• About yourself 
  • Download

Designing a defense for mobile applications

PDF 946 KB | 4 pages
Overview

With mobile computing set to overtake traditional forms as soon as 2015, the mobile space is exciting. Instead of accessing your website from the safe confines of work or home, your customers can now perform sensitive transactions anywhere. As a result, mobile applications, and the devices and data they interact with, can now be more easily attacked.

Attackers will probe...

With mobile computing set to overtake traditional forms as soon as 2015, the mobile space is exciting. Instead of accessing your website from the safe confines of work or home, your customers can now perform sensitive transactions anywhere. As a result, mobile applications, and the devices and data they interact with, can now be more easily attacked.

Attackers will probe all components of your application for vulnerabilities, and the only question is whether you will find them first. This paper highlights various considerations for defending mobile applications — from the mobile application architecture itself to the myriad of mobile testing technologies needed to properly assess mobile applications risk.

image | 4AA4-1802ENW Click to enlarge
  Close Overlay
Mobility by the numbers
2
Mapping the mobile security ecosystem
2
Anatomy of a mobile attack
3
A path forward for mobility testing
4
About HP Enterprise Security
4
Tell us about yourself
Required *
 
+