Get Even More Visitors To Your Blog, Upgrade To A Business Listing >>

Security in Mobile Applications

Security is an important factor in any network, but particularly in a wireless network in which Mobile applications are employed to perform various tasks.

In case of security of Mobile Applications, the major stake holders are:

·         Device manufacturer

·         Mobile Operator

·         End user

·         Application Providers

 

The above entities are related to each other and hence if they act cohesively, Mobile Application Security can be maintained. All the stakeholders have different assets to protect from potential threats.

Phone theft is a universally recognized threat. In each case, the definition of threats greatly depends on the point of view of the stakeholder. Another threat is the abuse of a Mobile Application by an end user. Such threats target application providers, or more widely, content providers. Protection here may come from signatures and integrity protections, but basically, the application providers need to rely on the mobile device’s application framework and basic platform to provide security services.

 Another threat that faces mobile applications is any application that discloses data. The victim in many cases is the end user and possibly the mobile operator. The two potential issues here are the confidentiality of the information disclosed, and the potential legal issues linked to the disclosure of the data.

An approach which can be followed to secure mobile applications can be preventing unauthorized modification of a mobile application, both by other applications and by hosts, and ensuring that mobile code is authentic and authorized. These capabilities constitute the Mobile Application Security System (MASS).

 

 




This post first appeared on Mobile Applications | Technologies | Devices, please read the originial post: here

Share the post

Security in Mobile Applications

×

Subscribe to Mobile Applications | Technologies | Devices

Get updates delivered right to your inbox!

Thank you for your subscription

×