Mobile Platform Flashcards
1
Q
OWASP Mobile Top - 2016
A
M1: Improper Platform Usage M2: Insecure Data Storage M3: Insecure Communication M4: Insecure Authentication M5: Insufficient Cryptography M6: Insecure Authorization M7: Client Code Quality M8: Code Tampering M9: Reverse Engineering M10: Extraneous Functionality
2
Q
Bluebugging
A
Mobile Bluetooth attacks enables an attacker to gain remote access to the victims mobile and use its features without the victim’s knowledge or consent
3
Q
Bluesnarfing
A
The theft of information from a wireless device through a Bluetooth connection, often between phones, desktops, laptops, PDAs, and others. This technique allows an attacker to access the victim’s contact list, emails, text messages, photos, videos, business data, and so on stored on the device.
4
Q
Data Tampering
A
Process of modifying content on the victim’s mobile. Here, the malicious application has performed data tampering over other applications in Jason’s mobile phone.