IT Examiner School

Money Transmission

Application Risks User Device Risks Session Risks

Insecure application development

Rooted / Jailbroken Devices Unsecure Connections

Application Bug Exploits Reverse Engineering

OS Vulnerabilities

SMS Account Takeover

Cryptographic Key Theft

Malware

Mobile Account Takeover

Money Transmission

Mitigating controls include: • Well-defined policies, procedures & standards • Development standards, including quality assurance & testing • System Access/Segregation of Duties • Periodic Penetration Testing & Application Security Assessments • Timely Patching & Remediation of Identified Vulnerabilities

Made with FlippingBook Digital Publishing Software