当前位置:网站首页>Xin'an Second Edition: Chapter 25 mobile application security requirements analysis and security protection engineering learning notes
Xin'an Second Edition: Chapter 25 mobile application security requirements analysis and security protection engineering learning notes
2022-07-06 17:34:00 【Moon Dream Studio】
Two 、 The outline of this chapter requires
8. Mobile application security requirement analysis and security protection engineering
8.1 Mobile application security threat and demand analysis
● Mobile operating system security analysis ● Security analysis of mobile communication network ● Mobile application App Safety analysis
8.2 Android System security and protection mechanism ● Android System security system
●Android System security mechanism ( Process sandbox isolation mechanism 、SOLite database security 、 Application signature mechanism 、 Permission declaration mechanism 、 Network transmission encryption )
8.3 iOS System security and protection mechanism
● i0S System security system
●iOS System security mechanism ( Safety start chain 、 Permission separation mechanism 、 Code signing mechanism 、DEP、 Address space layout randomization 、 Sandbox mechanism 、 Data encryption and protection mechanism 、 Network transmission encryption )
8.4 Mobile application security protection mechanism and technical scheme
8.4.1 Mobile application App Safety risk
● Reverse engineering risk ● Risk of tampering ● Data theft risk
84.2 Mobile application App Safety reinforcement
● Reverse prevention 、 Anti commissioning 、 tamper-proof ● Data leakage prevention 、 Transmission data protection
8.4.3 Mobile application App Safety inspection
● Identity authentication mechanism detection
● Communication session security mechanism detection ● Sensitive information protection mechanism detection ● Log security policy detection ● Transaction process security mechanism detection ● Server authentication mechanism detection ● Access control mechanism detection ● Data tamper proof capability detection ● prevent SQL Injection capability test ● Anti fishing safety capability test ●App Security vulnerability detection
8.5 Mobile application security comprehensive application case analysis
● Financial mobile security ● Mobile security of operators ● Mobile office security
3、 ... and 、 List of important and easy knowledge points in this chapter
25.1 Mobile application security threat and demand analysis
1. The basic composition of mobile application system based on smart phone includes three parts : First, mobile applications , abbreviation App; The second is the communication network , Including wireless networks 、 Mobile communication network and Internet ; The third is the application server , Composed of related servers , Responsible for handling from App Relevant information or data .
<边栏推荐
- Flexible report v1.0 (simple version)
- Introduction to spring trick of ByteDance: senior students, senior students, senior students, and the author "brocade bag"
- 基于Infragistics.Document.Excel导出表格的类
- List set data removal (list.sublist.clear)
- Case: check the empty field [annotation + reflection + custom exception]
- connection reset by peer
- Vscode matches and replaces the brackets
- Garbage first of JVM garbage collector
- Final review of information and network security (full version)
- 03 products and promotion developed by individuals - plan service configurator v3.0
猜你喜欢

JVM garbage collector part 1

C# WinForm系列-Button简单使用

Flink源码解读(二):JobGraph源码解读

02 personal developed products and promotion - SMS platform

Flink 解析(二):反压机制解析

Application service configurator (regular, database backup, file backup, remote backup)

EasyRE WriteUp

The problem of "syntax error" when uipath executes insert statement is solved

Flink analysis (I): basic concept analysis
![Case: check the empty field [annotation + reflection + custom exception]](/img/50/47cb40e6236a0ba34362cdbf883205.png)
Case: check the empty field [annotation + reflection + custom exception]
随机推荐
Take you hand-in-hand to do intensive learning experiments -- knock the level in detail
当前系统缺少NTFS格式转换器(convert.exe)
华为认证云计算HICA
Final review of information and network security (full version)
MySQL报错解决
Brush questions during summer vacation, ouch ouch
06 products and promotion developed by individuals - code statistical tools
The NTFS format converter (convert.exe) is missing from the current system
Vscode matches and replaces the brackets
Interpretation of Flink source code (III): Interpretation of executiongraph source code
基于LNMP部署flask项目
Flink 解析(五):State与State Backend
About selenium starting Chrome browser flash back
自动答题 之 Selenium测试直接运行在浏览器中,就像真正的用户在操作一样。
网络分层概念及基本知识
2021-03-22 "display login screen during recovery" can't be canceled. The appearance of lock screen interface leads to the solution that the remotely connected virtual machine can't work normally
mysql的合计/统计函数
Jetpack compose 1.1 release, based on kotlin's Android UI Toolkit
MySQL Advanced (index, view, stored procedures, functions, Change password)
Models used in data warehouse modeling and layered introduction