Mobile application security and privacy Flashcards

(18 cards)

1
Q

What is the focus of the Mobile Application Security & Privacy course?

A

The course focuses on security and privacy aspects of mobile applications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Who are the instructors of the course?

A

Volker Stolz and Keila Lima.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are some core Android security features?

A

Default system and file permissions, cryptography, autofill framework, secure IPC, and techniques to avoid memory management errors.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the purpose of the app’s sandbox in Android?

A

Apps are not supposed to access other apps’ data or code, except when using intents.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What types of permissions exist in Android?

A

User-granted permissions and application-defined permissions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How does authentication work in Android?

A

Access to protected assets is controlled via Credential Manager and supports various authentication methods, including biometric authentication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the preferred mechanism for asynchronous IPC on Android?

A

Intents.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the risks associated with implicit intents?

A

Implicit intents can lead to security hazards, such as implicit intent hijacking, allowing malicious apps to act as the intended application.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are some mitigations for implicit intents?

A

Perform input validation, make intents explicit, specify non-null permissions, show an app chooser, and disallow access to content providers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What does Google Play Services provide for Safe Browsing?

A

An API to check URLs for known threats.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are potential vulnerabilities in WebViews?

A

Cross-site scripting and unsafe URI loading.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the three fundamental ways to save data on an Android device?

A

Internal storage, external storage, and content providers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the purpose of data access audit in Android?

A

To help developers detect unexpected private data access within the app.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are key privacy guidelines for Android applications?

A

Minimize permissions requests, use location data responsibly, and support user-facing privacy features.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How should sensitive data be handled in Android apps?

A

Data should be stored safely, passed securely to other apps, and access should be restricted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are resettable identifiers in Android?

A

Identifiers that respect user preferences on advertisement tracking and do not access IMEI or device serial number.

17
Q

Where can you find information about the latest Android security vulnerabilities?

A

Android App security improvement program, Security Vulnerabilities, and OWASP Reports.

18
Q

What are some paths towards mitigation of vulnerabilities?

A

Vulnerability scanning and updating all app dependencies.