📜 ⬆️ ⬇️

Data security in the development of mobile applications

Introduction


When developing a mobile application, it should be taken into account that the data with which this application operates may be of some interest to third parties. The degree of value of this data varies widely, however, even the most simple private information, for example, the password to enter the application, requires consideration of its protection. This is especially important in light of the spread of mobile applications in all areas of electronic services, including financial, banking, storage and transfer of personal data, and so on. All interested - welcome under cat.


All of the following is exclusively my experience, of course, the data may be inaccurate, so I will be grateful for any amendments and additions to the article. I did not find exhaustive articles in the network on a similar topic, which would collect all the necessary (at least basic) information in one place, so I decided to summarize my experience in this area at the current time.


Mobile app security


The main types of attacks on the mobile application:



List of key application vulnerabilities


Consider vulnerabilities of a general nature, without reference to a specific platform. Hereafter, the acronym KVD is used - critical user data. KVD includes any data that should not be available to a third party, this applies to both the user's personal data (date of birth, residential address, personal correspondence) and his private data (passwords, credit card data, bank account numbers, order numbers and etc).


The list of major vulnerabilities is as follows:



The specifics of developing mobile applications


There are several common points for all mobile platforms that should be followed during development.


User Code Protection



The operation of the client-server application



Work with dates



Additional recommendations



IOS Specific Information


Consider data warehousing available to a developer when developing for iOS:



Specific information on the Android platform


I have little knowledge of the Android platform, so the following list is a brief summary of the basic materials that I was able to find on this platform:



In addition, you need to use the available information repositories with care:



Conclusion


It is also worth mentioning that the number of protection levels applied depends on the specific application. For example, if the application is not at all client-server, does not contain any KVD, and also does not operate with valuable internal algorithms, then there is no point in attaching any protection to it. If the application is focused, for example, on performing banking operations or storing user passwords, then its degree of security should be the highest. However, the previously listed general mobile sector vulnerabilities can be easily excluded from the application, most often this does not introduce any special additional costs if the application of the required level of protection was started in the early stages of application development. But the implementation of post-factum protection in an already running application may well be associated with significant time and effort of developers. Therefore, the selection and coordination of the level of protection, as well as the list of ARCs in the developed application, should be carried out at the earliest design stages.


')

Source: https://habr.com/ru/post/327760/


All Articles