Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

7. Write a summary of one of the following articles 2. The Mouse That Knows You in Chapter 1 (pages 40-41) B. Mobile App Developers:

image text in transcribed
image text in transcribed
image text in transcribed
image text in transcribed
image text in transcribed
7. Write a summary of one of the following articles 2. "The Mouse That Knows You" in Chapter 1 (pages 40-41) B. "Mobile App Developers: Start with Security below Mobile App Developers: Start with Security Smartphones and tablets are powerful and popular, with more than a thousand new mobile apps hitting the market each day. In this fast-moving era of entrepreneurship and creativity, is security keeping up? Apps and mobile devices often rely on consumer data- including contact information, photos, and location to name a few -- and can be vulnerable to digital snoops, data breaches, and real- world thieves. The Federal Trade Commission (FTC), the nation's consumer protection agency, offers these tips to help developers approach mobile app security Aim for reasonable data security There is no checklist for securing all apps Different apps have different security needs. For example, an alarm clock app that collects little or no data will likely raise fewer security considerations than a location-based social network Apps that are more complex may rely on remote servers for storing and manipulating users' data, meaning that developers must be familiar with securing software, securing transmissions of data, and securing servers. Adding to the challenge: Security threats and best practices evolve quickly The FTC expects app developers to adopt and maintain reasonable data security practices and doesn't prescribe a one-size-fits-all approach. This brochure offers a starting point to help you provide a secure experience for your users. If applied thoughtfully and clusion The FTC expects app developers to adopt and maintain reasonable data security practices and doesn't prescribe a one-size-fits-all approach. This brochure offers a starting point to help you provide a secure experience for your users. If applied thoughtfully and consistently , these tips can help protect you, your users, and the reputation of your app. Tips for mobile app security Your team should include at least one person responsible for considering security at every stage of your app's development. If you're running a solo operation, that person is you. It's easy to assume someone else is handling security - whether that someone is a mobile operating system provider, a device manufacturer, or another member of the development team. It's true that everyone has a role to play, but as the developer, you're the final line of defense Practice data minimization: Don't collect or keep data you don't need. For example, if your photo-editing app doesn't require access to a user's contact info, don't ask for it. Simply put, data you don't collect is data you don't need to worry about protecting. Avoid keeping data longer than you need to. For example, if you offer a location-based mobile game, get rid of the location data when it's no longer relevant Research the mobile platforms you work with. Each mobile operating system uses different application programming interface (APIs). provides you with different security-related features, and handles permissions its own way. Don't expect that one platform works exactly like another. Do your research and adapt your code accordingly. Mobile platforms often provide helpful security features. But it's your job to understand those features (and their limitations) implement them properly, and take other measures necessary to protect your users. In addition, while platform-based permissions Net Mobile platforms often provide helpful security features. But it's your job to understand those features and their limitations) implement them properly, and take other measures necessary to protect your users. In addition, while platform-based permissions might be helpful in conveying security information to your customers, they're no substitute for your own effective communication, Talk to your users in your own words. If you create credentials for your users (like usernames and passwords), create them securely. For example, a short number string might be an appropriate token for authenticating a user on a game score board, but the same credential wouldn't be appropriate for a social networking app Use transit encryption for usernames, passwords, and other important data:perform due diligence on libraries and third-party code. Anytime your app transmits usernames, passwords, API keys, or other types of important data, use transit encryption Mobile devices commonly rely on unsecure Wi-Fi access points at coffee shops, airports, and the like -- and it's easy for troublemakers to snoop and intercept connections To protect users, developers often deploy SSL/TLS in the form of HTTPS Consider using HTTPS or another industry-standard method. There's no need to reinvent the wheel. If you use HTTPS, use a digital certificate and ensure your app checks it properly. A no-trills digital certificate from a reputable vendor is inexpensive and helps your customers ensure they re communicating with your servers, and not someone else's. But standards change, so keep an eye on current technologies, and make sure you're using the latest and greatest security features Before using someone else's code to build or augment your app, do your research. Does this library or SDK have known security lusion Before using someone else's code to build or augment your app, do your research Does this library or SDK have known security vulnerabilities? Has it been tested in real-world settings? Have other developers reported problems? Third-party libraries can save time, but make sure you stay accountable for your app, Protect your data, servers, and passwords. If your app handles personal information consider protecting or obscuring the data -for example, by using encryption. Some platforms have special storage schemes for sensitive data like passwords and keys. Use them if they're available. This helps protect your users in the event of viruses, malware or a lost device If you maintain a server that communicates with your app, take appropriate security measures to protect it. If you rely on a commercial cloud provider, understand the divisions of responsibility for securing and updating software on the server. While some commercial services will monitor and update your servers security, others leave you in control Server security is its own complex topic, so do some research. Take steps to protect yourself from common vulnerabilities, including injection attacks, cross-site scripting, and other threats. Don't store passwords in plaintext on your server. Instead, consider using an iterated cryptographic hash function to hash users passwords and then verify against these hash values. (Your users can simply reset their passwords if they forget.) That way, if your server suffers a data breach passwords aren't left completely exposed. Even after you ship your app, stay involved. New vulnerabilities arise daily, and even the most reputable software libraries require security updates. Follow general and library-specific mailing lists and have a plan for shipping security updates.if needed. Check your an Nestor commercial services will monitor and update your servers' security, others leave you in control Server security is its own complex topic, so do some research. Take steps to protect yourself from common vulnerabilities, including injection attacks, cross-site scripting, and other threats. Don't store passwords in plaintext on your server. Instead, consider using an iterated cryptographic hash function to hash users passwords and then verify against these hash values. (Your users can simply reset their passwords if they forget) That way, if your server suffers a data breach passwords aren't left completely exposed Even after you ship your app, stay involved. New vulnerabilities arise daily, and even the most reputable software libraries require Security updates. Follow general and library-specific mailing lists and have a plan for shipping security updates if needed. Check your inbox, too. User feedback can help you spot and fix security vulnerabilities. When they discover vulnerabilities, researchers often try to resolve the issue with developers before publishing their findings. It's best to be part of that discussion early on

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image_2

Step: 3

blur-text-image_3

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Connect For Data Analytics For Accounting

Authors: Author

2nd Edition

1264152000, 9781264152001

More Books

Students also viewed these Accounting questions

Question

How many applicants are you interviewing?

Answered: 1 week ago

Question

Describe the role of HRD practitioners in OD interventions

Answered: 1 week ago