This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "Projects/OWASP Mobile Security Project - Top Ten Mobile Risks"

From OWASP
Jump to: navigation, search
m (Created page with '== Top 10 mobile risks == # Insecure or unnecessary client-side data storage # Lack of data protection in transit # Personal data leakage # Failure to protect resources with str…')
 
(Top 10 mobile risks)
Line 1: Line 1:
== Top 10 mobile risks ==
+
== About this list ==
 +
 
 +
The below list is the result of a brainstorming session conducted by a small number of security consultants and application testers. For this list to carry weight going forward, it should be derived from the larger community that has had experience reviewing and testing mobile applications for security. A new initiative has been proposed to survey organizations for anonymous vulnerability data, and use this data to build the next version of this list.
 +
 
 +
 
 +
== Top 10 mobile Risks  Draft 0.1 ==
  
 
# Insecure or unnecessary client-side data storage
 
# Insecure or unnecessary client-side data storage

Revision as of 12:41, 10 February 2011

About this list

The below list is the result of a brainstorming session conducted by a small number of security consultants and application testers. For this list to carry weight going forward, it should be derived from the larger community that has had experience reviewing and testing mobile applications for security. A new initiative has been proposed to survey organizations for anonymous vulnerability data, and use this data to build the next version of this list.


Top 10 mobile Risks Draft 0.1

  1. Insecure or unnecessary client-side data storage
  2. Lack of data protection in transit
  3. Personal data leakage
  4. Failure to protect resources with strong authentication
  5. Failure to implement least privilege authorization policy
  6. Client-side injection
  7. Client-side DOS
  8. Malicious third-party code
  9. Client-side buffer overflow
  10. Failure to apply server-side controls