SlideShare ist ein Scribd-Unternehmen logo
1 von 1
Downloaden Sie, um offline zu lesen
THE MOBILE
ATTACK SURFACE
Copyright © 2017 Accenture
All rights reserved.
Accenture, its logo, and
High Performance Delivered are
trademarks of Accenture. 172091
SECURITY
CHALLENGES
FOR BANKS
According to analysis and estimates by NowSecure, Inc. (NowSecure):1
The proliferation of mobile devices,
applications (apps) and operating systems
continues to drive innovation and expand the
mobile ecosystem. However, this continued
expansion may also create unique security
risks around the storage and transmission of
sensitive information via mobile devices.
ATTACK SURFACE: THE DEVICE ATTACK SURFACE: THE NETWORK
ATTACK SURFACE: THE DATA CENTER
• Wi-Fi (No Encryption/Weak Encryption)
• Rogue Access Point
• Packet Sniffing
• Man-in-the-Middle (MITM)
• Session Hacking
• DNS (Domain Name System) Poisoning
• SSL (Secure Sockets Layer) Strip
• Fake SSL Certificate
WEB SERVER
• Platform Vulnerabilities
• Server Misconfiguration
• Cross-Site Scripting (XSS)
• Cross-Site Request Forgery (XSRF)
• Weak Input Validation
• Brute Force Attacks
DATABASE
• SQL Injection
• Privilege Escalation
• Data Dumping
• OS Command Execution
BROWSER
• Phishing
• Framing
• Clickjacking
• Man-in-the-Middle
• Buffer Overflow
• Data Caching
PHONE/SMS
• Baseband Attacks
• SMishing
MALWARE
SYSTEM
• No Passcode/
Weak Passcode
• iOS® Jailbreak
• Android™ Rooting
• OS Data Caching
• Passwords and
Data Accessible
• Carrier-Loaded
Software
• No Encryption/
Weak Encryption
• User-Initiated Code
APPS
• Sensitive Data
Storage
• No Encryption/
Weak Encryption
• Improper SSL
Validation
• Config Manipulation
• Dynamic Runtime
Injection
• Unintented
Permissions
• Escalated Privileges
There are three areas in the mobile technology chain where
parties may exploit vulnerabilities to launch malicious attacks;
the device, the network and the data center.2
FOR MORE INFORMATION, VISIT:
Accenture Finance and Risk:
www.accenture.com/financeandrisk
Accenture Security:
www.accenture.com/us-en/security-index
REFERENCES
1. Secure Mobile Development Best Practices,” NowSecure. Access at:
https://www.nowsecure.com/ebooks/secure-mobile-development-be
st-practices/.
2. Ibid
3. Mobile Banking Applications: Security Challenges for Banks,
Accenture and NowSecure, April 2017.
Copyright © NowSecure, Inc. All rights reserved.
The NowSecure name and logo are trademarks of
NowSecure, Inc. and are used with permission.
Rights to trademarks referenced herein, other than
Accenture trademarks, belong to their respective
owners. We disclaim proprietary interest in the
marks and names of others.
35 PERCENT
of communications sent
by mobile devices are
unencrypted and the average
device connects to over
160 unique IP addresses daily.
As mobile devices continue to
replace legacy hardware across
organizations and industries, it
is critical that security remains
top-of-mind and is embedded
within the app development
lifecycle. With this in mind,
Accenture and NowSecure
collaborated to analyze the
mobile threat landscape,
specifically for customer-facing
mobile banking apps.
ONE IN FOUR
mobile apps include at least
one high-risk security flaw.
43 PERCENT
of mobile device users do
not use a passcode, PIN or
pattern lock on their devices.
TOP SECURITY
RISKS FOR MOBILE
BANKING APPS
To assess the security of mobile banking apps against fraud and
penetration attempts, static and dynamic analysis was performed
using the NowSecure Lab Automated tool. The vulnerability
assessment included customer-facing mobile banking apps from
15 unique North American financial institutions on both iOS® and
Android™ operating systems (30 total apps).
All apps included in scope were publicly available and downloaded directly from
the respective online app stores. A total of 780 tests were performed across the
apps in scope. Overall, every app tested had at least one security issue.3
The top
risks identified appear below.
Applications running on
Android™ Operating System
Applications running on
iOS® Operating System
WORLD-WRITABLE FILES
CVSS 7.7 – 33%
WRITABLE EXECUTABLES
CVSS 7.7 – 7%
BROKEN SSL (SECURE SOCKETS
LAYER) & SENSITIVE DATA IN
TRANSIT (WITH ENCRYPTION)
CVSS 7.4 – 13%
OBFUSCATION
CVSS N/A – 60%
SECURERANDOM
CVSS 5.5 – 73%
COOKIE “HTTPONLY” TAG
CVSS 5.3 – 40%
TLS (TRANSPORT LAYER
SECURITY) TRAFFIC WITH
SENSITIVE DATA
CVSS 1.6 – 80%
APP TRANSPORT SECURITY
CVSS N/A – 60%
DYNAMIC CODE LOADING
CVSS 4.3 – 33%
IMPACT VULNERABILITY SCALE:
Low
Medium
High
BANKING
MOBILE
APPLICATIONS
EMBEDDING
SECURITY IN MOBILE
DEVELOPMENT
LIFECYCLE
The mobile development field is a complex environment that is
constantly evolving, which creates a hyper-dynamic environment
for developers. These complexities often increase the attack surface,
with mobile devices constantly challenging the boundaries of an
organization’s security perimeter. Mobile apps should, at a minimum, be
developed with the same security standards as any other software asset.
Accenture has identified key principles to help organizations develop a comprehensive
program for embedding security throughout the enterprise’s mobile lifecycle.
Developing a strategy, grounded by six (6) key principles, allows banks to proactively
address security vulnerabilities throughout the mobile development lifecycle and
promote informed decisions around security risks.
Leading organizations recognize the expansion of mobile technologies within their
enterprise and proactively seek ways to securely integrate them to further enable
their workforce and achieve business goals by:
4. Understanding the impact
across the organization
and the processes needed
to support it.
2. Identifying the resources
and systems that are affected
by the introduction of mobile
technologies.
3. Selecting the technologies
and implementing controls to
meet requirements defined
by business needs as well as
compliance requirements.
1. Developing a mobile
security strategy to properly
integrate with the overall
security and business strategy.
1. DEVICE 2. NETWORK
3. DATA 4. APPLICATION
5. USER ACCESS 6. GOVERNANCE & COMPLIANCE
TOP RISKS IDENTIFIED AND CVSS
COOKIE “SECURE” TAG
CVSS 5.3 – 54%
CVSS: Common Vulnerability Scoring System

Weitere ähnliche Inhalte

Mehr von accenture

The Industrialist: Trends & Innovations - June 2023
The Industrialist: Trends & Innovations - June 2023The Industrialist: Trends & Innovations - June 2023
The Industrialist: Trends & Innovations - June 2023accenture
 
Reinventing Enterprise Operations
Reinventing Enterprise OperationsReinventing Enterprise Operations
Reinventing Enterprise Operationsaccenture
 
Semiconductor Gender Parity Study
Semiconductor Gender Parity StudySemiconductor Gender Parity Study
Semiconductor Gender Parity Studyaccenture
 
The Industrialist: Trends & Innovations - March 2023
The Industrialist: Trends & Innovations - March 2023The Industrialist: Trends & Innovations - March 2023
The Industrialist: Trends & Innovations - March 2023accenture
 
Nonprofit reinvention in a time of unprecedented change
 Nonprofit reinvention in a time of unprecedented change Nonprofit reinvention in a time of unprecedented change
Nonprofit reinvention in a time of unprecedented changeaccenture
 
Free to be 100% me
Free to be 100% meFree to be 100% me
Free to be 100% meaccenture
 
The Industrialist: Trends & Innovations - February 2023
The Industrialist: Trends & Innovations - February 2023The Industrialist: Trends & Innovations - February 2023
The Industrialist: Trends & Innovations - February 2023accenture
 
Mundo gamer e a oportunidade de entrada pela abordagem do movimento
Mundo gamer e a oportunidade de entrada pela abordagem do movimentoMundo gamer e a oportunidade de entrada pela abordagem do movimento
Mundo gamer e a oportunidade de entrada pela abordagem do movimentoaccenture
 
Pathways to Profitability for the Communications Industry
Pathways to Profitability for the Communications IndustryPathways to Profitability for the Communications Industry
Pathways to Profitability for the Communications Industryaccenture
 
The Industrialist: Trends & Innovations - January 2023
The Industrialist: Trends & Innovations - January 2023The Industrialist: Trends & Innovations - January 2023
The Industrialist: Trends & Innovations - January 2023accenture
 
Reimagining the Agenda | Accenture
Reimagining the Agenda | AccentureReimagining the Agenda | Accenture
Reimagining the Agenda | Accentureaccenture
 
Climate Leadership Eleventh Hour | Accenture
Climate Leadership Eleventh Hour | AccentureClimate Leadership Eleventh Hour | Accenture
Climate Leadership Eleventh Hour | Accentureaccenture
 
Sustainable Value Chain
Sustainable Value ChainSustainable Value Chain
Sustainable Value Chainaccenture
 
Chemical Companies in the Metaverse
Chemical Companies in the MetaverseChemical Companies in the Metaverse
Chemical Companies in the Metaverseaccenture
 
Sustainable Value Chain
Sustainable Value ChainSustainable Value Chain
Sustainable Value Chainaccenture
 
Value Untangled Slideshare
Value Untangled SlideshareValue Untangled Slideshare
Value Untangled Slideshareaccenture
 
The Industrialist: Trends & Innovations - November 2022
The Industrialist: Trends & Innovations - November 2022The Industrialist: Trends & Innovations - November 2022
The Industrialist: Trends & Innovations - November 2022accenture
 
Health Experience: The difference between loyalty & leaving
Health Experience: The difference between loyalty & leavingHealth Experience: The difference between loyalty & leaving
Health Experience: The difference between loyalty & leavingaccenture
 
The Reinvention Reset | Accenture
The Reinvention Reset | AccentureThe Reinvention Reset | Accenture
The Reinvention Reset | Accentureaccenture
 
Metaverse opportunities for the communications industry
 Metaverse opportunities for the communications industry Metaverse opportunities for the communications industry
Metaverse opportunities for the communications industryaccenture
 

Mehr von accenture (20)

The Industrialist: Trends & Innovations - June 2023
The Industrialist: Trends & Innovations - June 2023The Industrialist: Trends & Innovations - June 2023
The Industrialist: Trends & Innovations - June 2023
 
Reinventing Enterprise Operations
Reinventing Enterprise OperationsReinventing Enterprise Operations
Reinventing Enterprise Operations
 
Semiconductor Gender Parity Study
Semiconductor Gender Parity StudySemiconductor Gender Parity Study
Semiconductor Gender Parity Study
 
The Industrialist: Trends & Innovations - March 2023
The Industrialist: Trends & Innovations - March 2023The Industrialist: Trends & Innovations - March 2023
The Industrialist: Trends & Innovations - March 2023
 
Nonprofit reinvention in a time of unprecedented change
 Nonprofit reinvention in a time of unprecedented change Nonprofit reinvention in a time of unprecedented change
Nonprofit reinvention in a time of unprecedented change
 
Free to be 100% me
Free to be 100% meFree to be 100% me
Free to be 100% me
 
The Industrialist: Trends & Innovations - February 2023
The Industrialist: Trends & Innovations - February 2023The Industrialist: Trends & Innovations - February 2023
The Industrialist: Trends & Innovations - February 2023
 
Mundo gamer e a oportunidade de entrada pela abordagem do movimento
Mundo gamer e a oportunidade de entrada pela abordagem do movimentoMundo gamer e a oportunidade de entrada pela abordagem do movimento
Mundo gamer e a oportunidade de entrada pela abordagem do movimento
 
Pathways to Profitability for the Communications Industry
Pathways to Profitability for the Communications IndustryPathways to Profitability for the Communications Industry
Pathways to Profitability for the Communications Industry
 
The Industrialist: Trends & Innovations - January 2023
The Industrialist: Trends & Innovations - January 2023The Industrialist: Trends & Innovations - January 2023
The Industrialist: Trends & Innovations - January 2023
 
Reimagining the Agenda | Accenture
Reimagining the Agenda | AccentureReimagining the Agenda | Accenture
Reimagining the Agenda | Accenture
 
Climate Leadership Eleventh Hour | Accenture
Climate Leadership Eleventh Hour | AccentureClimate Leadership Eleventh Hour | Accenture
Climate Leadership Eleventh Hour | Accenture
 
Sustainable Value Chain
Sustainable Value ChainSustainable Value Chain
Sustainable Value Chain
 
Chemical Companies in the Metaverse
Chemical Companies in the MetaverseChemical Companies in the Metaverse
Chemical Companies in the Metaverse
 
Sustainable Value Chain
Sustainable Value ChainSustainable Value Chain
Sustainable Value Chain
 
Value Untangled Slideshare
Value Untangled SlideshareValue Untangled Slideshare
Value Untangled Slideshare
 
The Industrialist: Trends & Innovations - November 2022
The Industrialist: Trends & Innovations - November 2022The Industrialist: Trends & Innovations - November 2022
The Industrialist: Trends & Innovations - November 2022
 
Health Experience: The difference between loyalty & leaving
Health Experience: The difference between loyalty & leavingHealth Experience: The difference between loyalty & leaving
Health Experience: The difference between loyalty & leaving
 
The Reinvention Reset | Accenture
The Reinvention Reset | AccentureThe Reinvention Reset | Accenture
The Reinvention Reset | Accenture
 
Metaverse opportunities for the communications industry
 Metaverse opportunities for the communications industry Metaverse opportunities for the communications industry
Metaverse opportunities for the communications industry
 

KĂĽrzlich hochgeladen

(ANIKA) Budhwar Peth Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANIKA) Budhwar Peth Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANIKA) Budhwar Peth Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANIKA) Budhwar Peth Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
The Economic History of the U.S. Lecture 22.pdf
The Economic History of the U.S. Lecture 22.pdfThe Economic History of the U.S. Lecture 22.pdf
The Economic History of the U.S. Lecture 22.pdfGale Pooley
 
Solution Manual for Financial Accounting, 11th Edition by Robert Libby, Patri...
Solution Manual for Financial Accounting, 11th Edition by Robert Libby, Patri...Solution Manual for Financial Accounting, 11th Edition by Robert Libby, Patri...
Solution Manual for Financial Accounting, 11th Edition by Robert Libby, Patri...ssifa0344
 
20240429 Calibre April 2024 Investor Presentation.pdf
20240429 Calibre April 2024 Investor Presentation.pdf20240429 Calibre April 2024 Investor Presentation.pdf
20240429 Calibre April 2024 Investor Presentation.pdfAdnet Communications
 
TEST BANK For Corporate Finance, 13th Edition By Stephen Ross, Randolph Weste...
TEST BANK For Corporate Finance, 13th Edition By Stephen Ross, Randolph Weste...TEST BANK For Corporate Finance, 13th Edition By Stephen Ross, Randolph Weste...
TEST BANK For Corporate Finance, 13th Edition By Stephen Ross, Randolph Weste...ssifa0344
 
05_Annelore Lenoir_Docbyte_MeetupDora&Cybersecurity.pptx
05_Annelore Lenoir_Docbyte_MeetupDora&Cybersecurity.pptx05_Annelore Lenoir_Docbyte_MeetupDora&Cybersecurity.pptx
05_Annelore Lenoir_Docbyte_MeetupDora&Cybersecurity.pptxFinTech Belgium
 
The Economic History of the U.S. Lecture 23.pdf
The Economic History of the U.S. Lecture 23.pdfThe Economic History of the U.S. Lecture 23.pdf
The Economic History of the U.S. Lecture 23.pdfGale Pooley
 
Vip Call US đź“ž 7738631006 âś…Call Girls In Sakinaka ( Mumbai )
Vip Call US đź“ž 7738631006 âś…Call Girls In Sakinaka ( Mumbai )Vip Call US đź“ž 7738631006 âś…Call Girls In Sakinaka ( Mumbai )
Vip Call US đź“ž 7738631006 âś…Call Girls In Sakinaka ( Mumbai )Pooja Nehwal
 
Stock Market Brief Deck (Under Pressure).pdf
Stock Market Brief Deck (Under Pressure).pdfStock Market Brief Deck (Under Pressure).pdf
Stock Market Brief Deck (Under Pressure).pdfMichael Silva
 
Log your LOA pain with Pension Lab's brilliant campaign
Log your LOA pain with Pension Lab's brilliant campaignLog your LOA pain with Pension Lab's brilliant campaign
Log your LOA pain with Pension Lab's brilliant campaignHenry Tapper
 
Call Girls Service Nagpur Maya Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Maya Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Maya Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Maya Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
Solution Manual for Principles of Corporate Finance 14th Edition by Richard B...
Solution Manual for Principles of Corporate Finance 14th Edition by Richard B...Solution Manual for Principles of Corporate Finance 14th Edition by Richard B...
Solution Manual for Principles of Corporate Finance 14th Edition by Richard B...ssifa0344
 
Call Girls Koregaon Park Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Koregaon Park Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Koregaon Park Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Koregaon Park Call Me 7737669865 Budget Friendly No Advance Bookingroncy bisnoi
 
The Economic History of the U.S. Lecture 25.pdf
The Economic History of the U.S. Lecture 25.pdfThe Economic History of the U.S. Lecture 25.pdf
The Economic History of the U.S. Lecture 25.pdfGale Pooley
 
02_Fabio Colombo_Accenture_MeetupDora&Cybersecurity.pptx
02_Fabio Colombo_Accenture_MeetupDora&Cybersecurity.pptx02_Fabio Colombo_Accenture_MeetupDora&Cybersecurity.pptx
02_Fabio Colombo_Accenture_MeetupDora&Cybersecurity.pptxFinTech Belgium
 
Best VIP Call Girls Noida Sector 18 Call Me: 8448380779
Best VIP Call Girls Noida Sector 18 Call Me: 8448380779Best VIP Call Girls Noida Sector 18 Call Me: 8448380779
Best VIP Call Girls Noida Sector 18 Call Me: 8448380779Delhi Call girls
 
The Economic History of the U.S. Lecture 20.pdf
The Economic History of the U.S. Lecture 20.pdfThe Economic History of the U.S. Lecture 20.pdf
The Economic History of the U.S. Lecture 20.pdfGale Pooley
 
Pooja 9892124323 : Call Girl in Juhu Escorts Service Free Home Delivery
Pooja 9892124323 : Call Girl in Juhu Escorts Service Free Home DeliveryPooja 9892124323 : Call Girl in Juhu Escorts Service Free Home Delivery
Pooja 9892124323 : Call Girl in Juhu Escorts Service Free Home DeliveryPooja Nehwal
 
High Class Call Girls Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
High Class Call Girls Nagpur Grishma Call 7001035870 Meet With Nagpur EscortsHigh Class Call Girls Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
High Class Call Girls Nagpur Grishma Call 7001035870 Meet With Nagpur Escortsranjana rawat
 

KĂĽrzlich hochgeladen (20)

(ANIKA) Budhwar Peth Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANIKA) Budhwar Peth Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANIKA) Budhwar Peth Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANIKA) Budhwar Peth Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
The Economic History of the U.S. Lecture 22.pdf
The Economic History of the U.S. Lecture 22.pdfThe Economic History of the U.S. Lecture 22.pdf
The Economic History of the U.S. Lecture 22.pdf
 
Solution Manual for Financial Accounting, 11th Edition by Robert Libby, Patri...
Solution Manual for Financial Accounting, 11th Edition by Robert Libby, Patri...Solution Manual for Financial Accounting, 11th Edition by Robert Libby, Patri...
Solution Manual for Financial Accounting, 11th Edition by Robert Libby, Patri...
 
20240429 Calibre April 2024 Investor Presentation.pdf
20240429 Calibre April 2024 Investor Presentation.pdf20240429 Calibre April 2024 Investor Presentation.pdf
20240429 Calibre April 2024 Investor Presentation.pdf
 
TEST BANK For Corporate Finance, 13th Edition By Stephen Ross, Randolph Weste...
TEST BANK For Corporate Finance, 13th Edition By Stephen Ross, Randolph Weste...TEST BANK For Corporate Finance, 13th Edition By Stephen Ross, Randolph Weste...
TEST BANK For Corporate Finance, 13th Edition By Stephen Ross, Randolph Weste...
 
05_Annelore Lenoir_Docbyte_MeetupDora&Cybersecurity.pptx
05_Annelore Lenoir_Docbyte_MeetupDora&Cybersecurity.pptx05_Annelore Lenoir_Docbyte_MeetupDora&Cybersecurity.pptx
05_Annelore Lenoir_Docbyte_MeetupDora&Cybersecurity.pptx
 
(Vedika) Low Rate Call Girls in Pune Call Now 8250077686 Pune Escorts 24x7
(Vedika) Low Rate Call Girls in Pune Call Now 8250077686 Pune Escorts 24x7(Vedika) Low Rate Call Girls in Pune Call Now 8250077686 Pune Escorts 24x7
(Vedika) Low Rate Call Girls in Pune Call Now 8250077686 Pune Escorts 24x7
 
The Economic History of the U.S. Lecture 23.pdf
The Economic History of the U.S. Lecture 23.pdfThe Economic History of the U.S. Lecture 23.pdf
The Economic History of the U.S. Lecture 23.pdf
 
Vip Call US đź“ž 7738631006 âś…Call Girls In Sakinaka ( Mumbai )
Vip Call US đź“ž 7738631006 âś…Call Girls In Sakinaka ( Mumbai )Vip Call US đź“ž 7738631006 âś…Call Girls In Sakinaka ( Mumbai )
Vip Call US đź“ž 7738631006 âś…Call Girls In Sakinaka ( Mumbai )
 
Stock Market Brief Deck (Under Pressure).pdf
Stock Market Brief Deck (Under Pressure).pdfStock Market Brief Deck (Under Pressure).pdf
Stock Market Brief Deck (Under Pressure).pdf
 
Log your LOA pain with Pension Lab's brilliant campaign
Log your LOA pain with Pension Lab's brilliant campaignLog your LOA pain with Pension Lab's brilliant campaign
Log your LOA pain with Pension Lab's brilliant campaign
 
Call Girls Service Nagpur Maya Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Maya Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Maya Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Maya Call 7001035870 Meet With Nagpur Escorts
 
Solution Manual for Principles of Corporate Finance 14th Edition by Richard B...
Solution Manual for Principles of Corporate Finance 14th Edition by Richard B...Solution Manual for Principles of Corporate Finance 14th Edition by Richard B...
Solution Manual for Principles of Corporate Finance 14th Edition by Richard B...
 
Call Girls Koregaon Park Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Koregaon Park Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Koregaon Park Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Koregaon Park Call Me 7737669865 Budget Friendly No Advance Booking
 
The Economic History of the U.S. Lecture 25.pdf
The Economic History of the U.S. Lecture 25.pdfThe Economic History of the U.S. Lecture 25.pdf
The Economic History of the U.S. Lecture 25.pdf
 
02_Fabio Colombo_Accenture_MeetupDora&Cybersecurity.pptx
02_Fabio Colombo_Accenture_MeetupDora&Cybersecurity.pptx02_Fabio Colombo_Accenture_MeetupDora&Cybersecurity.pptx
02_Fabio Colombo_Accenture_MeetupDora&Cybersecurity.pptx
 
Best VIP Call Girls Noida Sector 18 Call Me: 8448380779
Best VIP Call Girls Noida Sector 18 Call Me: 8448380779Best VIP Call Girls Noida Sector 18 Call Me: 8448380779
Best VIP Call Girls Noida Sector 18 Call Me: 8448380779
 
The Economic History of the U.S. Lecture 20.pdf
The Economic History of the U.S. Lecture 20.pdfThe Economic History of the U.S. Lecture 20.pdf
The Economic History of the U.S. Lecture 20.pdf
 
Pooja 9892124323 : Call Girl in Juhu Escorts Service Free Home Delivery
Pooja 9892124323 : Call Girl in Juhu Escorts Service Free Home DeliveryPooja 9892124323 : Call Girl in Juhu Escorts Service Free Home Delivery
Pooja 9892124323 : Call Girl in Juhu Escorts Service Free Home Delivery
 
High Class Call Girls Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
High Class Call Girls Nagpur Grishma Call 7001035870 Meet With Nagpur EscortsHigh Class Call Girls Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
High Class Call Girls Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
 

Mobile Banking Applications: Security Challenges Infographic

  • 1. THE MOBILE ATTACK SURFACE Copyright © 2017 Accenture All rights reserved. Accenture, its logo, and High Performance Delivered are trademarks of Accenture. 172091 SECURITY CHALLENGES FOR BANKS According to analysis and estimates by NowSecure, Inc. (NowSecure):1 The proliferation of mobile devices, applications (apps) and operating systems continues to drive innovation and expand the mobile ecosystem. However, this continued expansion may also create unique security risks around the storage and transmission of sensitive information via mobile devices. ATTACK SURFACE: THE DEVICE ATTACK SURFACE: THE NETWORK ATTACK SURFACE: THE DATA CENTER • Wi-Fi (No Encryption/Weak Encryption) • Rogue Access Point • Packet Sniffing • Man-in-the-Middle (MITM) • Session Hacking • DNS (Domain Name System) Poisoning • SSL (Secure Sockets Layer) Strip • Fake SSL Certificate WEB SERVER • Platform Vulnerabilities • Server Misconfiguration • Cross-Site Scripting (XSS) • Cross-Site Request Forgery (XSRF) • Weak Input Validation • Brute Force Attacks DATABASE • SQL Injection • Privilege Escalation • Data Dumping • OS Command Execution BROWSER • Phishing • Framing • Clickjacking • Man-in-the-Middle • Buffer Overflow • Data Caching PHONE/SMS • Baseband Attacks • SMishing MALWARE SYSTEM • No Passcode/ Weak Passcode • iOS® Jailbreak • Android™ Rooting • OS Data Caching • Passwords and Data Accessible • Carrier-Loaded Software • No Encryption/ Weak Encryption • User-Initiated Code APPS • Sensitive Data Storage • No Encryption/ Weak Encryption • Improper SSL Validation • Config Manipulation • Dynamic Runtime Injection • Unintented Permissions • Escalated Privileges There are three areas in the mobile technology chain where parties may exploit vulnerabilities to launch malicious attacks; the device, the network and the data center.2 FOR MORE INFORMATION, VISIT: Accenture Finance and Risk: www.accenture.com/financeandrisk Accenture Security: www.accenture.com/us-en/security-index REFERENCES 1. Secure Mobile Development Best Practices,” NowSecure. Access at: https://www.nowsecure.com/ebooks/secure-mobile-development-be st-practices/. 2. Ibid 3. Mobile Banking Applications: Security Challenges for Banks, Accenture and NowSecure, April 2017. Copyright © NowSecure, Inc. All rights reserved. The NowSecure name and logo are trademarks of NowSecure, Inc. and are used with permission. Rights to trademarks referenced herein, other than Accenture trademarks, belong to their respective owners. We disclaim proprietary interest in the marks and names of others. 35 PERCENT of communications sent by mobile devices are unencrypted and the average device connects to over 160 unique IP addresses daily. As mobile devices continue to replace legacy hardware across organizations and industries, it is critical that security remains top-of-mind and is embedded within the app development lifecycle. With this in mind, Accenture and NowSecure collaborated to analyze the mobile threat landscape, specifically for customer-facing mobile banking apps. ONE IN FOUR mobile apps include at least one high-risk security flaw. 43 PERCENT of mobile device users do not use a passcode, PIN or pattern lock on their devices. TOP SECURITY RISKS FOR MOBILE BANKING APPS To assess the security of mobile banking apps against fraud and penetration attempts, static and dynamic analysis was performed using the NowSecure Lab Automated tool. The vulnerability assessment included customer-facing mobile banking apps from 15 unique North American financial institutions on both iOS® and Android™ operating systems (30 total apps). All apps included in scope were publicly available and downloaded directly from the respective online app stores. A total of 780 tests were performed across the apps in scope. Overall, every app tested had at least one security issue.3 The top risks identified appear below. Applications running on Android™ Operating System Applications running on iOS® Operating System WORLD-WRITABLE FILES CVSS 7.7 – 33% WRITABLE EXECUTABLES CVSS 7.7 – 7% BROKEN SSL (SECURE SOCKETS LAYER) & SENSITIVE DATA IN TRANSIT (WITH ENCRYPTION) CVSS 7.4 – 13% OBFUSCATION CVSS N/A – 60% SECURERANDOM CVSS 5.5 – 73% COOKIE “HTTPONLY” TAG CVSS 5.3 – 40% TLS (TRANSPORT LAYER SECURITY) TRAFFIC WITH SENSITIVE DATA CVSS 1.6 – 80% APP TRANSPORT SECURITY CVSS N/A – 60% DYNAMIC CODE LOADING CVSS 4.3 – 33% IMPACT VULNERABILITY SCALE: Low Medium High BANKING MOBILE APPLICATIONS EMBEDDING SECURITY IN MOBILE DEVELOPMENT LIFECYCLE The mobile development field is a complex environment that is constantly evolving, which creates a hyper-dynamic environment for developers. These complexities often increase the attack surface, with mobile devices constantly challenging the boundaries of an organization’s security perimeter. Mobile apps should, at a minimum, be developed with the same security standards as any other software asset. Accenture has identified key principles to help organizations develop a comprehensive program for embedding security throughout the enterprise’s mobile lifecycle. Developing a strategy, grounded by six (6) key principles, allows banks to proactively address security vulnerabilities throughout the mobile development lifecycle and promote informed decisions around security risks. Leading organizations recognize the expansion of mobile technologies within their enterprise and proactively seek ways to securely integrate them to further enable their workforce and achieve business goals by: 4. Understanding the impact across the organization and the processes needed to support it. 2. Identifying the resources and systems that are affected by the introduction of mobile technologies. 3. Selecting the technologies and implementing controls to meet requirements defined by business needs as well as compliance requirements. 1. Developing a mobile security strategy to properly integrate with the overall security and business strategy. 1. DEVICE 2. NETWORK 3. DATA 4. APPLICATION 5. USER ACCESS 6. GOVERNANCE & COMPLIANCE TOP RISKS IDENTIFIED AND CVSS COOKIE “SECURE” TAG CVSS 5.3 – 54% CVSS: Common Vulnerability Scoring System