Difference between revisions of "Projects/OWASP Mobile Security Project - Top Ten Mobile Risks"

From OWASP
Jump to: navigation, search
m (Top 10 mobile Risks Draft 0.1)
(19 intermediate revisions by 3 users not shown)
Line 1: Line 1:
== About this list ==
+
== About this list ==
  
The below list is the result of a brainstorming session conducted by a small number of security consultants and application testers. For this list to carry weight going forward, it should be derived from the larger community that has had experience reviewing and testing mobile applications for security. A new initiative has been proposed to survey organizations for anonymous vulnerability data, and use this data to build the next version of this list.
+
'''An effort to refresh the Top 10 for 2013 is currently underway. Details can be found here: [http://owasp.blogspot.com/2013/05/2013-owasp-mobile-top-10-call-for-data.html OWASP Mobile Top 10 Call For Data]'''
  
 +
The list below is release candidate v1.0 of the OWASP Top 10 Mobile Risks.  This list was initially released on September 23, 2011 at Appsec USA.  
  
== Top 10 mobile Risks  Draft 0.1 ==
+
The original presentation can be found here:&nbsp;[http://www.slideshare.net/JackMannino/owasp-top-10-mobile-risks SLIDES]<br>
  
# Insecure or unnecessary client-side data storage
+
The corresponding video can be found here: [http://www.youtube.com/watch?v=GRvegLOrgs0 VIDEO]
# Lack of data protection in transit
+
# Personal data leakage
+
# Failure to protect resources with strong authentication
+
# Failure to implement least privilege authorization policy
+
# Client-side injection
+
# Client-side DOS
+
# Malicious third-party code
+
# Client-side buffer overflow
+
# Failure to apply server-side controls
+
  
== Additional Considerations ==
+
== Top 10 Mobile Risks, Release Candidate v1.0 ==
 
+
[[File:Topten.png|right|550px]]
# Abuse of client side paid resources
+
*[[Mobile_Top_10_2012-M1|M1: Insecure Data Storage ]]
# Failure to properly handle inbound SMS messages
+
*[[Mobile_Top_10_2012-M2|M2: Weak Server Side Controls ]]
# Failure to properly handle outbound SMS messages
+
*[[Mobile_Top_10_2012-M3|M3: Insufficient Transport Layer Protection ]]
 +
*[[Mobile_Top_10_2012-M4|M4: Client Side Injection ]]
 +
*[[Mobile_Top_10_2012-M5|M5: Poor Authorization and Authentication ]]
 +
*[[Mobile_Top_10_2012-M6|M6: Improper Session Handling ]]
 +
*[[Mobile_Top_10_2012-M7|M7: Security Decisions Via Untrusted Inputs ]]
 +
*[[Mobile_Top_10_2012-M8|M8: Side Channel Data Leakage ]]
 +
*[[Mobile_Top_10_2012-M9|M9: Broken Cryptography ]]
 +
*[[Mobile_Top_10_2012-M10|M10: Sensitive Information Disclosure ]]

Revision as of 09:56, 22 May 2013

About this list

An effort to refresh the Top 10 for 2013 is currently underway. Details can be found here: OWASP Mobile Top 10 Call For Data

The list below is release candidate v1.0 of the OWASP Top 10 Mobile Risks.  This list was initially released on September 23, 2011 at Appsec USA.  

The original presentation can be found here: SLIDES

The corresponding video can be found here: VIDEO

Top 10 Mobile Risks, Release Candidate v1.0

Topten.png