Chapter 77. Mobile Security: Domain and Best Practices
Aruneesh Salhotra
The inaugural iPhone marked a pivotal moment in mobile application evolution, introducing groundbreaking hardware innovations, a user-centric interface, and the centralized App Store. Today, mobile devices and applications are integral to businesses’ digital presence, fostering global connections.
As application usage surges, addressing security becomes imperative for ensuring business, revenue, and PII protection. This involves comprehensive safeguarding of mobile applications to mitigate potential disasters. Enterprises rely heavily on these applications, making risk management a top priority. In a constantly evolving landscape, proactive security measures are crucial. In summary, the iPhone’s debut reshaped mobile technology, and now, application security is paramount for businesses to thrive and secure their digital foothold.
Mobile applications commonly grapple with recurring challenges, which include the following:
- Inadvertent exposure of sensitive data
-
This pertains to the inadvertent storage or disclosure of confidential information in a manner that permits access by other applications residing on the user’s mobile device.
- Laxation on authentication and authorization measures
-
The implementation of inadequate authentication and authorization protocols poses vulnerabilities that can be exploited ...
Get 97 Things Every Application Security Professional Should Know now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.