当前位置:网站首页>Xin'an Second Edition: Chapter 25 mobile application security requirements analysis and security protection engineering learning notes
Xin'an Second Edition: Chapter 25 mobile application security requirements analysis and security protection engineering learning notes
2022-07-06 17:34:00 【Moon Dream Studio】
Two 、 The outline of this chapter requires
8. Mobile application security requirement analysis and security protection engineering
8.1 Mobile application security threat and demand analysis
● Mobile operating system security analysis ● Security analysis of mobile communication network ● Mobile application App Safety analysis
8.2 Android System security and protection mechanism ● Android System security system
●Android System security mechanism ( Process sandbox isolation mechanism 、SOLite database security 、 Application signature mechanism 、 Permission declaration mechanism 、 Network transmission encryption )
8.3 iOS System security and protection mechanism
● i0S System security system
●iOS System security mechanism ( Safety start chain 、 Permission separation mechanism 、 Code signing mechanism 、DEP、 Address space layout randomization 、 Sandbox mechanism 、 Data encryption and protection mechanism 、 Network transmission encryption )
8.4 Mobile application security protection mechanism and technical scheme
8.4.1 Mobile application App Safety risk
● Reverse engineering risk ● Risk of tampering ● Data theft risk
84.2 Mobile application App Safety reinforcement
● Reverse prevention 、 Anti commissioning 、 tamper-proof ● Data leakage prevention 、 Transmission data protection
8.4.3 Mobile application App Safety inspection
● Identity authentication mechanism detection
● Communication session security mechanism detection ● Sensitive information protection mechanism detection ● Log security policy detection ● Transaction process security mechanism detection ● Server authentication mechanism detection ● Access control mechanism detection ● Data tamper proof capability detection ● prevent SQL Injection capability test ● Anti fishing safety capability test ●App Security vulnerability detection
8.5 Mobile application security comprehensive application case analysis
● Financial mobile security ● Mobile security of operators ● Mobile office security
3、 ... and 、 List of important and easy knowledge points in this chapter
25.1 Mobile application security threat and demand analysis
1. The basic composition of mobile application system based on smart phone includes three parts : First, mobile applications , abbreviation App; The second is the communication network , Including wireless networks 、 Mobile communication network and Internet ; The third is the application server , Composed of related servers , Responsible for handling from App Relevant information or data .
<边栏推荐
- 肖申克的救赎有感
- C# WinForm系列-Button简单使用
- Serial serialold parnew of JVM garbage collector
- Application service configurator (regular, database backup, file backup, remote backup)
- 【逆向】脱壳后修复IAT并关闭ASLR
- 05 personal R & D products and promotion - data synchronization tool
- Flink parsing (V): state and state backend
- 1. Introduction to JVM
- yarn : 无法加载文件 D:\ProgramFiles\nodejs\yarn.ps1,因为在此系统上禁止运行脚本
- Uipath browser performs actions in the new tab
猜你喜欢
随机推荐
Huawei certified cloud computing hica
SQL tuning notes
Flink 解析(二):反压机制解析
03个人研发的产品及推广-计划服务配置器V3.0
Display picture of DataGridView cell in C WinForm
Flink源码解读(三):ExecutionGraph源码解读
Concept and basic knowledge of network layering
肖申克的救赎有感
[VNCTF 2022]ezmath wp
连接局域网MySql
mysql 基本增删改查SQL语句
Selenium test of automatic answer runs directly in the browser, just like real users.
JUnit unit test
微信防撤回是怎么实现的?
ByteDance overseas technical team won the championship again: HD video coding has won the first place in 17 items
04 products and promotion developed by individuals - data push tool
Shawshank's sense of redemption
Redis installation on centos7
MySQL Advanced (index, view, stored procedures, functions, Change password)
PostgreSQL 14.2, 13.6, 12.10, 11.15 and 10.20 releases