From the course: Writing Secure Code in iOS by Infosec
Unlock this course with a free trial
Join today to access over 24,900 courses taught by industry experts.
Activity: OWASP top 10 mobile vulnerabilities, part 2
From the course: Writing Secure Code in iOS by Infosec
Activity: OWASP top 10 mobile vulnerabilities, part 2
- Let's go on to insecure communication. And again, OWASP is talking about how this is easy to exploit. It's common. The impact, however, is severe. It could cause identity theft or fraud or reputational damage. And so the question is, are you vulnerable to insecure communication? Remember that you need to protect data going from point A to point B via any network means. This means not only Wi-Fi, not only things that carry TCP/IP, but also Bluetooth and near-field communications and audio and infrared in any of the cellular technologies and SMS. So you want to, wherever possible, use encryption, TLS encryption. And you want to make sure that if you have data that is stored locally, that you encrypt it. Because (chuckles) the old saying is, any data stored locally is insecure data, right? So the preferred thing is to encrypt the data even before you transmit it and also encrypt the transmission. So how do you prevent insecure communication? Well, here are general best practices. You…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.
Contents
-
-
-
The need for secure coding10m 52s
-
(Locked)
Activity: OWASP top 10 mobile vulnerabilities, part 110m 17s
-
(Locked)
Activity: OWASP top 10 mobile vulnerabilities, part 215m 26s
-
(Locked)
Activity: OWASP top 10 mobile vulnerabilities, part 314m 43s
-
(Locked)
iOS security overview, part 113m 36s
-
(Locked)
iOS security overview, part 27m 27s
-
(Locked)
Swift secure app development overview, part 114m
-
(Locked)
Swift secure app development overview, part 28m 9s
-
(Locked)
iOS general development best practices1m 55s
-
-
-
-
-
-
-
-