App security describes security measures at the application level to prevent data or code within the app from being stolen or hijacked. It encompasses the security considerations during application development and design but also involves systems and approaches to protect apps after deployment.
App security may include hardware, software, and procedures identifying or minimizing security vulnerabilities. A router that prevents anyone from viewing a computer’s IP address from the Internet is a form of hardware application security.
But security measures at the application level are also typically built into the software, such as an application firewall that strictly defines what activities are allowed and prohibited. Procedures can entail an application security routine that includes protocols such as regular testing.
Even if only you have access to your device, various parties come into play in day-to-day use to whom you open up your data treasures: You not only have to trust the device manufacturer but also the publishers and programmers of the apps.
The third party is the operator of the network through which data is exchanged. You must also trust him before you download apps and save or send data. If you trust everyone involved, working with apps and personal data is only recommended.
Many security settings for mobile devices can be set in apps, but there are also many settings that we can set on the devices themselves. In the following, practical tips on what to consider when backing up devices, how to restore the data stored on the devices in the event of an emergency and explain the best way to encrypt your devices.
This digression only refers to Google’s Android operating system for mobile phones. The reason for this is that with other systems, such as Apple’s iOS or Windows, the user cannot confirm or deselect the individual permissions of the apps.
Applications ( apps ) for the Android operating system run in a protected, closed environment, a so-called sandbox. On the one hand, this sandbox offers internal protection, protecting your app uses data from unauthorized access. On the other hand, the principle includes protection from the outside world.
This prevents the app from accessing other user data or system services. For certain functionalities, such as data exchange and communication, the sandbox is opened to the outside with the help of authorization authorizations (also called permissions ).
Android knows about 160 permissions, divided into groups and security levels by Google. The groups are used to sort the permissions, and they say nothing about security. Groups are, for example:
The security levels are important because they make a statement about the criticality of the authorization.
Google differentiates between the following four levels: 1. normal; 2. dangerous ; 3. signature; _ 4. signature system.
For you, “normal” and “dangerous” are relevant because the associated permissions must be confirmed when installing an app. Of the permissions defined in Android, 60 have the security level “dangerous “.
At the ” dangerous ” security level, the corresponding function is potentially misused with the respective authorization. Internet criminals could thus compromise your device and spy on private data, for example.
Below are two examples of permissions (source: texts taken from Android ):
EXAMPLE: SECURITY LEVEL: DANGEROUS Authorization:
Call phone numbers directly.
Description: Allows applications to dial phone numbers without your intervention. Malicious applications can be responsible for unexpected calls on your phone bill. However, the emergency number dialling is not possible.
Group: Paid Services
EXAMPLE: SECURITY LEVEL: NORMAL Authorization:
View network status
Description: Allows an app to view the status of all networks.
Group: network communication
(Source: original descriptions from Android )
The following examples show the different areas in which the apps can request necessary permissions and what risks arise.
Paid Services
Send short messages: Allows the app to send SMS. Malicious applications may incur charges if they send messages without your consent.
Your personal information
In the various app stores, the permissions required by an app are listed with a description, sorted by group. The permissions with the security level “dangerous” will be shown to you in full, while your security level permissions “normal” must also be opened by clicking on “Show all”.
All “dangerous” permissions are listed when the app is installed; you must also open the “normal” permissions.
When you install a new app, you must confirm the permissions the app is requesting. “All or none” applies here. A differentiated approval of the app permissions is not possible. This often results in the requested authorization authorizations being confirmed without the potential threats being known.
The same security recommendations apply to apps on other operating systems. However, more malware and potentially unwanted programs (PUP) for Android and more dubious sources to get apps than for other mobile operating systems.
In addition, individual permissions cannot be deselected without aborting the entire installation. Another note on the rating system that Google relies on as a “safety recommendation”:
The success of a company also depends on the quality of customer experiences. However, many…
Whether it's Amazon, Apple, Google, or Microsoft, each big tech giant wants to claim the…
Companies are currently implementing various sustainability measures. However, internal IT is rarely considered. The new…
AI can help companies save valuable resources by uncovering optimization potential. Using self-learning algorithms, it…
More and more companies in the finance sector are facing considerable challenges with cloud transformation.…
The number of cyber attacks on companies is increasing alarmingly. Every company is affected, and…