Mobile Platform Flashcards

1
Q

OWASP Mobile Top - 2016

A
M1: Improper Platform Usage
M2: Insecure Data Storage
M3: Insecure Communication
M4: Insecure Authentication
M5: Insufficient Cryptography
M6: Insecure Authorization
M7: Client Code Quality
M8: Code Tampering
M9: Reverse Engineering
M10: Extraneous Functionality
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Bluebugging

A

Mobile Bluetooth attacks enables an attacker to gain remote access to the victims mobile and use its features without the victim’s knowledge or consent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Bluesnarfing

A

The theft of information from a wireless device through a Bluetooth connection, often between phones, desktops, laptops, PDAs, and others. This technique allows an attacker to access the victim’s contact list, emails, text messages, photos, videos, business data, and so on stored on the device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Data Tampering

A

Process of modifying content on the victim’s mobile. Here, the malicious application has performed data tampering over other applications in Jason’s mobile phone.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly