The Community for Technology Leaders
RSS Icon
Subscribe
Issue No.05 - Sept.-Oct. (2012 vol.14)
pp: 28-33
Anurag Kumar Jain , Tata Consultancy Services
Devendra Shanbhag , Tata Consultancy Services
ABSTRACT
Applications for mobile platforms are being developed at a tremendous rate, but often without proper security implementation. Insecure mobile applications can cause serious information security and data privacy issues and can have severe repercussions on users and organizations alike.
INDEX TERMS
Mobile communication, Smart phones, Malware, Internet, IEEE 802.11 Standards, Computer security, Security of data, Authentication, Electronic commerce, security and privacy, mobile environments, mobile computing, information technology, mobile code security, electronic commerce, authentication
CITATION
Anurag Kumar Jain, Devendra Shanbhag, "Addressing Security and Privacy Risks in Mobile Applications", IT Professional, vol.14, no. 5, pp. 28-33, Sept.-Oct. 2012, doi:10.1109/MITP.2012.72
REFERENCES
1. “Internet Trends,” Morgan Stanley, 12 Apr. 2010.
2. R. King, “ViaForencis: Netflix, Foursquare Apps Leave Sensitive Data Vulnerable,” ZDNet.com, 10 June 2011; www.zdnet.com/blog/btl/viaforensics-netflix-foursquare-apps-leave-sensitive-data-vulnerable 50330 .
3. P. Rubens, “4 Steps to Securing Mobile Devices and Apps in the Workplace,” eSecurityPlanet.com, 9 Apr. 2012; www.esecurityplanet.com/mobile-security4-steps-to-securing-mobile-devices-and-apps-in-the-workplace-mdm-byod.html .
4. “SOX, GLB, SB 1386 and Mobile Devices,” white paper, Credent, April 2012.
5. A.H. Greene, “When HIPAA Applies to Mobile Applications,” MobiHealth News,16 June 2011; http://mobihealthnews.com/11261when-hipaa-applies-to-mobile-applications .
6. “McAfee Threats Report: Third Quarter 2011,” McAfee Labs, 2011; www.mcafee.com/us/resources/reportsrp-quarterly-threat-q3-2011.pdf .
7. D. Braue, “Malicious QR Codes: A Mobile Security Blind Spot,” PC Advisor,3 May 2012; www.pcadvisor.co.uk/news/mobile-phone/3355645 malicious-qr-codes-mobile-security-blind-spot .
8. “Mobile Phone Theft Increasing across the UK,” Insure4U.info, 6 Oct. 2010; www.insure4u.info/home-insurance-mobilemobile-phone-theft-increasing-across-the-uk.html .
9. M. Kapetanakis, “Developer Economics 2011-Winners and Losers in the Platform Race,” Vision Mobile blog, June 2011; www.visionmobile.com/blog/2011/06developer-economics-2011-winners-and-losers-in-the-platform-race .
10. J. Burns, “Developing Secure Mobile Applications for Android,” iSEC, Oct. 2008; www.isecpartners.com/filesiSEC_Securing_Android_Apps.pdf .
11. “Introduction to Secure Coding Guide,” iOS Developer Library, Feb. 2012; http://developer.apple.com/library/ios/#documentation/ Security/Conceptual/SecureCodingGuide Introduction.html.
12. “Mobile Threat Report,” Lookout Mobile Security, Aug. 2011; https://www.mylookout.com/_downloadslookout-mobile-threat-report-2011.pdf .
6 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool