APAC CIOOutlook

Advertise

with us

  • Technologies
      • Artificial Intelligence
      • Big Data
      • Blockchain
      • Cloud
      • Digital Transformation
      • Internet of Things
      • Low Code No Code
      • MarTech
      • Mobile Application
      • Security
      • Software Testing
      • Wireless
  • Industries
      • E-Commerce
      • Education
      • Logistics
      • Retail
      • Supply Chain
      • Travel and Hospitality
  • Platforms
      • Microsoft
      • Salesforce
      • SAP
  • Solutions
      • Business Intelligence
      • Cognitive
      • Contact Center
      • CRM
      • Cyber Security
      • Data Center
      • Gamification
      • Procurement
      • Smart City
      • Workflow
  • Home
  • CXO Insights
  • CIO Views
  • Vendors
  • News
  • Conferences
  • Whitepapers
  • Newsletter
  • Awards
Apac
  • Artificial Intelligence

    Big Data

    Blockchain

    Cloud

    Digital Transformation

    Internet of Things

    Low Code No Code

    MarTech

    Mobile Application

    Security

    Software Testing

    Wireless

  • E-Commerce

    Education

    Logistics

    Retail

    Supply Chain

    Travel and Hospitality

  • Microsoft

    Salesforce

    SAP

  • Business Intelligence

    Cognitive

    Contact Center

    CRM

    Cyber Security

    Data Center

    Gamification

    Procurement

    Smart City

    Workflow

Menu
    • Cognitive
    • Cyber Security
    • Hotel Management
    • Workflow
    • E-Commerce
    • Business Intelligence
    • MORE
    #

    Apac CIOOutlook Weekly Brief

    ×

    Be first to read the latest tech news, Industry Leader's Insights, and CIO interviews of medium and large enterprises exclusively from Apac CIOOutlook

    Subscribe

    loading

    THANK YOU FOR SUBSCRIBING

    • Home
    • Cognitive
    Editor's Pick (1 - 4 of 8)
    left
    Agile Transformation Journey

    Sachin Nair, VP CIO, Khan Bank

    Responsible AI: The Human-Machine Symbiosis

    Sal Cucchiara, CIO & Head Of Wealth Management Technology, Morgan Stanley

    Seamless Integration into Networking Industry

    Robert Lewis, CIO, Assurant

    Enhancing Customers' Experience through Technology

    Marc A. Hamer, VP & CIO, Babcock & Wilcox Enterprises, Inc.

    Digital Transformation in Fashion Retail - From Efficiency to Experience

    Le Van, CTO, YODY Fashion

    Making Sense of Artificial Intelligence

    Joe Zirilli, Vice President, Artificial Intelligence, Parsons

    Revolutionizing Architecture and Construction: The Synergy of Artificial Intelligence and the Internet of Things (AIoT) in Building Smart Structures

    Raymond Kent, ASTC, Assoc AIA, LEED AP BD+C, Senior Technology Design Leader, Principal, DLR Group

    A Record of RPA

    Osmond Li, Senior Manager, Head of Technology Innovation, Dah Chong Hong Holdings Limited

    right

    Mobile Application Security Testing (MAST)

    Aloysius Cheang, Executive Vice President, Asia Pacific, Cloud Security Alliance

    Tweet
    content-image

    Aloysius Cheang, Executive Vice President, Asia Pacific, Cloud Security Alliance

    The use of mobile applications has become unavoidable, almost a necessity, in today's world. More people are starting to question the security of mobile applications. With the emergence of cloud computing, organizational transformation is required to address this paradigm shift. Cloud computing accelerates real-time use of applications, which allows for business agility. However, with the proliferation of mobile applications, a new set of security challenges arises.

    In order to help organizations and individuals reduce the possible risk exposures and security threat in using mobile applications, a framework for secure mobile application development, achieving privacy and security by design is required.

    Therefore, there is a need to implement Mobile Application Security Testing (MAST) and this will result in clearly articulated recommendations and best practices in the use of mobile applications. 

    We need to make sure to take security seriously from the beginning of an application development to application data deletion. We can manage this in the form of a lifecycle; which involves development, testing, production, update, application removal and application data deletion. In the most recent mobile application security testing documents released by NIST (2015) and CSA (2016), there are a few major requirements one needs to look at when it comes to mobile application security. In short, permission misuse, improper information disclosure, API/LIB native risk, application collusion, development obfuscation, connection encryption strength, data storage and power consumption are the key controls identified. Next, one needs to address the issue of how to test the security of mobile applications. Mobile application security testing and vetting processes utilised through MAST involve both static and dynamic analyses to evaluate security vulnerabilities of mobile applications for platforms such as Android, iOS and Windows. These processes cover permissions, exposed communications, potentially dangerous functionality, application collusion, obfuscation, excessive power consumption and traditional software vulnerabilities. It also covers internal communications such as debug flag and activities and external communications such as GPS, NFC access as well as checking the links that are written in the source code. 

    We should be aware that there are many other mobile application security concerns in the market and that we should make more effort to address these issues. The next journey in mobile application is to embark on developing mobile certification framework that will certify the security of mobile applications. The question is, will you be interested to be part of this?

    tag

    Cloud Computing

    GPS

    Weekly Brief

    loading
    Top 5 Cognitive Solutions Companies in Hong Kong - 2023
    ON THE DECK

    I agree We use cookies on this website to enhance your user experience. By clicking any link on this page you are giving your consent for us to set cookies. More info

    Copyright © 2025 APAC CIOOutlook. All rights reserved. Registration on or use of this site constitutes acceptance of our Terms of Use and Privacy and Anti Spam Policy 

    Home |  CXO Insights |   Whitepapers |   Subscribe |   Conferences |   Sitemaps |   About us |   Advertise with us |   Editorial Policy |   Feedback Policy |  

    follow on linkedinfollow on twitter follow on rss
    This content is copyright protected

    However, if you would like to share the information in this article, you may use the link below:

    https://cognitive.apacciooutlook.com/views/mobile-application-security-testing-mast-nwid-2976.html