Mobile app privacy Flashcards
1
Q
Network traffic needs to be securely encrypted to prevent an adversary from eavesdropping
A
Insecure network communications
2
Q
Adversaries can exploit vulnerabilities in mobile device web browser applications as an entry point to gain access to a mobile device.
A
Web browser vulnerabilities
3
Q
Third-party software libraries are reusable components that may be distributed freely or offered for a fee to other software vendors.
A
Vulnerabilities in third-party libraries