当前位置:网站首页>Xin'an Second Edition: Chapter 25 mobile application security requirements analysis and security protection engineering learning notes
Xin'an Second Edition: Chapter 25 mobile application security requirements analysis and security protection engineering learning notes
2022-07-06 17:34:00 【Moon Dream Studio】
Two 、 The outline of this chapter requires
8. Mobile application security requirement analysis and security protection engineering
8.1 Mobile application security threat and demand analysis
● Mobile operating system security analysis ● Security analysis of mobile communication network ● Mobile application App Safety analysis
8.2 Android System security and protection mechanism ● Android System security system
●Android System security mechanism ( Process sandbox isolation mechanism 、SOLite database security 、 Application signature mechanism 、 Permission declaration mechanism 、 Network transmission encryption )
8.3 iOS System security and protection mechanism
● i0S System security system
●iOS System security mechanism ( Safety start chain 、 Permission separation mechanism 、 Code signing mechanism 、DEP、 Address space layout randomization 、 Sandbox mechanism 、 Data encryption and protection mechanism 、 Network transmission encryption )
8.4 Mobile application security protection mechanism and technical scheme
8.4.1 Mobile application App Safety risk
● Reverse engineering risk ● Risk of tampering ● Data theft risk
84.2 Mobile application App Safety reinforcement
● Reverse prevention 、 Anti commissioning 、 tamper-proof ● Data leakage prevention 、 Transmission data protection
8.4.3 Mobile application App Safety inspection
● Identity authentication mechanism detection
● Communication session security mechanism detection ● Sensitive information protection mechanism detection ● Log security policy detection ● Transaction process security mechanism detection ● Server authentication mechanism detection ● Access control mechanism detection ● Data tamper proof capability detection ● prevent SQL Injection capability test ● Anti fishing safety capability test ●App Security vulnerability detection
8.5 Mobile application security comprehensive application case analysis
● Financial mobile security ● Mobile security of operators ● Mobile office security
3、 ... and 、 List of important and easy knowledge points in this chapter
25.1 Mobile application security threat and demand analysis
1. The basic composition of mobile application system based on smart phone includes three parts : First, mobile applications , abbreviation App; The second is the communication network , Including wireless networks 、 Mobile communication network and Internet ; The third is the application server , Composed of related servers , Responsible for handling from App Relevant information or data .
<边栏推荐
- Total / statistics function of MySQL
- 灵活报表v1.0(简单版)
- Akamai talking about risk control principles and Solutions
- Flink 解析(六):Savepoints
- Introduction to spring trick of ByteDance: senior students, senior students, senior students, and the author "brocade bag"
- Learn the wisdom of investment Masters
- Re signal writeup
- 连接局域网MySql
- yarn : 无法加载文件 D:\ProgramFiles\nodejs\yarn.ps1,因为在此系统上禁止运行脚本
- Flink analysis (I): basic concept analysis
猜你喜欢
04 products and promotion developed by individuals - data push tool
2021-03-22 "display login screen during recovery" can't be canceled. The appearance of lock screen interface leads to the solution that the remotely connected virtual machine can't work normally
Case: check the empty field [annotation + reflection + custom exception]
[reverse primary] Unique
Idea breakpoint debugging skills, multiple dynamic diagram package teaching package meeting.
05 personal R & D products and promotion - data synchronization tool
pip install pyodbc : ERROR: Command errored out with exit status 1
微信防撤回是怎么实现的?
02个人研发的产品及推广-短信平台
Re signal writeup
随机推荐
[VNCTF 2022]ezmath wp
C#版Selenium操作Chrome全屏模式显示(F11)
Flink源码解读(二):JobGraph源码解读
信息与网络安全期末复习(完整版)
List set data removal (list.sublist.clear)
信息与网络安全期末复习(基于老师给的重点)
Only learning C can live up to expectations top3 demo exercise
[CISCN 2021 华南赛区]rsa Writeup
CTF逆向入门题——掷骰子
Redis installation on centos7
The problem of "syntax error" when uipath executes insert statement is solved
Garbage first of JVM garbage collector
[reverse primary] Unique
Flink parsing (VII): time window
Final review of information and network security (full version)
Development and practice of lightweight planning service tools
手把手带你做强化学习实验--敲级详细
yarn : 无法加载文件 D:\ProgramFiles\nodejs\yarn.ps1,因为在此系统上禁止运行脚本
Flink 解析(三):内存管理
Flink parsing (VI): savepoints