SlideShare uma empresa Scribd logo
1 de 14
Baixar para ler offline
Sponsored by Box, SAP and Veracode

2013 SANS Mobile Application
Security Survey
June 2013

A SANS Whitepaper
Written by Kevin Johnson and James Jardine
Advisor: Barbara Filkins

Survey Participant Demographics
Application Usage

Page 2

Page 4

Application Development

Page 6

Application Management

Page 10
Introduction
Mobile devices, particularly those owned by employees and used to access work applications, represent the
latest front for attackers. Employees are downloading applications vulnerable to or infected with malware that
mix with company e-mail, productivity/workforce and other business applications.
Because of this new threat, SANS conducted a survey to discover organizational awareness and the procedures
around mobile application risk. (This survey follows a first survey, focused on the state of mobile device
security,1 and a second, focused on policies and practices used to secure those devices.2)
In this survey on security of mobile applications, we found that most organizations are concerned about
mobile applications and the security threat they impose. The survey showed the following concerns of the
organizations:
•  heir biggest concern is the security of the device and how it can help protect the apps and app data
T
available on the device.
•  hey most consistently rely on VPN/access controls, a tried and tested technology for company-issued
T
mobile device access, to protect company applications from rogue bring your own device (BYOD) access.
•  he largest percentage (nearly 60%) feel security checks throughout the software development lifecycle
T
(SDLC) are important, and a smaller number is actually practicing these processes.
•  rapping it all together under management of applications, organizations are having the most difficulty
W
achieving the level of unified access they need to support their policies, including SDLC.
This report covers these and other trends in more detail in the following pages.

1 www.sans.org/reading_room/analysts_program/mobility-sec-survey.pdf

2 www.sans.org/reading_room/analysts_program/SANS-survey-mobility.pdf

SANS Analyst Program	

1	

2013 SANS Mobile Application Security Survey
Survey Participant Demographics
Nearly 900 people started the survey, with more than 600 answering the first 11 questions on awareness and
practices. When asked if they conducted application development, 253 indicated they did and were sent to
another set of questions. That suggests a strong set of developers took the survey; but the majority, being
from enterprise organizations that own and manage apps, don’t develop them.
The survey was held online for six weeks during February and March 2013. Respondents came from a wide
range of industries. The largest number of respondents came from highly regulated sectors such as the
government sector (18%), followed closely by the financial services and “Other” categories—both of which
had slightly less than 16% of the total. Government and financial services were similarly represented in our
first two surveys, suggesting that mobile application security is becoming a priority or these groups. Figure 1
provides a breakdown of the survey respondents.

What is your organization’s primary industry?

Figure 1. Industries Represented

SANS Analyst Program	

2	

2013 SANS Mobile Application Security Survey
Survey Participant Demographics
Respondents from multinational
organizations were our largest
group (26%). This might indicate
that these organizations are seeing
and adopting more policies around
their applications accessed by BYOD
practices. But smaller organizations
with 100–499 employees were also
well represented (15%), hinting
that even smaller organizations
are beginning to understand the
importance of mobile application
security (see Figure 2).

(CONTINUED)

How large is your organization?

Echoing the results from the
Figure 2. Organization Size
previous two mobile surveys
conducted by SANS in 2012, most of the respondents were security analysts and network administrators,
lending a security-in-depth perspective to the survey. When you combine the IT manager/CIO column with
the Security manager/CSO columns, you see that a large representation of senior managers (48%) also took
this survey. The roles represented
in survey responses are shown in
What is (are) your role(s) in the organization,
whether as staff or consultant?
Figure 3.
Interestingly, some respondents (41
staff members and 19 consultants)
indicate they hold the new title of
“mobility director.” The majority of
respondents were staff members
rather than consultants. While
consultants can and do provide
specialized skills and help, staff
members often have a better
and more long-term focus on the
mobility issues an organization is
experiencing. Their participation
in the survey provides us with
a clearer view of the needs and
concerns of organizations from
Figure 3. Roles of Respondents
all perspectives. For example,
developers and software engineers provide a different perspective (perhaps wanting to build in security and
encryption during app development) than those holding administrative and security jobs, who see security
of applications as something to handle after the fact. For example, the latter group—those who manage
applications—would be more inclined to add in endpoint security, data encryption and application-wrapping
security capabilities to protect against intrusion and leakage through mobile applications.
SANS Analyst Program	

3	

2013 SANS Mobile Application Security Survey
Application Usage
Our goal with this survey was to
go beyond the extent of personal
mobile device use to explore what
people do on those devices. It
is clear that employees in most
commercial organizations use both
BYOD and corporate devices to
access work applications, as shown
in Figure 4.

Please estimate the percentage of users in your organization
who use personal devices to access work applications

In our original survey, 37% of
respondents did not allow BYOD,
so this shows an increase in BYOD
usage since last year. In this survey,
only a small percentage checked
that 100% of their users had BYOD
Figure 4. Personal Device Use to Access Work Applications
access to work applications. The
largest group (21%) actually represented the smallest number of BYOD users accessing work applications.
Many respondents commented that they did not allow personal devices. Consistent with our previous two
surveys, there were lower levels of BYOD usage in the government sector than in the private sector.

What Apps They’re Using
But, what are people doing with their personal devices? The answer to this question will allow us to
understand the usage and, therefore, the risks organizations face and the precautions they might
undertake. For example, if an organization allows remote access to its network and the connecting device
is compromised, the attacker has access into the network and any unencrypted apps. The compromised
device can provide remote
access, becoming a pivot
What categories of business apps are you allowing on
personal mobile devices?
point from which attacks
can be launched. And, the
risk is greater when access
is granted to business
applications such as ERP and
collaborative programs.
As shown in Figure 5, not
surprisingly, the most
common applications
accessed remotely are
communications and
collaboration (i.e., e-mail) and
general Internet access (i.e.,
browser, file-sharing).
SANS Analyst Program	

Figure 5. Categories of Business Applications Accessed Remotely
4	

2013 SANS Mobile Application Security Survey
Application Usage

(CONTINUED)

Approximately 26% of the respondents say their organizations also allow access to business systems, and
33% allow access to productivity applications. From their large response to network access/VPN (44%), they
are likely doing so through secured connections. This implies that these organizations either believe that
the device is a safe risk for that level of data access or that they accept the related risks. These risks can be
significant, given the media’s attempts to dub the past few years as the “year of mobile malware.”
Another 5% are accessing control system applications from mobile and personal devices; and another 8%
are accessing field service applications, which can also be attached directly or indirectly to control systems,
providing another pathway into critical control systems. Our hope is that those devices, their operators
and employers are 100% aware of the risk and have layered their security or further secured the mobile
applications accordingly. According to a SANS survey on SCADA security practices published in February 2013,
70% of nearly 700 respondents feel that there is a high level of cyber risk to their systems, yet lowering risk
was very low on their list of priorities, and only 30% have strong security requirements for their control system
procurement processes.3

What Scares Them
So, what are the biggest
concerns an organization
faces with regard to mobile
security? Figure 6 reveals
that most organizations are
worried first about their data,
which is, of course, accessed
from the mobile app, and
then about the device as a
launch point for attacks.

What are your biggest concerns related to
mobile applications?

These concerns make
sense, given that these two
categories cover most of
the app security risk around
mobile devices. It is also
interesting that secured
Figure 6. Concerns Related to Mobile Applications
access to applications is
of concern to 53% of our
respondents, given that 44% of them are granting BYOD access via VPN services, as shown in the previous
figure (Figure 5).
The rest of the categories checked indicate that at least 30% to 40% are also thinking about the network
infrastructure, secure application components and unauthorized BYOD sprawl (managing the proliferation of
devices). That number could be higher, and we suspect it will be if we conduct this survey again next year.

3 www.sans.org/reading_room/analysts_program/sans_survey_scada_2013.pdf

SANS Analyst Program	

5	

2013 SANS Mobile Application Security Survey
Application Development
In addition to studying how respondents are protecting their applications being used and accessed by BYOD,
this survey was also designed to find out how they manage the applications they developed themselves.

What They’re Developing
When asked what type of mobile applications they developed, about 2/3 of the survey base were skipped to
the end because they didn’t do development. Of those 253 respondents who did answer this question, they
are primarily developing web applications and updates (68%), and 32% are developing line-of-business (LOB)
applications accessed by mobile/BYOD. Only 20% of those who answered this question are developing mobile
apps for commercial use, with about the same amount developing their own cloud applications for mobile
users, as shown in Figure 7.
With the organizations’ focus on web development capabilities, and augmented with their cloud
development, it’s clear that the web-based interface will be used to replace manual processes to meet new
demands to account for mobile access. And, with 32% of respondents building “internal” applications, new
risks of data loss and intrusion arise. Organizations deploying their applications on mobile devices will have to
develop plans to mitigate these new vectors.

What are your mobile application development focus areas?

Figure 7. Mobile Applications Being Developed

SANS Analyst Program	

6	

2013 SANS Mobile Application Security Survey
Application Development

(CONTINUED)

Choice of Platforms
Because of their popularity today, iOS (87%) and Android (74%) lead the pack as popular platforms
organizations develop for. As shown in Figure 8, development for Windows 8 is low (30%) compared to iOS
(87%) and Android (74%).

What mobile platforms do you develop for?

The comparatively low level
of Windows development was
surprising, given the release of
Windows 8 tablets and mobile
devices last year. Interestingly,
31% of respondents develop
for the BlackBerry platform,
which does not seem to
have disappeared from the
business landscape, despite
the growth of other smart
device adoption.

Figure 8. Popularity of Development for Mobile Platforms

Their Priorities
In the survey, respondents were asked to rank their objectives, with 1 being the most important and 9 being
the least important objective. It is rewarding to note that they rate the security of the data as the most
important objective during development (average rating of 3.38). From the results, performance is marginally
more important (3.80) than security of the application (3.86), which is promising. See Table 1 for the ranking of
their priorities.
Objective	Ranking
Security of the data	

3.38

Performance	

3.80

Security of the application	

3.86

Reliability	

4.16

Usability/user interface	

4.59

Security of the network/enterprise	

4.75

Rapid time to market	

5.11

Scalability	

5.72

Other	

8.64
Table 1. Top Development Objectives

SANS Analyst Program	

7	

2013 SANS Mobile Application Security Survey
Application Development

(CONTINUED)

Not surprisingly, usability, scalability, reliability and performance are seen as more important than application
security. This may reflect both the importance organizations place on performance of all applications and a
level of management that does not yet appreciate the consequences of insecure applications.
Next, we need to look at what organizations are doing to ensure the security of their systems, data and users.
Figure 9 lists several processes that organizations are implementing to different degrees.

Which of the following security practices do you follow
during your mobile application lifecycle?

Figure 9. Security Practices Followed
The security practices are fairly evenly split among the various phases of the software development lifecycle
(SDLC)—with a secure lifecycle being the highest chosen among them overall. No more than 50% chose any
other practice; but for those developers, or the organization that supports them, they are evenly focused on
dealing with security issues during coding and development.

SANS Analyst Program	

8	

2013 SANS Mobile Application Security Survey
Application Development

(CONTINUED)

Specifically, when asked about the use of vulnerability scans, almost 34% of the respondents either do not
perform vulnerability scans of the applications at all or perform them infrequently. Continuous monitoring
for possible attack vectors is a critical component of the Critical Security Controls (CSCs), particularly Critical
Control 2 (inventory of authorized/unauthorized software), Critical Control 4 (continuous vulnerability
assessment and remediation) and Critical Control 6 (application software security).4 Figure 10 shows how
frequently companies conduct vulnerability scans.

As part of your lifecycle management approach, how frequently
does your company conduct application vulnerability scans?

Figure 10. Use of Application Vulnerability Scans
The apparent lack of application-level scanning implies that the organizations are depending on source code
reviews and threat assessments to protect their applications and data. We often see organizations depend
on their authentication system to verify that a user actually is that user, but tools like Firesheep are able to
hijack the mobile application’s session. (Firesheep was originally an attack against Facebook, but it has been
improved to add support for multiple mobile applications.) Flaws found in applications after production are
more expensive to repair, and if left unattended (as discovered in so many penetration tests), are even more
expensive in terms of loss.

4 www.sans.org/critical-security-controls

SANS Analyst Program	

9	

2013 SANS Mobile Application Security Survey
Application Management
Application management is part of the SDLC. Even for organizations that don’t develop the applications being
accessed by their mobile users, management of these apps is as critical as secure access and device scanning.
Of the organizations responding,
more than half (55%) use
internal processes to handle
management and services for
their applications, as shown in
Figure 11.

How are these apps managed for end-users today?

Externally provided management, represented by use of
third-party providers and public
clouds, has become popular.
Most of the respondents are
using multiple approaches to
securing mobile applications. The
most common focuses are on
securing not only the devices, but
also the mobile apps and content
those devices use every day.
Figure 11. Application Management Options

Their Practices
Figure 12 provides a list of
many of the security policies
and practices surrounding
corporately-owned devices and
how frequently they are used.
We hope that these policies also
address the BYOD devices.
This multilayered approach
is commendable, because
it builds upon the existing
security controls in the nonmobile space. In fact, mobile
applications often make use of
existing web applications or use
features, including encryption
libraries, added to the existing
applications for additional
protection.

SANS Analyst Program	

What are your security policies and practices
around the deployment, use, and management of
corporately-owned mobile applications?

Figure 12. Security Policies and Practices for Corporately-Owned Mobile Applications
10	

2013 SANS Mobile Application Security Survey
Application Management

(CONTINUED)

However, this overlap of systems and applications makes it imperative that organizations understand their
existing controls and how they can be leveraged to protect the mobile users and applications. So, for example,
securing the devices through use of tools such as Mobile Device Management (MDM) or enhanced NAC
(Network Access Controls) organizations are also protecting against rogue applications, because both of
those will check for unapproved or malicious applications based on their programmed policies. This is also a
plea to MDM vendors to provide more integrated security services regarding encrypting access to business
applications from MDM protected devices.

Management Difficulties
There appears to be little difference in organizations’ perceptions of how difficult these policies and practices
are to implement. Most respondents consider implementation to have some moderate level of difficulty.
Figure 13 shows the average difficulty ratings for each of the security policies and procedures, where 1 is “not
particularly difficult,” 2 is “difficult,” and 3 is “extremely difficult.”
The higher the average
score, the more difficult
it is to implement the
policies and procedures.
Not surprisingly, protecting
applications with strong
authentication was
comparatively easy (1.70),
which is in keeping with
organizational concerns
(Figure 5) and controls
(Figure 9).

How difficult have the following policies
and practices been to implement?

The security industry has
been using such procedures
for a long time with
Figure 13. Difficulty of Implementation
company-issued mobile
devices. On the other hand, providing an identity management framework to support remote devices (2.05)
and ensuring secure development of applications (2.01), were considered more difficult. Not far behind
is secure development and lifecycle practices. This applies to both development and management of
applications being accessed remotely by BYOD. As stated earlier, there needs to be much more maturity in the
mobile space, given the breadth and nature of threats being aimed at mobile devices.
Taken together, the results provided in Figures 12 and 13 suggest that organizations recognize and are doing
the difficult work of implementing policies and practices. Moreover, they suggest that organizations should
place some emphasis on developing techniques that rely on tried and true security policies to secure mobile
applications. In addition, it seems clear that additional focus is required on providing adequate security review
during the SDLC.

SANS Analyst Program	

11	

2013 SANS Mobile Application Security Survey
Conclusion
As organizations and their staffs continue to rush down the path of implementing and using mobile devices
and applications, security needs to continue to focus on our implementations. This is becoming both easier
and harder as time goes by.
The rush to implement or build mobile applications is adding to the complexity security and IT staffs have
to handle. This means that responsible staff members have to be on top of the latest threats and controls
available to the attackers and defenders. Proactive security during development and deployment should
become a best practice.
The following suggestions can help organizations accomplish their security goals:
•  nsure and adjust policies to include the devices the organization allows to access network resources.
E
For example, institute a policy that describes the type of mobile devices allowed to access the network.
•  valuate the applications, data and access the mobile devices use to determine what needs can be
E
addressed.
•  onsider the inclusion of mobile app security encryption libraries during development, or apply them to
C
third-party apps being used for larger scale corporate deployment.
•  erform security assessments of applications being built or developed. Start even before the application
P
development begins, and continue assessing applications in production, as per the CSCs.
•  ssess the mobile devices and their supporting architecture as often as possible, keeping in mind that
A
many of the devices may be owned by employees.
•  ontinue to enable users with education and security updates.
C
These are broad-stroke mechanisms to consider for protecting the network, resources and data on endpoints
from malicious hostile applications. Architectures deployed to manage this new risk need to be capable of
expanding to new types of devices and applications because users will continue to make more demands in
the future.

SANS Analyst Program	

12	

2013 SANS Mobile Application Security Survey
About the Authors
Kevin Johnson is a senior security consultant with Secure Ideas. Kevin has a long history in the IT field
including system administration, network architecture and application development. He has been involved
in building incident response and forensic teams, architecting security solutions for large enterprises and
penetration testing everything from government agencies to Fortune 100 companies. Kevin is the author
of three classes: SEC542: Web Application Penetration Testing, Ethical Hacking; SEC642: Advanced Web
Application Penetration Testing and SEC571: Mobile Device Security. In addition, he is an instructor and author
for the SANS Institute, a faculty member at IANS and a contributing blogger at TheMobilityHub.
James Jardine is a principal security consultant with Secure Ideas, LLC. James has over 12 years of software
development experience, with over half of that focusing on application security. During his long development
history, he has written both large enterprise applications, thick clients and mobile applications. He has
held many roles including senior developer, software architect and application security expert. James is
also involved in the open source community. He runs a number of open source projects, including WCSA (a
security analyzer for web.config files) and EventValMod (a tool to modify event validation values in .Net). He is
also a contributor to the Laudanum project (a collection of injectable web payloads). In addition, James is an
instructor and author for the SANS Institute. He is also a contributing blogger for the Secure Ideas blog, the
Jardine Software blog, and the SANS Appsec blog.

SANS would like to thank its sponsors:

SANS Analyst Program	

13	

2013 SANS Mobile Application Security Survey

Mais conteúdo relacionado

Mais procurados

Survey Report: Managing BYOD in Corporate Environments
Survey Report: Managing BYOD in Corporate EnvironmentsSurvey Report: Managing BYOD in Corporate Environments
Survey Report: Managing BYOD in Corporate EnvironmentsOsterman Research, Inc.
 
State of endpoint risk v3
State of endpoint risk v3State of endpoint risk v3
State of endpoint risk v3Lumension
 
Selling Your Organization on Application Security
Selling Your Organization on Application SecuritySelling Your Organization on Application Security
Selling Your Organization on Application SecurityVeracode
 
2012 HP Cyber Threat Report Infographic
2012 HP Cyber Threat Report Infographic2012 HP Cyber Threat Report Infographic
2012 HP Cyber Threat Report InfographicCarlo Arioli
 
Research Article On Web Application Security
Research Article On Web Application SecurityResearch Article On Web Application Security
Research Article On Web Application SecuritySaadSaif6
 
It consumerisation presentation
It  consumerisation presentationIt  consumerisation presentation
It consumerisation presentationrevaathey
 
Índice de software sin licencia en el mundo.
Índice de software sin licencia en el mundo. Índice de software sin licencia en el mundo.
Índice de software sin licencia en el mundo. Luis Noguera
 
Mobile Security: Apps are our digital lives.
Mobile Security: Apps are our digital lives.Mobile Security: Apps are our digital lives.
Mobile Security: Apps are our digital lives.Veracode
 
How can we predict vulnerabilities to prevent them from causing data losses
How can we predict vulnerabilities to prevent them from causing data lossesHow can we predict vulnerabilities to prevent them from causing data losses
How can we predict vulnerabilities to prevent them from causing data lossesAbhishek BV
 
Analyst Report: The Digital Universe in 2020 - China
Analyst Report: The Digital Universe in 2020 - ChinaAnalyst Report: The Digital Universe in 2020 - China
Analyst Report: The Digital Universe in 2020 - ChinaEMC
 
The Four(ish) Appsec Metrics You Can’t Ignore
The Four(ish) Appsec Metrics You Can’t IgnoreThe Four(ish) Appsec Metrics You Can’t Ignore
The Four(ish) Appsec Metrics You Can’t IgnoreVeracode
 
Why Passwords are not strong enough
Why Passwords are not strong enoughWhy Passwords are not strong enough
Why Passwords are not strong enoughEMC
 
2013-ISC2-Global-Information-Security-Workforce-Study
2013-ISC2-Global-Information-Security-Workforce-Study2013-ISC2-Global-Information-Security-Workforce-Study
2013-ISC2-Global-Information-Security-Workforce-StudyTam Nguyen
 
Prof m01-2013 global information security workforce study - final
Prof m01-2013 global information security workforce study - finalProf m01-2013 global information security workforce study - final
Prof m01-2013 global information security workforce study - finalSelectedPresentations
 
Cloud Service Security using Two-factor or Multi factor Authentication
Cloud Service Security using Two-factor or Multi factor AuthenticationCloud Service Security using Two-factor or Multi factor Authentication
Cloud Service Security using Two-factor or Multi factor AuthenticationIRJET Journal
 

Mais procurados (16)

Survey Report: Managing BYOD in Corporate Environments
Survey Report: Managing BYOD in Corporate EnvironmentsSurvey Report: Managing BYOD in Corporate Environments
Survey Report: Managing BYOD in Corporate Environments
 
State of endpoint risk v3
State of endpoint risk v3State of endpoint risk v3
State of endpoint risk v3
 
Selling Your Organization on Application Security
Selling Your Organization on Application SecuritySelling Your Organization on Application Security
Selling Your Organization on Application Security
 
2012 HP Cyber Threat Report Infographic
2012 HP Cyber Threat Report Infographic2012 HP Cyber Threat Report Infographic
2012 HP Cyber Threat Report Infographic
 
I018145157
I018145157I018145157
I018145157
 
Research Article On Web Application Security
Research Article On Web Application SecurityResearch Article On Web Application Security
Research Article On Web Application Security
 
It consumerisation presentation
It  consumerisation presentationIt  consumerisation presentation
It consumerisation presentation
 
Índice de software sin licencia en el mundo.
Índice de software sin licencia en el mundo. Índice de software sin licencia en el mundo.
Índice de software sin licencia en el mundo.
 
Mobile Security: Apps are our digital lives.
Mobile Security: Apps are our digital lives.Mobile Security: Apps are our digital lives.
Mobile Security: Apps are our digital lives.
 
How can we predict vulnerabilities to prevent them from causing data losses
How can we predict vulnerabilities to prevent them from causing data lossesHow can we predict vulnerabilities to prevent them from causing data losses
How can we predict vulnerabilities to prevent them from causing data losses
 
Analyst Report: The Digital Universe in 2020 - China
Analyst Report: The Digital Universe in 2020 - ChinaAnalyst Report: The Digital Universe in 2020 - China
Analyst Report: The Digital Universe in 2020 - China
 
The Four(ish) Appsec Metrics You Can’t Ignore
The Four(ish) Appsec Metrics You Can’t IgnoreThe Four(ish) Appsec Metrics You Can’t Ignore
The Four(ish) Appsec Metrics You Can’t Ignore
 
Why Passwords are not strong enough
Why Passwords are not strong enoughWhy Passwords are not strong enough
Why Passwords are not strong enough
 
2013-ISC2-Global-Information-Security-Workforce-Study
2013-ISC2-Global-Information-Security-Workforce-Study2013-ISC2-Global-Information-Security-Workforce-Study
2013-ISC2-Global-Information-Security-Workforce-Study
 
Prof m01-2013 global information security workforce study - final
Prof m01-2013 global information security workforce study - finalProf m01-2013 global information security workforce study - final
Prof m01-2013 global information security workforce study - final
 
Cloud Service Security using Two-factor or Multi factor Authentication
Cloud Service Security using Two-factor or Multi factor AuthenticationCloud Service Security using Two-factor or Multi factor Authentication
Cloud Service Security using Two-factor or Multi factor Authentication
 

Destaque

Talking to elderly parents about home care
Talking to elderly parents about home careTalking to elderly parents about home care
Talking to elderly parents about home careTracy Steel
 
The economic impact of cybercrime and cyber espionage
The economic impact of cybercrime and cyber espionageThe economic impact of cybercrime and cyber espionage
The economic impact of cybercrime and cyber espionageBee_Ware
 
Kilpailukykysopimuksen vaikutusarvio
Kilpailukykysopimuksen vaikutusarvioKilpailukykysopimuksen vaikutusarvio
Kilpailukykysopimuksen vaikutusarvioOlli Kärkkäinen
 
Claudine florence three tools to use in a singing career
Claudine florence three tools to use in a singing careerClaudine florence three tools to use in a singing career
Claudine florence three tools to use in a singing careerclaudine7874
 
Lebron Edwin: Technology Zombies
Lebron Edwin: Technology ZombiesLebron Edwin: Technology Zombies
Lebron Edwin: Technology Zombiesemlebron
 
2013 cost of data breach study - Global analysis
2013 cost of data breach study - Global analysis2013 cost of data breach study - Global analysis
2013 cost of data breach study - Global analysisBee_Ware
 
Website Security Statistics Report 2013
Website Security Statistics Report 2013Website Security Statistics Report 2013
Website Security Statistics Report 2013Bee_Ware
 
Verizon 2014 pci compliance report
Verizon 2014 pci compliance reportVerizon 2014 pci compliance report
Verizon 2014 pci compliance reportBee_Ware
 
To byod or not to byod
To byod or not to byodTo byod or not to byod
To byod or not to byodBee_Ware
 
Carewatch Home Care #CultureCode
Carewatch Home Care #CultureCodeCarewatch Home Care #CultureCode
Carewatch Home Care #CultureCodeTracy Steel
 
Technology integration
Technology integrationTechnology integration
Technology integrationbriggsad
 
The Evolution of Phising Attacks
The Evolution of Phising AttacksThe Evolution of Phising Attacks
The Evolution of Phising AttacksBee_Ware
 
Biometrics how far are we prepared to go
Biometrics how far are we prepared to goBiometrics how far are we prepared to go
Biometrics how far are we prepared to goBee_Ware
 

Destaque (20)

ฟอร มโครงร างโครงงานคอมพ_วเตอร_
ฟอร มโครงร างโครงงานคอมพ_วเตอร_ฟอร มโครงร างโครงงานคอมพ_วเตอร_
ฟอร มโครงร างโครงงานคอมพ_วเตอร_
 
Untitled Presentation
Untitled PresentationUntitled Presentation
Untitled Presentation
 
Talking to elderly parents about home care
Talking to elderly parents about home careTalking to elderly parents about home care
Talking to elderly parents about home care
 
The economic impact of cybercrime and cyber espionage
The economic impact of cybercrime and cyber espionageThe economic impact of cybercrime and cyber espionage
The economic impact of cybercrime and cyber espionage
 
Kilpailukykysopimuksen vaikutusarvio
Kilpailukykysopimuksen vaikutusarvioKilpailukykysopimuksen vaikutusarvio
Kilpailukykysopimuksen vaikutusarvio
 
Claudine florence three tools to use in a singing career
Claudine florence three tools to use in a singing careerClaudine florence three tools to use in a singing career
Claudine florence three tools to use in a singing career
 
Work incentives
Work incentivesWork incentives
Work incentives
 
Lebron Edwin: Technology Zombies
Lebron Edwin: Technology ZombiesLebron Edwin: Technology Zombies
Lebron Edwin: Technology Zombies
 
2013 cost of data breach study - Global analysis
2013 cost of data breach study - Global analysis2013 cost of data breach study - Global analysis
2013 cost of data breach study - Global analysis
 
Website Security Statistics Report 2013
Website Security Statistics Report 2013Website Security Statistics Report 2013
Website Security Statistics Report 2013
 
Verizon 2014 pci compliance report
Verizon 2014 pci compliance reportVerizon 2014 pci compliance report
Verizon 2014 pci compliance report
 
Dibujos
DibujosDibujos
Dibujos
 
CTEL: Social Media - strategy
CTEL: Social Media - strategyCTEL: Social Media - strategy
CTEL: Social Media - strategy
 
ecoupons
ecouponsecoupons
ecoupons
 
To byod or not to byod
To byod or not to byodTo byod or not to byod
To byod or not to byod
 
Carewatch Home Care #CultureCode
Carewatch Home Care #CultureCodeCarewatch Home Care #CultureCode
Carewatch Home Care #CultureCode
 
NDO
NDONDO
NDO
 
Technology integration
Technology integrationTechnology integration
Technology integration
 
The Evolution of Phising Attacks
The Evolution of Phising AttacksThe Evolution of Phising Attacks
The Evolution of Phising Attacks
 
Biometrics how far are we prepared to go
Biometrics how far are we prepared to goBiometrics how far are we prepared to go
Biometrics how far are we prepared to go
 

Semelhante a 2013 Mobile Application Security Survey

Apperian 2015 Executive Enterprise Mobility Survey
Apperian 2015 Executive Enterprise Mobility SurveyApperian 2015 Executive Enterprise Mobility Survey
Apperian 2015 Executive Enterprise Mobility SurveyJennifer Walker
 
Please read the instructions and source that provided, then decide.docx
Please read the instructions and source that provided, then decide.docxPlease read the instructions and source that provided, then decide.docx
Please read the instructions and source that provided, then decide.docxLeilaniPoolsy
 
SANS 2013 Critical Security Controls Survey
SANS 2013 Critical Security Controls SurveySANS 2013 Critical Security Controls Survey
SANS 2013 Critical Security Controls SurveyEdgar Alejandro Villegas
 
Ponemon Institute Data Breaches and Sensitive Data Risk
Ponemon Institute Data Breaches and Sensitive Data RiskPonemon Institute Data Breaches and Sensitive Data Risk
Ponemon Institute Data Breaches and Sensitive Data RiskFiona Lew
 
Growing Cloud Identity Crisis: Survey Report on Cloud-Based Solutions for Ide...
Growing Cloud Identity Crisis: Survey Report on Cloud-Based Solutions for Ide...Growing Cloud Identity Crisis: Survey Report on Cloud-Based Solutions for Ide...
Growing Cloud Identity Crisis: Survey Report on Cloud-Based Solutions for Ide...CloudEntr
 
SANS 2013 Report on Critical Security Controls Survey: Moving From Awareness ...
SANS 2013 Report on Critical Security Controls Survey: Moving From Awareness ...SANS 2013 Report on Critical Security Controls Survey: Moving From Awareness ...
SANS 2013 Report on Critical Security Controls Survey: Moving From Awareness ...FireEye, Inc.
 
Apperian 2017 Executive Enterprise Mobility Report
Apperian 2017 Executive Enterprise Mobility ReportApperian 2017 Executive Enterprise Mobility Report
Apperian 2017 Executive Enterprise Mobility ReportJennifer Walker
 
Mobile Application Security Testing, Testing for Mobility App | www.idexcel.com
Mobile Application Security Testing, Testing for Mobility App | www.idexcel.comMobile Application Security Testing, Testing for Mobility App | www.idexcel.com
Mobile Application Security Testing, Testing for Mobility App | www.idexcel.comIdexcel Technologies
 
2013 Incident Response Survey
2013 Incident Response Survey2013 Incident Response Survey
2013 Incident Response SurveyFireEye, Inc.
 
MEF Global Consumer Trust Report
MEF Global Consumer Trust ReportMEF Global Consumer Trust Report
MEF Global Consumer Trust ReportAVG Technologies
 
Bring Your Own Device 2014 TeamMate User Conference Palm Desert California
Bring Your Own Device 2014 TeamMate User Conference Palm Desert CaliforniaBring Your Own Device 2014 TeamMate User Conference Palm Desert California
Bring Your Own Device 2014 TeamMate User Conference Palm Desert CaliforniaJim Kaplan CIA CFE
 
SANS 2013 Report: Digital Forensics and Incident Response Survey
SANS 2013 Report: Digital Forensics and Incident Response Survey  SANS 2013 Report: Digital Forensics and Incident Response Survey
SANS 2013 Report: Digital Forensics and Incident Response Survey FireEye, Inc.
 
Challenges in Testing Mobile App Security
Challenges in Testing Mobile App SecurityChallenges in Testing Mobile App Security
Challenges in Testing Mobile App SecurityCygnet Infotech
 
Sans survey - maturing - specializing-incident-response-capabilities-needed-p...
Sans survey - maturing - specializing-incident-response-capabilities-needed-p...Sans survey - maturing - specializing-incident-response-capabilities-needed-p...
Sans survey - maturing - specializing-incident-response-capabilities-needed-p...CMR WORLD TECH
 
SANS 2013 Critical Security Controls Survey Moving From A.docx
SANS 2013 Critical Security Controls Survey Moving From A.docxSANS 2013 Critical Security Controls Survey Moving From A.docx
SANS 2013 Critical Security Controls Survey Moving From A.docxanhlodge
 
An Improved Method for Preventing Data Leakage in an Organization
An Improved Method for Preventing Data Leakage in an OrganizationAn Improved Method for Preventing Data Leakage in an Organization
An Improved Method for Preventing Data Leakage in an OrganizationIJERA Editor
 

Semelhante a 2013 Mobile Application Security Survey (20)

Apperian 2015 Executive Enterprise Mobility Survey
Apperian 2015 Executive Enterprise Mobility SurveyApperian 2015 Executive Enterprise Mobility Survey
Apperian 2015 Executive Enterprise Mobility Survey
 
Please read the instructions and source that provided, then decide.docx
Please read the instructions and source that provided, then decide.docxPlease read the instructions and source that provided, then decide.docx
Please read the instructions and source that provided, then decide.docx
 
SANS 2013 Critical Security Controls Survey
SANS 2013 Critical Security Controls SurveySANS 2013 Critical Security Controls Survey
SANS 2013 Critical Security Controls Survey
 
Ponemon Institute Data Breaches and Sensitive Data Risk
Ponemon Institute Data Breaches and Sensitive Data RiskPonemon Institute Data Breaches and Sensitive Data Risk
Ponemon Institute Data Breaches and Sensitive Data Risk
 
Growing Cloud Identity Crisis: Survey Report on Cloud-Based Solutions for Ide...
Growing Cloud Identity Crisis: Survey Report on Cloud-Based Solutions for Ide...Growing Cloud Identity Crisis: Survey Report on Cloud-Based Solutions for Ide...
Growing Cloud Identity Crisis: Survey Report on Cloud-Based Solutions for Ide...
 
SANS 2013 Report on Critical Security Controls Survey: Moving From Awareness ...
SANS 2013 Report on Critical Security Controls Survey: Moving From Awareness ...SANS 2013 Report on Critical Security Controls Survey: Moving From Awareness ...
SANS 2013 Report on Critical Security Controls Survey: Moving From Awareness ...
 
Apperian 2017 Executive Enterprise Mobility Report
Apperian 2017 Executive Enterprise Mobility ReportApperian 2017 Executive Enterprise Mobility Report
Apperian 2017 Executive Enterprise Mobility Report
 
Mobile Application Security Testing, Testing for Mobility App | www.idexcel.com
Mobile Application Security Testing, Testing for Mobility App | www.idexcel.comMobile Application Security Testing, Testing for Mobility App | www.idexcel.com
Mobile Application Security Testing, Testing for Mobility App | www.idexcel.com
 
2013 Incident Response Survey
2013 Incident Response Survey2013 Incident Response Survey
2013 Incident Response Survey
 
IT Security Risks Survey 2014
IT Security Risks Survey 2014IT Security Risks Survey 2014
IT Security Risks Survey 2014
 
MEF Global Consumer Trust Report
MEF Global Consumer Trust ReportMEF Global Consumer Trust Report
MEF Global Consumer Trust Report
 
Bring Your Own Device 2014 TeamMate User Conference Palm Desert California
Bring Your Own Device 2014 TeamMate User Conference Palm Desert CaliforniaBring Your Own Device 2014 TeamMate User Conference Palm Desert California
Bring Your Own Device 2014 TeamMate User Conference Palm Desert California
 
IT Security Trends in 2012
IT Security Trends in 2012IT Security Trends in 2012
IT Security Trends in 2012
 
SANS 2013 Report: Digital Forensics and Incident Response Survey
SANS 2013 Report: Digital Forensics and Incident Response Survey  SANS 2013 Report: Digital Forensics and Incident Response Survey
SANS 2013 Report: Digital Forensics and Incident Response Survey
 
Challenges in Testing Mobile App Security
Challenges in Testing Mobile App SecurityChallenges in Testing Mobile App Security
Challenges in Testing Mobile App Security
 
Mobile security article
Mobile security articleMobile security article
Mobile security article
 
Sans survey - maturing - specializing-incident-response-capabilities-needed-p...
Sans survey - maturing - specializing-incident-response-capabilities-needed-p...Sans survey - maturing - specializing-incident-response-capabilities-needed-p...
Sans survey - maturing - specializing-incident-response-capabilities-needed-p...
 
SANS 2013 Critical Security Controls Survey Moving From A.docx
SANS 2013 Critical Security Controls Survey Moving From A.docxSANS 2013 Critical Security Controls Survey Moving From A.docx
SANS 2013 Critical Security Controls Survey Moving From A.docx
 
Mobile Application Security
Mobile Application Security Mobile Application Security
Mobile Application Security
 
An Improved Method for Preventing Data Leakage in an Organization
An Improved Method for Preventing Data Leakage in an OrganizationAn Improved Method for Preventing Data Leakage in an Organization
An Improved Method for Preventing Data Leakage in an Organization
 

Mais de Bee_Ware

Les francais et la protection des données personnelles
Les francais et la protection des données personnellesLes francais et la protection des données personnelles
Les francais et la protection des données personnellesBee_Ware
 
DDoS threat landscape report
DDoS threat landscape reportDDoS threat landscape report
DDoS threat landscape reportBee_Ware
 
Top ten big data security and privacy challenges
Top ten big data security and privacy challengesTop ten big data security and privacy challenges
Top ten big data security and privacy challengesBee_Ware
 
2013 global encryption trends study
2013 global encryption trends study2013 global encryption trends study
2013 global encryption trends studyBee_Ware
 
Numergy la sécurité des données dans le cloud
Numergy la sécurité des données dans le cloudNumergy la sécurité des données dans le cloud
Numergy la sécurité des données dans le cloudBee_Ware
 
Waf, le bon outil, la bonne administration
Waf, le bon outil, la bonne administration Waf, le bon outil, la bonne administration
Waf, le bon outil, la bonne administration Bee_Ware
 
Bonnes pratiques de sécurité - Kaspersky
Bonnes pratiques de sécurité - KasperskyBonnes pratiques de sécurité - Kaspersky
Bonnes pratiques de sécurité - KasperskyBee_Ware
 
Les entreprises européennes sont elles bien armées pour affronter les cyber a...
Les entreprises européennes sont elles bien armées pour affronter les cyber a...Les entreprises européennes sont elles bien armées pour affronter les cyber a...
Les entreprises européennes sont elles bien armées pour affronter les cyber a...Bee_Ware
 
Maitriser la ssi pour les systèmes industriels
Maitriser la ssi pour les systèmes industrielsMaitriser la ssi pour les systèmes industriels
Maitriser la ssi pour les systèmes industrielsBee_Ware
 
Kindsight security labs malware report - Q4 2013
Kindsight security labs malware report - Q4 2013Kindsight security labs malware report - Q4 2013
Kindsight security labs malware report - Q4 2013Bee_Ware
 
Managing complexity in IAM
Managing complexity in IAMManaging complexity in IAM
Managing complexity in IAMBee_Ware
 
Websense security prediction 2014
Websense   security prediction 2014Websense   security prediction 2014
Websense security prediction 2014Bee_Ware
 
Les principales failles de sécurité des applications web actuelles
Les principales failles de sécurité des applications web actuellesLes principales failles de sécurité des applications web actuelles
Les principales failles de sécurité des applications web actuellesBee_Ware
 
La sécurité des Si en établissement de santé
La sécurité des Si en établissement de santéLa sécurité des Si en établissement de santé
La sécurité des Si en établissement de santéBee_Ware
 
Les 10 risques liés aux applications mobiles
Les 10 risques liés aux applications mobilesLes 10 risques liés aux applications mobiles
Les 10 risques liés aux applications mobilesBee_Ware
 
Guide de mise en oeuvre d'une authentification forte avec une cps
Guide de mise en oeuvre d'une authentification forte avec une cpsGuide de mise en oeuvre d'une authentification forte avec une cps
Guide de mise en oeuvre d'une authentification forte avec une cpsBee_Ware
 
Clusif le role de l'organisation humaine dans la ssi 2013
Clusif le role de l'organisation humaine dans la ssi 2013Clusif le role de l'organisation humaine dans la ssi 2013
Clusif le role de l'organisation humaine dans la ssi 2013Bee_Ware
 
2013 cost of data breach study - France
2013 cost of data breach study - France2013 cost of data breach study - France
2013 cost of data breach study - FranceBee_Ware
 
X force report 2013
X force report 2013X force report 2013
X force report 2013Bee_Ware
 
An overview of web security
An overview of web securityAn overview of web security
An overview of web securityBee_Ware
 

Mais de Bee_Ware (20)

Les francais et la protection des données personnelles
Les francais et la protection des données personnellesLes francais et la protection des données personnelles
Les francais et la protection des données personnelles
 
DDoS threat landscape report
DDoS threat landscape reportDDoS threat landscape report
DDoS threat landscape report
 
Top ten big data security and privacy challenges
Top ten big data security and privacy challengesTop ten big data security and privacy challenges
Top ten big data security and privacy challenges
 
2013 global encryption trends study
2013 global encryption trends study2013 global encryption trends study
2013 global encryption trends study
 
Numergy la sécurité des données dans le cloud
Numergy la sécurité des données dans le cloudNumergy la sécurité des données dans le cloud
Numergy la sécurité des données dans le cloud
 
Waf, le bon outil, la bonne administration
Waf, le bon outil, la bonne administration Waf, le bon outil, la bonne administration
Waf, le bon outil, la bonne administration
 
Bonnes pratiques de sécurité - Kaspersky
Bonnes pratiques de sécurité - KasperskyBonnes pratiques de sécurité - Kaspersky
Bonnes pratiques de sécurité - Kaspersky
 
Les entreprises européennes sont elles bien armées pour affronter les cyber a...
Les entreprises européennes sont elles bien armées pour affronter les cyber a...Les entreprises européennes sont elles bien armées pour affronter les cyber a...
Les entreprises européennes sont elles bien armées pour affronter les cyber a...
 
Maitriser la ssi pour les systèmes industriels
Maitriser la ssi pour les systèmes industrielsMaitriser la ssi pour les systèmes industriels
Maitriser la ssi pour les systèmes industriels
 
Kindsight security labs malware report - Q4 2013
Kindsight security labs malware report - Q4 2013Kindsight security labs malware report - Q4 2013
Kindsight security labs malware report - Q4 2013
 
Managing complexity in IAM
Managing complexity in IAMManaging complexity in IAM
Managing complexity in IAM
 
Websense security prediction 2014
Websense   security prediction 2014Websense   security prediction 2014
Websense security prediction 2014
 
Les principales failles de sécurité des applications web actuelles
Les principales failles de sécurité des applications web actuellesLes principales failles de sécurité des applications web actuelles
Les principales failles de sécurité des applications web actuelles
 
La sécurité des Si en établissement de santé
La sécurité des Si en établissement de santéLa sécurité des Si en établissement de santé
La sécurité des Si en établissement de santé
 
Les 10 risques liés aux applications mobiles
Les 10 risques liés aux applications mobilesLes 10 risques liés aux applications mobiles
Les 10 risques liés aux applications mobiles
 
Guide de mise en oeuvre d'une authentification forte avec une cps
Guide de mise en oeuvre d'une authentification forte avec une cpsGuide de mise en oeuvre d'une authentification forte avec une cps
Guide de mise en oeuvre d'une authentification forte avec une cps
 
Clusif le role de l'organisation humaine dans la ssi 2013
Clusif le role de l'organisation humaine dans la ssi 2013Clusif le role de l'organisation humaine dans la ssi 2013
Clusif le role de l'organisation humaine dans la ssi 2013
 
2013 cost of data breach study - France
2013 cost of data breach study - France2013 cost of data breach study - France
2013 cost of data breach study - France
 
X force report 2013
X force report 2013X force report 2013
X force report 2013
 
An overview of web security
An overview of web securityAn overview of web security
An overview of web security
 

Último

UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...itnewsafrica
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructureitnewsafrica
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Nikki Chapple
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkPixlogix Infotech
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...itnewsafrica
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024TopCSSGallery
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 

Último (20)

UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App Framework
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 

2013 Mobile Application Security Survey

  • 1. Sponsored by Box, SAP and Veracode 2013 SANS Mobile Application Security Survey June 2013 A SANS Whitepaper Written by Kevin Johnson and James Jardine Advisor: Barbara Filkins Survey Participant Demographics Application Usage Page 2 Page 4 Application Development Page 6 Application Management Page 10
  • 2. Introduction Mobile devices, particularly those owned by employees and used to access work applications, represent the latest front for attackers. Employees are downloading applications vulnerable to or infected with malware that mix with company e-mail, productivity/workforce and other business applications. Because of this new threat, SANS conducted a survey to discover organizational awareness and the procedures around mobile application risk. (This survey follows a first survey, focused on the state of mobile device security,1 and a second, focused on policies and practices used to secure those devices.2) In this survey on security of mobile applications, we found that most organizations are concerned about mobile applications and the security threat they impose. The survey showed the following concerns of the organizations: • heir biggest concern is the security of the device and how it can help protect the apps and app data T available on the device. • hey most consistently rely on VPN/access controls, a tried and tested technology for company-issued T mobile device access, to protect company applications from rogue bring your own device (BYOD) access. • he largest percentage (nearly 60%) feel security checks throughout the software development lifecycle T (SDLC) are important, and a smaller number is actually practicing these processes. • rapping it all together under management of applications, organizations are having the most difficulty W achieving the level of unified access they need to support their policies, including SDLC. This report covers these and other trends in more detail in the following pages. 1 www.sans.org/reading_room/analysts_program/mobility-sec-survey.pdf 2 www.sans.org/reading_room/analysts_program/SANS-survey-mobility.pdf SANS Analyst Program 1 2013 SANS Mobile Application Security Survey
  • 3. Survey Participant Demographics Nearly 900 people started the survey, with more than 600 answering the first 11 questions on awareness and practices. When asked if they conducted application development, 253 indicated they did and were sent to another set of questions. That suggests a strong set of developers took the survey; but the majority, being from enterprise organizations that own and manage apps, don’t develop them. The survey was held online for six weeks during February and March 2013. Respondents came from a wide range of industries. The largest number of respondents came from highly regulated sectors such as the government sector (18%), followed closely by the financial services and “Other” categories—both of which had slightly less than 16% of the total. Government and financial services were similarly represented in our first two surveys, suggesting that mobile application security is becoming a priority or these groups. Figure 1 provides a breakdown of the survey respondents. What is your organization’s primary industry? Figure 1. Industries Represented SANS Analyst Program 2 2013 SANS Mobile Application Security Survey
  • 4. Survey Participant Demographics Respondents from multinational organizations were our largest group (26%). This might indicate that these organizations are seeing and adopting more policies around their applications accessed by BYOD practices. But smaller organizations with 100–499 employees were also well represented (15%), hinting that even smaller organizations are beginning to understand the importance of mobile application security (see Figure 2). (CONTINUED) How large is your organization? Echoing the results from the Figure 2. Organization Size previous two mobile surveys conducted by SANS in 2012, most of the respondents were security analysts and network administrators, lending a security-in-depth perspective to the survey. When you combine the IT manager/CIO column with the Security manager/CSO columns, you see that a large representation of senior managers (48%) also took this survey. The roles represented in survey responses are shown in What is (are) your role(s) in the organization, whether as staff or consultant? Figure 3. Interestingly, some respondents (41 staff members and 19 consultants) indicate they hold the new title of “mobility director.” The majority of respondents were staff members rather than consultants. While consultants can and do provide specialized skills and help, staff members often have a better and more long-term focus on the mobility issues an organization is experiencing. Their participation in the survey provides us with a clearer view of the needs and concerns of organizations from Figure 3. Roles of Respondents all perspectives. For example, developers and software engineers provide a different perspective (perhaps wanting to build in security and encryption during app development) than those holding administrative and security jobs, who see security of applications as something to handle after the fact. For example, the latter group—those who manage applications—would be more inclined to add in endpoint security, data encryption and application-wrapping security capabilities to protect against intrusion and leakage through mobile applications. SANS Analyst Program 3 2013 SANS Mobile Application Security Survey
  • 5. Application Usage Our goal with this survey was to go beyond the extent of personal mobile device use to explore what people do on those devices. It is clear that employees in most commercial organizations use both BYOD and corporate devices to access work applications, as shown in Figure 4. Please estimate the percentage of users in your organization who use personal devices to access work applications In our original survey, 37% of respondents did not allow BYOD, so this shows an increase in BYOD usage since last year. In this survey, only a small percentage checked that 100% of their users had BYOD Figure 4. Personal Device Use to Access Work Applications access to work applications. The largest group (21%) actually represented the smallest number of BYOD users accessing work applications. Many respondents commented that they did not allow personal devices. Consistent with our previous two surveys, there were lower levels of BYOD usage in the government sector than in the private sector. What Apps They’re Using But, what are people doing with their personal devices? The answer to this question will allow us to understand the usage and, therefore, the risks organizations face and the precautions they might undertake. For example, if an organization allows remote access to its network and the connecting device is compromised, the attacker has access into the network and any unencrypted apps. The compromised device can provide remote access, becoming a pivot What categories of business apps are you allowing on personal mobile devices? point from which attacks can be launched. And, the risk is greater when access is granted to business applications such as ERP and collaborative programs. As shown in Figure 5, not surprisingly, the most common applications accessed remotely are communications and collaboration (i.e., e-mail) and general Internet access (i.e., browser, file-sharing). SANS Analyst Program Figure 5. Categories of Business Applications Accessed Remotely 4 2013 SANS Mobile Application Security Survey
  • 6. Application Usage (CONTINUED) Approximately 26% of the respondents say their organizations also allow access to business systems, and 33% allow access to productivity applications. From their large response to network access/VPN (44%), they are likely doing so through secured connections. This implies that these organizations either believe that the device is a safe risk for that level of data access or that they accept the related risks. These risks can be significant, given the media’s attempts to dub the past few years as the “year of mobile malware.” Another 5% are accessing control system applications from mobile and personal devices; and another 8% are accessing field service applications, which can also be attached directly or indirectly to control systems, providing another pathway into critical control systems. Our hope is that those devices, their operators and employers are 100% aware of the risk and have layered their security or further secured the mobile applications accordingly. According to a SANS survey on SCADA security practices published in February 2013, 70% of nearly 700 respondents feel that there is a high level of cyber risk to their systems, yet lowering risk was very low on their list of priorities, and only 30% have strong security requirements for their control system procurement processes.3 What Scares Them So, what are the biggest concerns an organization faces with regard to mobile security? Figure 6 reveals that most organizations are worried first about their data, which is, of course, accessed from the mobile app, and then about the device as a launch point for attacks. What are your biggest concerns related to mobile applications? These concerns make sense, given that these two categories cover most of the app security risk around mobile devices. It is also interesting that secured Figure 6. Concerns Related to Mobile Applications access to applications is of concern to 53% of our respondents, given that 44% of them are granting BYOD access via VPN services, as shown in the previous figure (Figure 5). The rest of the categories checked indicate that at least 30% to 40% are also thinking about the network infrastructure, secure application components and unauthorized BYOD sprawl (managing the proliferation of devices). That number could be higher, and we suspect it will be if we conduct this survey again next year. 3 www.sans.org/reading_room/analysts_program/sans_survey_scada_2013.pdf SANS Analyst Program 5 2013 SANS Mobile Application Security Survey
  • 7. Application Development In addition to studying how respondents are protecting their applications being used and accessed by BYOD, this survey was also designed to find out how they manage the applications they developed themselves. What They’re Developing When asked what type of mobile applications they developed, about 2/3 of the survey base were skipped to the end because they didn’t do development. Of those 253 respondents who did answer this question, they are primarily developing web applications and updates (68%), and 32% are developing line-of-business (LOB) applications accessed by mobile/BYOD. Only 20% of those who answered this question are developing mobile apps for commercial use, with about the same amount developing their own cloud applications for mobile users, as shown in Figure 7. With the organizations’ focus on web development capabilities, and augmented with their cloud development, it’s clear that the web-based interface will be used to replace manual processes to meet new demands to account for mobile access. And, with 32% of respondents building “internal” applications, new risks of data loss and intrusion arise. Organizations deploying their applications on mobile devices will have to develop plans to mitigate these new vectors. What are your mobile application development focus areas? Figure 7. Mobile Applications Being Developed SANS Analyst Program 6 2013 SANS Mobile Application Security Survey
  • 8. Application Development (CONTINUED) Choice of Platforms Because of their popularity today, iOS (87%) and Android (74%) lead the pack as popular platforms organizations develop for. As shown in Figure 8, development for Windows 8 is low (30%) compared to iOS (87%) and Android (74%). What mobile platforms do you develop for? The comparatively low level of Windows development was surprising, given the release of Windows 8 tablets and mobile devices last year. Interestingly, 31% of respondents develop for the BlackBerry platform, which does not seem to have disappeared from the business landscape, despite the growth of other smart device adoption. Figure 8. Popularity of Development for Mobile Platforms Their Priorities In the survey, respondents were asked to rank their objectives, with 1 being the most important and 9 being the least important objective. It is rewarding to note that they rate the security of the data as the most important objective during development (average rating of 3.38). From the results, performance is marginally more important (3.80) than security of the application (3.86), which is promising. See Table 1 for the ranking of their priorities. Objective Ranking Security of the data 3.38 Performance 3.80 Security of the application 3.86 Reliability 4.16 Usability/user interface 4.59 Security of the network/enterprise 4.75 Rapid time to market 5.11 Scalability 5.72 Other 8.64 Table 1. Top Development Objectives SANS Analyst Program 7 2013 SANS Mobile Application Security Survey
  • 9. Application Development (CONTINUED) Not surprisingly, usability, scalability, reliability and performance are seen as more important than application security. This may reflect both the importance organizations place on performance of all applications and a level of management that does not yet appreciate the consequences of insecure applications. Next, we need to look at what organizations are doing to ensure the security of their systems, data and users. Figure 9 lists several processes that organizations are implementing to different degrees. Which of the following security practices do you follow during your mobile application lifecycle? Figure 9. Security Practices Followed The security practices are fairly evenly split among the various phases of the software development lifecycle (SDLC)—with a secure lifecycle being the highest chosen among them overall. No more than 50% chose any other practice; but for those developers, or the organization that supports them, they are evenly focused on dealing with security issues during coding and development. SANS Analyst Program 8 2013 SANS Mobile Application Security Survey
  • 10. Application Development (CONTINUED) Specifically, when asked about the use of vulnerability scans, almost 34% of the respondents either do not perform vulnerability scans of the applications at all or perform them infrequently. Continuous monitoring for possible attack vectors is a critical component of the Critical Security Controls (CSCs), particularly Critical Control 2 (inventory of authorized/unauthorized software), Critical Control 4 (continuous vulnerability assessment and remediation) and Critical Control 6 (application software security).4 Figure 10 shows how frequently companies conduct vulnerability scans. As part of your lifecycle management approach, how frequently does your company conduct application vulnerability scans? Figure 10. Use of Application Vulnerability Scans The apparent lack of application-level scanning implies that the organizations are depending on source code reviews and threat assessments to protect their applications and data. We often see organizations depend on their authentication system to verify that a user actually is that user, but tools like Firesheep are able to hijack the mobile application’s session. (Firesheep was originally an attack against Facebook, but it has been improved to add support for multiple mobile applications.) Flaws found in applications after production are more expensive to repair, and if left unattended (as discovered in so many penetration tests), are even more expensive in terms of loss. 4 www.sans.org/critical-security-controls SANS Analyst Program 9 2013 SANS Mobile Application Security Survey
  • 11. Application Management Application management is part of the SDLC. Even for organizations that don’t develop the applications being accessed by their mobile users, management of these apps is as critical as secure access and device scanning. Of the organizations responding, more than half (55%) use internal processes to handle management and services for their applications, as shown in Figure 11. How are these apps managed for end-users today? Externally provided management, represented by use of third-party providers and public clouds, has become popular. Most of the respondents are using multiple approaches to securing mobile applications. The most common focuses are on securing not only the devices, but also the mobile apps and content those devices use every day. Figure 11. Application Management Options Their Practices Figure 12 provides a list of many of the security policies and practices surrounding corporately-owned devices and how frequently they are used. We hope that these policies also address the BYOD devices. This multilayered approach is commendable, because it builds upon the existing security controls in the nonmobile space. In fact, mobile applications often make use of existing web applications or use features, including encryption libraries, added to the existing applications for additional protection. SANS Analyst Program What are your security policies and practices around the deployment, use, and management of corporately-owned mobile applications? Figure 12. Security Policies and Practices for Corporately-Owned Mobile Applications 10 2013 SANS Mobile Application Security Survey
  • 12. Application Management (CONTINUED) However, this overlap of systems and applications makes it imperative that organizations understand their existing controls and how they can be leveraged to protect the mobile users and applications. So, for example, securing the devices through use of tools such as Mobile Device Management (MDM) or enhanced NAC (Network Access Controls) organizations are also protecting against rogue applications, because both of those will check for unapproved or malicious applications based on their programmed policies. This is also a plea to MDM vendors to provide more integrated security services regarding encrypting access to business applications from MDM protected devices. Management Difficulties There appears to be little difference in organizations’ perceptions of how difficult these policies and practices are to implement. Most respondents consider implementation to have some moderate level of difficulty. Figure 13 shows the average difficulty ratings for each of the security policies and procedures, where 1 is “not particularly difficult,” 2 is “difficult,” and 3 is “extremely difficult.” The higher the average score, the more difficult it is to implement the policies and procedures. Not surprisingly, protecting applications with strong authentication was comparatively easy (1.70), which is in keeping with organizational concerns (Figure 5) and controls (Figure 9). How difficult have the following policies and practices been to implement? The security industry has been using such procedures for a long time with Figure 13. Difficulty of Implementation company-issued mobile devices. On the other hand, providing an identity management framework to support remote devices (2.05) and ensuring secure development of applications (2.01), were considered more difficult. Not far behind is secure development and lifecycle practices. This applies to both development and management of applications being accessed remotely by BYOD. As stated earlier, there needs to be much more maturity in the mobile space, given the breadth and nature of threats being aimed at mobile devices. Taken together, the results provided in Figures 12 and 13 suggest that organizations recognize and are doing the difficult work of implementing policies and practices. Moreover, they suggest that organizations should place some emphasis on developing techniques that rely on tried and true security policies to secure mobile applications. In addition, it seems clear that additional focus is required on providing adequate security review during the SDLC. SANS Analyst Program 11 2013 SANS Mobile Application Security Survey
  • 13. Conclusion As organizations and their staffs continue to rush down the path of implementing and using mobile devices and applications, security needs to continue to focus on our implementations. This is becoming both easier and harder as time goes by. The rush to implement or build mobile applications is adding to the complexity security and IT staffs have to handle. This means that responsible staff members have to be on top of the latest threats and controls available to the attackers and defenders. Proactive security during development and deployment should become a best practice. The following suggestions can help organizations accomplish their security goals: • nsure and adjust policies to include the devices the organization allows to access network resources. E For example, institute a policy that describes the type of mobile devices allowed to access the network. • valuate the applications, data and access the mobile devices use to determine what needs can be E addressed. • onsider the inclusion of mobile app security encryption libraries during development, or apply them to C third-party apps being used for larger scale corporate deployment. • erform security assessments of applications being built or developed. Start even before the application P development begins, and continue assessing applications in production, as per the CSCs. • ssess the mobile devices and their supporting architecture as often as possible, keeping in mind that A many of the devices may be owned by employees. • ontinue to enable users with education and security updates. C These are broad-stroke mechanisms to consider for protecting the network, resources and data on endpoints from malicious hostile applications. Architectures deployed to manage this new risk need to be capable of expanding to new types of devices and applications because users will continue to make more demands in the future. SANS Analyst Program 12 2013 SANS Mobile Application Security Survey
  • 14. About the Authors Kevin Johnson is a senior security consultant with Secure Ideas. Kevin has a long history in the IT field including system administration, network architecture and application development. He has been involved in building incident response and forensic teams, architecting security solutions for large enterprises and penetration testing everything from government agencies to Fortune 100 companies. Kevin is the author of three classes: SEC542: Web Application Penetration Testing, Ethical Hacking; SEC642: Advanced Web Application Penetration Testing and SEC571: Mobile Device Security. In addition, he is an instructor and author for the SANS Institute, a faculty member at IANS and a contributing blogger at TheMobilityHub. James Jardine is a principal security consultant with Secure Ideas, LLC. James has over 12 years of software development experience, with over half of that focusing on application security. During his long development history, he has written both large enterprise applications, thick clients and mobile applications. He has held many roles including senior developer, software architect and application security expert. James is also involved in the open source community. He runs a number of open source projects, including WCSA (a security analyzer for web.config files) and EventValMod (a tool to modify event validation values in .Net). He is also a contributor to the Laudanum project (a collection of injectable web payloads). In addition, James is an instructor and author for the SANS Institute. He is also a contributing blogger for the Secure Ideas blog, the Jardine Software blog, and the SANS Appsec blog. SANS would like to thank its sponsors: SANS Analyst Program 13 2013 SANS Mobile Application Security Survey