Assessing the Security of Mobile Applications (Part 3) - The Test Methods and Outcomes

by Ricky M. and Monique L. Magalhaes
Sept. 1, 2017 0 comments TechGenix mobile & wireless security

Mobile device and mobile app use within enterprise has clearly advanced production however the potential security risk presented through mobile applications within enterprise is also evident and should not be ignored, thus the need for a stringent app vetting framework. The purpose of this article series is to assist organisations with the procedures involved with vetting of potential applications or those already running on mobile devices to ultimately improve security when mobile computing is utilised for corporate function, which is now commonplace within enterprises. Test methods utilised for vetting of mobile applications should be used to effectively manipulate the application so that any potential vulnerability can be uncovered and informed decisions can be made by the organisation as to whether the risk level is acceptable or not and ultimately whether the app should be approved or rejected.