should support regulatory
requirements as well as industry best practices. This includes ISO
27001:2013 requirements as well as Data Security implementation.
Examples of this include utilizing physical security measures such
as passwords to control access to data, establishing monitoring
processes for user access rights and roles at regular intervals,
and creating procedures to ensure security eve
HOW TO ASSESS WHERE YOU STAND? (PART 2 OF 2)
Development, Testing and QA This should assess the process
for development, system testing & QA, security testing and
deployment process.
Environment The environment should be adequate to needs and
mitigate the risks. Mobile environments should have fail-over site
to ensure redundancy and high availability.
Training of employees Training of employees will increase
compliance to security policies and decrease breaches caused
internally.
Education of users Users can be customers or employees. There
should be transparency towards the users of your mobile apps
about the level of security that can be expected within your
application. This should be communicated within the user journey.
KEY RECOMMENDATION: SECURITY BY DESIGN
Think security at all stages of app development. Mobile application
development should include security checks within the
development life cycle, including design, testing and QA process.
Preventive maintenance should be performed to regularly improving
the codes of the apps.
CASE STUDY: CEMEX
Goal Identify potential security risks and propose recommendations
to mitigate these while identifying immediate activities that would
aid CEMEX in securing its mobile environment.
Solution Golden Gekko (A DMI Company) performed a risk
assessment of CEMEX’s mobile infrastructure and architecture,
CEMEX’s mobile app development process and two existing apps,
Sales 360 and MyCEMEX.
Results Golden Gekko (A DMI Company) put forward a proposal
with key activities to safeguard CEMEX’s Mobile environment.
TRUSTED AQUA PARTNER
The App Quality Alliance (AQuA) is the mobile industry’s organization
supporting quality app development. Golden Gekko (A DMI
Company)’s Trusted Status endorsement means that our app
development services and QA practices have been assessed,
validated and endorsed by AQuA in a stringent process that ensures
only the highest quality output.
“Golden Gekko (A DMI Company)’s approach of agile software
development life and iterative QA processes demonstrate that
they share our vision when it comes to developing real quality in
the app market.”
– Martin Wrigley, Executive Director, AQuA
Text goes here.
WHY DO IT?
INTERESTED IN DOING A MOBILE SECURITY AUDIT
OF YOUR COMPANY? WANT TO LEARN MORE ABOUT
HOW TO PROTECT YOUR CUSTOMERS’ DATA AND
HELP MANAGE THEIR PRIVACY?
CONTACT US FOR A CALL OR MORE INFORMATION.
web		 www.goldengekko.com
email		info@goldengekko.com

More Related Content

What's hot

Israel redefining innovation at International CES 2015
Israel redefining innovation at International CES 2015Israel redefining innovation at International CES 2015
Israel redefining innovation at International CES 2015FSJU AUJF
 
Mobile App Development- Project Management Process
Mobile App Development- Project Management ProcessMobile App Development- Project Management Process
Mobile App Development- Project Management ProcessBagaria Swati
 
Part 2 - Pow, Boom, Wham! Sales apps that give you super powers
Part 2 - Pow, Boom, Wham! Sales apps that give you super powersPart 2 - Pow, Boom, Wham! Sales apps that give you super powers
Part 2 - Pow, Boom, Wham! Sales apps that give you super powersDMI
 
Enterprise Mobility presentation
Enterprise Mobility presentationEnterprise Mobility presentation
Enterprise Mobility presentationAlessandro Bottega
 
Develop a Successful Mobile App‏
Develop a Successful Mobile App‏Develop a Successful Mobile App‏
Develop a Successful Mobile App‏Mohamed Mahdy
 
2016 Top Trends in Mobile App Development Life
2016 Top Trends in Mobile App Development Life2016 Top Trends in Mobile App Development Life
2016 Top Trends in Mobile App Development LifeInnoppl Dubai
 
2016 mobile trends
2016 mobile trends2016 mobile trends
2016 mobile trendsNigel Grace
 
Mobile Business Forecast for Marketers
Mobile Business Forecast for MarketersMobile Business Forecast for Marketers
Mobile Business Forecast for MarketersAntenna Software
 
Mobile application Trends in 2021
Mobile application Trends in 2021Mobile application Trends in 2021
Mobile application Trends in 2021Anirudhmishra19
 
Best Practices For Building Your Mobile Applications - A Whitepaper by RapidV...
Best Practices For Building Your Mobile Applications - A Whitepaper by RapidV...Best Practices For Building Your Mobile Applications - A Whitepaper by RapidV...
Best Practices For Building Your Mobile Applications - A Whitepaper by RapidV...RapidValue
 
State of Immersive Technologies in 2019
State of Immersive Technologies in 2019State of Immersive Technologies in 2019
State of Immersive Technologies in 2019Cygnet Infotech
 
Motorola Solutions: Enterprise Mobile Computing Evolution 4.0
Motorola Solutions: Enterprise Mobile Computing Evolution 4.0Motorola Solutions: Enterprise Mobile Computing Evolution 4.0
Motorola Solutions: Enterprise Mobile Computing Evolution 4.0Motorola Solutions
 
Mobile Maturity Model
Mobile Maturity ModelMobile Maturity Model
Mobile Maturity ModelSTART Houston
 
A Platform for Mobile Enterprise Management: Build, Run and Manage Your Mobil...
A Platform for Mobile Enterprise Management: Build, Run and Manage Your Mobil...A Platform for Mobile Enterprise Management: Build, Run and Manage Your Mobil...
A Platform for Mobile Enterprise Management: Build, Run and Manage Your Mobil...Antenna Software
 
Mobile Ecosystem in 2015 by AscITconsultancyservices
Mobile Ecosystem in 2015 by AscITconsultancyservicesMobile Ecosystem in 2015 by AscITconsultancyservices
Mobile Ecosystem in 2015 by AscITconsultancyservicesCarmor Bass
 
Architecting mobile solutions for the enterprise
Architecting mobile solutions for the enterpriseArchitecting mobile solutions for the enterprise
Architecting mobile solutions for the enterpriseSoftweb Solutions
 
5 Steps for Enterprise Mobility
5 Steps for Enterprise Mobility5 Steps for Enterprise Mobility
5 Steps for Enterprise MobilityMatthew David
 
Role of Operators in the Mobile App Delivery Ecosystem
Role of Operators in the Mobile App Delivery EcosystemRole of Operators in the Mobile App Delivery Ecosystem
Role of Operators in the Mobile App Delivery EcosystemRelayware
 

What's hot (20)

Israel redefining innovation at International CES 2015
Israel redefining innovation at International CES 2015Israel redefining innovation at International CES 2015
Israel redefining innovation at International CES 2015
 
Mobile App Development- Project Management Process
Mobile App Development- Project Management ProcessMobile App Development- Project Management Process
Mobile App Development- Project Management Process
 
Insights success the 10 innovative mobile app solution providers
Insights success the 10 innovative mobile app solution providersInsights success the 10 innovative mobile app solution providers
Insights success the 10 innovative mobile app solution providers
 
Part 2 - Pow, Boom, Wham! Sales apps that give you super powers
Part 2 - Pow, Boom, Wham! Sales apps that give you super powersPart 2 - Pow, Boom, Wham! Sales apps that give you super powers
Part 2 - Pow, Boom, Wham! Sales apps that give you super powers
 
Enterprise Mobility presentation
Enterprise Mobility presentationEnterprise Mobility presentation
Enterprise Mobility presentation
 
Develop a Successful Mobile App‏
Develop a Successful Mobile App‏Develop a Successful Mobile App‏
Develop a Successful Mobile App‏
 
Enterprise Mobility Solutions & Services
Enterprise Mobility Solutions & ServicesEnterprise Mobility Solutions & Services
Enterprise Mobility Solutions & Services
 
2016 Top Trends in Mobile App Development Life
2016 Top Trends in Mobile App Development Life2016 Top Trends in Mobile App Development Life
2016 Top Trends in Mobile App Development Life
 
2016 mobile trends
2016 mobile trends2016 mobile trends
2016 mobile trends
 
Mobile Business Forecast for Marketers
Mobile Business Forecast for MarketersMobile Business Forecast for Marketers
Mobile Business Forecast for Marketers
 
Mobile application Trends in 2021
Mobile application Trends in 2021Mobile application Trends in 2021
Mobile application Trends in 2021
 
Best Practices For Building Your Mobile Applications - A Whitepaper by RapidV...
Best Practices For Building Your Mobile Applications - A Whitepaper by RapidV...Best Practices For Building Your Mobile Applications - A Whitepaper by RapidV...
Best Practices For Building Your Mobile Applications - A Whitepaper by RapidV...
 
State of Immersive Technologies in 2019
State of Immersive Technologies in 2019State of Immersive Technologies in 2019
State of Immersive Technologies in 2019
 
Motorola Solutions: Enterprise Mobile Computing Evolution 4.0
Motorola Solutions: Enterprise Mobile Computing Evolution 4.0Motorola Solutions: Enterprise Mobile Computing Evolution 4.0
Motorola Solutions: Enterprise Mobile Computing Evolution 4.0
 
Mobile Maturity Model
Mobile Maturity ModelMobile Maturity Model
Mobile Maturity Model
 
A Platform for Mobile Enterprise Management: Build, Run and Manage Your Mobil...
A Platform for Mobile Enterprise Management: Build, Run and Manage Your Mobil...A Platform for Mobile Enterprise Management: Build, Run and Manage Your Mobil...
A Platform for Mobile Enterprise Management: Build, Run and Manage Your Mobil...
 
Mobile Ecosystem in 2015 by AscITconsultancyservices
Mobile Ecosystem in 2015 by AscITconsultancyservicesMobile Ecosystem in 2015 by AscITconsultancyservices
Mobile Ecosystem in 2015 by AscITconsultancyservices
 
Architecting mobile solutions for the enterprise
Architecting mobile solutions for the enterpriseArchitecting mobile solutions for the enterprise
Architecting mobile solutions for the enterprise
 
5 Steps for Enterprise Mobility
5 Steps for Enterprise Mobility5 Steps for Enterprise Mobility
5 Steps for Enterprise Mobility
 
Role of Operators in the Mobile App Delivery Ecosystem
Role of Operators in the Mobile App Delivery EcosystemRole of Operators in the Mobile App Delivery Ecosystem
Role of Operators in the Mobile App Delivery Ecosystem
 

Viewers also liked

Winning the mobile user in 2015
Winning the mobile user in 2015Winning the mobile user in 2015
Winning the mobile user in 2015DMI
 
Cambodian Life - Living and Working in Phnom Penh
Cambodian Life - Living and Working in Phnom PenhCambodian Life - Living and Working in Phnom Penh
Cambodian Life - Living and Working in Phnom PenhDMI
 
Concurrency Control in MongoDB 3.0
Concurrency Control in MongoDB 3.0Concurrency Control in MongoDB 3.0
Concurrency Control in MongoDB 3.0MongoDB
 
Performance Analysis of Mobile Security Protocols: Encryption and Authenticat...
Performance Analysis of Mobile Security Protocols: Encryption and Authenticat...Performance Analysis of Mobile Security Protocols: Encryption and Authenticat...
Performance Analysis of Mobile Security Protocols: Encryption and Authenticat...CSCJournals
 
MEDIA ICMI EDISI 11
MEDIA ICMI  EDISI 11 MEDIA ICMI  EDISI 11
MEDIA ICMI EDISI 11 ICMI Pusat
 
Babadook
BabadookBabadook
Babadookjupton1
 
Mobile security
Mobile securityMobile security
Mobile securityStefaan
 
Looking for Information Vacuums
Looking for Information VacuumsLooking for Information Vacuums
Looking for Information VacuumsInfo Ops HQ
 
Cloud Monitoring And Forensic Using Security Metrics
Cloud Monitoring And Forensic Using Security MetricsCloud Monitoring And Forensic Using Security Metrics
Cloud Monitoring And Forensic Using Security MetricsSandeep Saxena
 
Mobile security
Mobile securityMobile security
Mobile securityMphasis
 
Cloud Computing Security Issues
Cloud Computing Security IssuesCloud Computing Security Issues
Cloud Computing Security IssuesStelios Krasadakis
 
Innovation through Hackathons
Innovation through HackathonsInnovation through Hackathons
Innovation through HackathonsDMI
 
Cloud Computing : Security and Forensics
Cloud Computing : Security and ForensicsCloud Computing : Security and Forensics
Cloud Computing : Security and ForensicsGovind Maheswaran
 
Mobile forensics
Mobile forensicsMobile forensics
Mobile forensicsnoorashams
 
Seven Key Elements of a Successful Encryption Strategy
Seven Key Elements of a Successful Encryption StrategySeven Key Elements of a Successful Encryption Strategy
Seven Key Elements of a Successful Encryption StrategySirius
 
Android– forensics and security testing
Android– forensics and security testingAndroid– forensics and security testing
Android– forensics and security testingSanthosh Kumar
 
10 Design Trends 2015 - UX & UI Trends for Mobile Solutions
10 Design Trends 2015 - UX & UI Trends for Mobile Solutions10 Design Trends 2015 - UX & UI Trends for Mobile Solutions
10 Design Trends 2015 - UX & UI Trends for Mobile SolutionsDMI
 

Viewers also liked (20)

Winning the mobile user in 2015
Winning the mobile user in 2015Winning the mobile user in 2015
Winning the mobile user in 2015
 
Cambodian Life - Living and Working in Phnom Penh
Cambodian Life - Living and Working in Phnom PenhCambodian Life - Living and Working in Phnom Penh
Cambodian Life - Living and Working in Phnom Penh
 
Concurrency Control in MongoDB 3.0
Concurrency Control in MongoDB 3.0Concurrency Control in MongoDB 3.0
Concurrency Control in MongoDB 3.0
 
Performance Analysis of Mobile Security Protocols: Encryption and Authenticat...
Performance Analysis of Mobile Security Protocols: Encryption and Authenticat...Performance Analysis of Mobile Security Protocols: Encryption and Authenticat...
Performance Analysis of Mobile Security Protocols: Encryption and Authenticat...
 
Updated CV
Updated CVUpdated CV
Updated CV
 
MEDIA ICMI EDISI 11
MEDIA ICMI  EDISI 11 MEDIA ICMI  EDISI 11
MEDIA ICMI EDISI 11
 
Babadook
BabadookBabadook
Babadook
 
Mobile security
Mobile securityMobile security
Mobile security
 
Looking for Information Vacuums
Looking for Information VacuumsLooking for Information Vacuums
Looking for Information Vacuums
 
Cloud Monitoring And Forensic Using Security Metrics
Cloud Monitoring And Forensic Using Security MetricsCloud Monitoring And Forensic Using Security Metrics
Cloud Monitoring And Forensic Using Security Metrics
 
Mobile security
Mobile securityMobile security
Mobile security
 
Hash crypto
Hash cryptoHash crypto
Hash crypto
 
Cloud Computing Security Issues
Cloud Computing Security IssuesCloud Computing Security Issues
Cloud Computing Security Issues
 
Innovation through Hackathons
Innovation through HackathonsInnovation through Hackathons
Innovation through Hackathons
 
Mobile Apps Security
Mobile Apps SecurityMobile Apps Security
Mobile Apps Security
 
Cloud Computing : Security and Forensics
Cloud Computing : Security and ForensicsCloud Computing : Security and Forensics
Cloud Computing : Security and Forensics
 
Mobile forensics
Mobile forensicsMobile forensics
Mobile forensics
 
Seven Key Elements of a Successful Encryption Strategy
Seven Key Elements of a Successful Encryption StrategySeven Key Elements of a Successful Encryption Strategy
Seven Key Elements of a Successful Encryption Strategy
 
Android– forensics and security testing
Android– forensics and security testingAndroid– forensics and security testing
Android– forensics and security testing
 
10 Design Trends 2015 - UX & UI Trends for Mobile Solutions
10 Design Trends 2015 - UX & UI Trends for Mobile Solutions10 Design Trends 2015 - UX & UI Trends for Mobile Solutions
10 Design Trends 2015 - UX & UI Trends for Mobile Solutions
 

Similar to Mobile Application Security by Design

Application security Best Practices Framework
Application security   Best Practices FrameworkApplication security   Best Practices Framework
Application security Best Practices FrameworkSujata Raskar
 
5 Steps to Mobile Risk Management
5 Steps to Mobile Risk Management5 Steps to Mobile Risk Management
5 Steps to Mobile Risk ManagementDMIMarketing
 
5 steps-to-mobile-risk-management-whitepaper-golden-gekko
5 steps-to-mobile-risk-management-whitepaper-golden-gekko5 steps-to-mobile-risk-management-whitepaper-golden-gekko
5 steps-to-mobile-risk-management-whitepaper-golden-gekkoDMI
 
Mobile Security: 5 Steps to Mobile Risk Management
Mobile Security: 5 Steps to Mobile Risk ManagementMobile Security: 5 Steps to Mobile Risk Management
Mobile Security: 5 Steps to Mobile Risk ManagementDMIMarketing
 
Project Quality-SIPOCSelect a process of your choice and creat.docx
Project Quality-SIPOCSelect a process of your choice and creat.docxProject Quality-SIPOCSelect a process of your choice and creat.docx
Project Quality-SIPOCSelect a process of your choice and creat.docxwkyra78
 
report on Mobile security
report on Mobile securityreport on Mobile security
report on Mobile securityJAYANT RAJURKAR
 
Cyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfCyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfAnil
 
Cyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfCyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfAnil
 
Application Security: Safeguarding Data, Protecting Reputations
Application Security: Safeguarding Data, Protecting ReputationsApplication Security: Safeguarding Data, Protecting Reputations
Application Security: Safeguarding Data, Protecting ReputationsCognizant
 
Security in Mobile App Development Protecting User Data and Preventing Cybera...
Security in Mobile App Development Protecting User Data and Preventing Cybera...Security in Mobile App Development Protecting User Data and Preventing Cybera...
Security in Mobile App Development Protecting User Data and Preventing Cybera...madhuri871014
 
Expert Compliance Solutions by Ispectra Technologies.pptx
Expert Compliance Solutions by Ispectra Technologies.pptxExpert Compliance Solutions by Ispectra Technologies.pptx
Expert Compliance Solutions by Ispectra Technologies.pptxkathyzink87
 
The Internet of Things: the 4 security dimensions of smart devices
The Internet of Things: the 4 security dimensions of smart devicesThe Internet of Things: the 4 security dimensions of smart devices
The Internet of Things: the 4 security dimensions of smart devicesWavestone
 
HOW TO SECURE WEB AND APP DEVELOPMENT USER DATA SECURITY.pdf
HOW TO SECURE WEB AND APP DEVELOPMENT USER DATA SECURITY.pdfHOW TO SECURE WEB AND APP DEVELOPMENT USER DATA SECURITY.pdf
HOW TO SECURE WEB AND APP DEVELOPMENT USER DATA SECURITY.pdfasiyahanif9977
 
Solving for Compliance: Mobile app security for banking and financial services
Solving for Compliance: Mobile app security for banking and financial servicesSolving for Compliance: Mobile app security for banking and financial services
Solving for Compliance: Mobile app security for banking and financial servicesNowSecure
 
R ramya devi cloud computing
R ramya devi cloud computingR ramya devi cloud computing
R ramya devi cloud computingPriyadharshiniVS
 
SecurityWhitepaper 7-1-2015
SecurityWhitepaper 7-1-2015SecurityWhitepaper 7-1-2015
SecurityWhitepaper 7-1-2015Francisco Anes
 
Secure Engineering Practices for Java
Secure Engineering Practices for JavaSecure Engineering Practices for Java
Secure Engineering Practices for JavaTim Ellison
 
NON-PROFIT ORGANIZATIONS’ NEED TO ADDRESS SECURITY FOR EFFECTIVE GOVERNMENT C...
NON-PROFIT ORGANIZATIONS’ NEED TO ADDRESS SECURITY FOR EFFECTIVE GOVERNMENT C...NON-PROFIT ORGANIZATIONS’ NEED TO ADDRESS SECURITY FOR EFFECTIVE GOVERNMENT C...
NON-PROFIT ORGANIZATIONS’ NEED TO ADDRESS SECURITY FOR EFFECTIVE GOVERNMENT C...IJNSA Journal
 

Similar to Mobile Application Security by Design (20)

Application security Best Practices Framework
Application security   Best Practices FrameworkApplication security   Best Practices Framework
Application security Best Practices Framework
 
5 Steps to Mobile Risk Management
5 Steps to Mobile Risk Management5 Steps to Mobile Risk Management
5 Steps to Mobile Risk Management
 
5 steps-to-mobile-risk-management-whitepaper-golden-gekko
5 steps-to-mobile-risk-management-whitepaper-golden-gekko5 steps-to-mobile-risk-management-whitepaper-golden-gekko
5 steps-to-mobile-risk-management-whitepaper-golden-gekko
 
Mobile Security: 5 Steps to Mobile Risk Management
Mobile Security: 5 Steps to Mobile Risk ManagementMobile Security: 5 Steps to Mobile Risk Management
Mobile Security: 5 Steps to Mobile Risk Management
 
Project Quality-SIPOCSelect a process of your choice and creat.docx
Project Quality-SIPOCSelect a process of your choice and creat.docxProject Quality-SIPOCSelect a process of your choice and creat.docx
Project Quality-SIPOCSelect a process of your choice and creat.docx
 
report on Mobile security
report on Mobile securityreport on Mobile security
report on Mobile security
 
Cyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfCyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdf
 
Cyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfCyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdf
 
Application Security: Safeguarding Data, Protecting Reputations
Application Security: Safeguarding Data, Protecting ReputationsApplication Security: Safeguarding Data, Protecting Reputations
Application Security: Safeguarding Data, Protecting Reputations
 
Security in Mobile App Development Protecting User Data and Preventing Cybera...
Security in Mobile App Development Protecting User Data and Preventing Cybera...Security in Mobile App Development Protecting User Data and Preventing Cybera...
Security in Mobile App Development Protecting User Data and Preventing Cybera...
 
Expert Compliance Solutions by Ispectra Technologies.pptx
Expert Compliance Solutions by Ispectra Technologies.pptxExpert Compliance Solutions by Ispectra Technologies.pptx
Expert Compliance Solutions by Ispectra Technologies.pptx
 
Mobile Apps Security Testing -1
Mobile Apps Security Testing -1Mobile Apps Security Testing -1
Mobile Apps Security Testing -1
 
The Internet of Things: the 4 security dimensions of smart devices
The Internet of Things: the 4 security dimensions of smart devicesThe Internet of Things: the 4 security dimensions of smart devices
The Internet of Things: the 4 security dimensions of smart devices
 
HOW TO SECURE WEB AND APP DEVELOPMENT USER DATA SECURITY.pdf
HOW TO SECURE WEB AND APP DEVELOPMENT USER DATA SECURITY.pdfHOW TO SECURE WEB AND APP DEVELOPMENT USER DATA SECURITY.pdf
HOW TO SECURE WEB AND APP DEVELOPMENT USER DATA SECURITY.pdf
 
Solving for Compliance: Mobile app security for banking and financial services
Solving for Compliance: Mobile app security for banking and financial servicesSolving for Compliance: Mobile app security for banking and financial services
Solving for Compliance: Mobile app security for banking and financial services
 
R ramya devi cloud computing
R ramya devi cloud computingR ramya devi cloud computing
R ramya devi cloud computing
 
SecurityWhitepaper 7-1-2015
SecurityWhitepaper 7-1-2015SecurityWhitepaper 7-1-2015
SecurityWhitepaper 7-1-2015
 
Secure Engineering Practices for Java
Secure Engineering Practices for JavaSecure Engineering Practices for Java
Secure Engineering Practices for Java
 
Safeguarding the Enterprise
Safeguarding the EnterpriseSafeguarding the Enterprise
Safeguarding the Enterprise
 
NON-PROFIT ORGANIZATIONS’ NEED TO ADDRESS SECURITY FOR EFFECTIVE GOVERNMENT C...
NON-PROFIT ORGANIZATIONS’ NEED TO ADDRESS SECURITY FOR EFFECTIVE GOVERNMENT C...NON-PROFIT ORGANIZATIONS’ NEED TO ADDRESS SECURITY FOR EFFECTIVE GOVERNMENT C...
NON-PROFIT ORGANIZATIONS’ NEED TO ADDRESS SECURITY FOR EFFECTIVE GOVERNMENT C...
 

More from DMI

CX Audit Workshop
CX Audit WorkshopCX Audit Workshop
CX Audit WorkshopDMI
 
7 Trends & Insights MWC 2017
7 Trends & Insights MWC 20177 Trends & Insights MWC 2017
7 Trends & Insights MWC 2017DMI
 
DMI 2017 Mobile Trends
DMI 2017 Mobile TrendsDMI 2017 Mobile Trends
DMI 2017 Mobile TrendsDMI
 
DMI – We Can See the Future
DMI – We Can See the FutureDMI – We Can See the Future
DMI – We Can See the FutureDMI
 
Top 10 Trends at MWC16
Top 10 Trends at MWC16Top 10 Trends at MWC16
Top 10 Trends at MWC16DMI
 
Top 10 Trends for Winners in Mobile 2016
Top 10 Trends for Winners in Mobile 2016Top 10 Trends for Winners in Mobile 2016
Top 10 Trends for Winners in Mobile 2016DMI
 
Top 8 Mobile Finance Trends 2015
Top 8 Mobile Finance Trends 2015Top 8 Mobile Finance Trends 2015
Top 8 Mobile Finance Trends 2015DMI
 
Top 10 Mobile Trends 2015
Top 10 Mobile Trends 2015Top 10 Mobile Trends 2015
Top 10 Mobile Trends 2015DMI
 
UX & UI Design - Differentiate through design
UX & UI Design - Differentiate through designUX & UI Design - Differentiate through design
UX & UI Design - Differentiate through designDMI
 
Golden Gekko Review of iOS8- for users and developers
Golden Gekko Review of iOS8- for users and developersGolden Gekko Review of iOS8- for users and developers
Golden Gekko Review of iOS8- for users and developersDMI
 
User Testing- guiding the way to success
User Testing- guiding the way to successUser Testing- guiding the way to success
User Testing- guiding the way to successDMI
 
Golden Gekko, 10 burning questions on privacy
Golden Gekko, 10 burning questions on privacyGolden Gekko, 10 burning questions on privacy
Golden Gekko, 10 burning questions on privacyDMI
 
MWC 2014- key highlights, trends and announcements
MWC 2014- key highlights, trends and announcementsMWC 2014- key highlights, trends and announcements
MWC 2014- key highlights, trends and announcementsDMI
 
Warburtons Enterprise App Case Study
Warburtons Enterprise App Case StudyWarburtons Enterprise App Case Study
Warburtons Enterprise App Case StudyDMI
 
An introduction to Beacons
An introduction to BeaconsAn introduction to Beacons
An introduction to BeaconsDMI
 
2014 UX/UI trends for mobile solutions
2014 UX/UI trends for mobile solutions2014 UX/UI trends for mobile solutions
2014 UX/UI trends for mobile solutionsDMI
 
Mobile Marketing presentation from Magnus Jern, CEO Golden Gekko, at CREA Dig...
Mobile Marketing presentation from Magnus Jern, CEO Golden Gekko, at CREA Dig...Mobile Marketing presentation from Magnus Jern, CEO Golden Gekko, at CREA Dig...
Mobile Marketing presentation from Magnus Jern, CEO Golden Gekko, at CREA Dig...DMI
 
Top mobile trends 2014
Top mobile trends 2014Top mobile trends 2014
Top mobile trends 2014DMI
 
Google Cloud Lightning Talk
Google Cloud Lightning TalkGoogle Cloud Lightning Talk
Google Cloud Lightning TalkDMI
 
6 quick wins for enterprise mobility infographic
6 quick wins for enterprise mobility infographic6 quick wins for enterprise mobility infographic
6 quick wins for enterprise mobility infographicDMI
 

More from DMI (20)

CX Audit Workshop
CX Audit WorkshopCX Audit Workshop
CX Audit Workshop
 
7 Trends & Insights MWC 2017
7 Trends & Insights MWC 20177 Trends & Insights MWC 2017
7 Trends & Insights MWC 2017
 
DMI 2017 Mobile Trends
DMI 2017 Mobile TrendsDMI 2017 Mobile Trends
DMI 2017 Mobile Trends
 
DMI – We Can See the Future
DMI – We Can See the FutureDMI – We Can See the Future
DMI – We Can See the Future
 
Top 10 Trends at MWC16
Top 10 Trends at MWC16Top 10 Trends at MWC16
Top 10 Trends at MWC16
 
Top 10 Trends for Winners in Mobile 2016
Top 10 Trends for Winners in Mobile 2016Top 10 Trends for Winners in Mobile 2016
Top 10 Trends for Winners in Mobile 2016
 
Top 8 Mobile Finance Trends 2015
Top 8 Mobile Finance Trends 2015Top 8 Mobile Finance Trends 2015
Top 8 Mobile Finance Trends 2015
 
Top 10 Mobile Trends 2015
Top 10 Mobile Trends 2015Top 10 Mobile Trends 2015
Top 10 Mobile Trends 2015
 
UX & UI Design - Differentiate through design
UX & UI Design - Differentiate through designUX & UI Design - Differentiate through design
UX & UI Design - Differentiate through design
 
Golden Gekko Review of iOS8- for users and developers
Golden Gekko Review of iOS8- for users and developersGolden Gekko Review of iOS8- for users and developers
Golden Gekko Review of iOS8- for users and developers
 
User Testing- guiding the way to success
User Testing- guiding the way to successUser Testing- guiding the way to success
User Testing- guiding the way to success
 
Golden Gekko, 10 burning questions on privacy
Golden Gekko, 10 burning questions on privacyGolden Gekko, 10 burning questions on privacy
Golden Gekko, 10 burning questions on privacy
 
MWC 2014- key highlights, trends and announcements
MWC 2014- key highlights, trends and announcementsMWC 2014- key highlights, trends and announcements
MWC 2014- key highlights, trends and announcements
 
Warburtons Enterprise App Case Study
Warburtons Enterprise App Case StudyWarburtons Enterprise App Case Study
Warburtons Enterprise App Case Study
 
An introduction to Beacons
An introduction to BeaconsAn introduction to Beacons
An introduction to Beacons
 
2014 UX/UI trends for mobile solutions
2014 UX/UI trends for mobile solutions2014 UX/UI trends for mobile solutions
2014 UX/UI trends for mobile solutions
 
Mobile Marketing presentation from Magnus Jern, CEO Golden Gekko, at CREA Dig...
Mobile Marketing presentation from Magnus Jern, CEO Golden Gekko, at CREA Dig...Mobile Marketing presentation from Magnus Jern, CEO Golden Gekko, at CREA Dig...
Mobile Marketing presentation from Magnus Jern, CEO Golden Gekko, at CREA Dig...
 
Top mobile trends 2014
Top mobile trends 2014Top mobile trends 2014
Top mobile trends 2014
 
Google Cloud Lightning Talk
Google Cloud Lightning TalkGoogle Cloud Lightning Talk
Google Cloud Lightning Talk
 
6 quick wins for enterprise mobility infographic
6 quick wins for enterprise mobility infographic6 quick wins for enterprise mobility infographic
6 quick wins for enterprise mobility infographic
 

Mobile Application Security by Design

  • 2. WHY SHOULD SECURITY MATTER? Mobile security breaches have affected more than two-thirds (68 percent) of global organizations in the last 12 months, according to a study from BT. This is something that can cause both reputational and economic harm for you as a business. So does this mean we all need to get ourselves a Blackphone? We don’t think so. In this presentation we provide you with a comprehensive break down of the different security threats that are out there, help you assess where you stand, and explain why you should consider using Security by Design for all your mobile applications.
  • 3. SECURITY AGAINST WHAT? Unauthorized access to corporate or personal data Unauthorized use of user’s privacy protected data and information (e.g. location) Theft of funds, banking credentials, or credit card numbers Stealing of user corporate or personal credentials Hacker compromising end user’s devices as conduit to corporate network Hacker accessing mobile device features and other applications Loss of productivity (e.g. when environment is not stable or employees battery is drained out) Regulatory violations
  • 4. WHAT KIND OF THREATS ARE OUT THERE? (WEB VS. NATIVE) There are different types of risk level linked to different platforms. For example: Computers have viruses and malware that come from malicious code spawned from opening a document, running a script on a web site, or launching an executable. Mobile devices don’t yet have this risk; their primary risk are the applications being executables themselves, trying to access data on the phone, or in the case of Android, embedding itself deep into the operation system in something called a rootkit.
  • 5. WHAT KIND OF THREATS ARE OUT THERE? (EXT. VS. INT.) External threats Hackers, organized crime, corporate espionage: these people are looking at stealing money from financial transactions, intellectual property, credentials or personal profiles they can sell, or getting a foothold into a corporate network to be able to better access one of the above assets of value. Internal threats Users who are authorized to use systems and access data with applications. However, they can intentionally or unintentionally amplify their privilege, or perform functions that they should not be authorized to do. This would allow them to view, delete, or steal data they shouldn’t have access to.
  • 6. HOW TO ASSESS WHERE YOU STAND? (PART 1 OF 2) Understand your current plans and also future plans for security in: Infrastructures This may include the overall network infrastructure, internet points of presence, mobile gateways, and business continuity contingencies. Implement encryption and other secure mechanisms in place for both the transport and storage of data. Security policies These policies should support regulatory requirements as well as industry best practices. This includes ISO 27001:2013 requirements as well as Data Security implementation. Examples of this include utilizing physical security measures such as passwords to control access to data, establishing monitoring processes for user access rights and roles at regular intervals, and creating procedures to ensure security eve
  • 7. HOW TO ASSESS WHERE YOU STAND? (PART 2 OF 2) Development, Testing and QA This should assess the process for development, system testing & QA, security testing and deployment process. Environment The environment should be adequate to needs and mitigate the risks. Mobile environments should have fail-over site to ensure redundancy and high availability. Training of employees Training of employees will increase compliance to security policies and decrease breaches caused internally. Education of users Users can be customers or employees. There should be transparency towards the users of your mobile apps about the level of security that can be expected within your application. This should be communicated within the user journey.
  • 8. KEY RECOMMENDATION: SECURITY BY DESIGN Think security at all stages of app development. Mobile application development should include security checks within the development life cycle, including design, testing and QA process. Preventive maintenance should be performed to regularly improving the codes of the apps.
  • 9. CASE STUDY: CEMEX Goal Identify potential security risks and propose recommendations to mitigate these while identifying immediate activities that would aid CEMEX in securing its mobile environment. Solution Golden Gekko (A DMI Company) performed a risk assessment of CEMEX’s mobile infrastructure and architecture, CEMEX’s mobile app development process and two existing apps, Sales 360 and MyCEMEX. Results Golden Gekko (A DMI Company) put forward a proposal with key activities to safeguard CEMEX’s Mobile environment.
  • 10. TRUSTED AQUA PARTNER The App Quality Alliance (AQuA) is the mobile industry’s organization supporting quality app development. Golden Gekko (A DMI Company)’s Trusted Status endorsement means that our app development services and QA practices have been assessed, validated and endorsed by AQuA in a stringent process that ensures only the highest quality output. “Golden Gekko (A DMI Company)’s approach of agile software development life and iterative QA processes demonstrate that they share our vision when it comes to developing real quality in the app market.” – Martin Wrigley, Executive Director, AQuA
  • 11. Text goes here. WHY DO IT? INTERESTED IN DOING A MOBILE SECURITY AUDIT OF YOUR COMPANY? WANT TO LEARN MORE ABOUT HOW TO PROTECT YOUR CUSTOMERS’ DATA AND HELP MANAGE THEIR PRIVACY? CONTACT US FOR A CALL OR MORE INFORMATION. web www.goldengekko.com email info@goldengekko.com