Главная
Study mode:
on
1
Intro
2
Introductions
3
Considerations: Mobile traffic increases
4
Considerations: Mobile ubiquity
5
Considerations: Mobile insecurity
6
OWASP Mobile Top 10
7
Don't Store or Store Securely
8
Protect the Server (highlights)
9
OWASP ProActive Controls
10
Over the Wire
11
Poor TLS Implementations
12
Unintended Data Leakage
13
Know Your Libraries
14
Mobile Network Traffic
15
Make it hard for the attacker
16
Takeaways
17
iOS 8 Security
18
Swift
19
Android ART
20
We need help!
21
Additional References/Resources
22
Reach out! Questions?
Description:
Explore ten crucial strategies for securing mobile applications in this conference talk from AppSecUSA 2014. Delve into threat modeling techniques and discover the top vulnerabilities and solutions for mobile apps using the OWASP Mobile Top Ten framework. Learn how to expedite the process of securing mobile applications through insights on encryption, web service design, and privacy protection. Gain valuable knowledge from industry experts Jason Haddix and Daniel Miessler as they share their expertise on application security, penetration testing, and risk reduction strategies for Fortune 100 companies. Cover essential topics including secure data storage, server protection, proactive controls, TLS implementations, data leakage prevention, library management, and network traffic security. Understand the latest developments in iOS 8 security, Swift, and Android ART while acquiring practical advice for developers, testers, and managers to enhance mobile application security.

Ten Secrets to Secure Mobile Applications

OWASP Foundation
Add to list
0:00 / 0:00